Hacker News
- What went wrong with Horizon: learning from the Post Office Trial https://www.benthamsgaze.org/2021/07/15/what-went-wrong-with-horizon-learning-from-the-post-office-trial/ 19 comments
- What Is Synthetic Data? The Good, the Bad, and the Ugly https://www.benthamsgaze.org/2023/03/01/what-is-synthetic-data-the-good-the-bad-and-the-ugly/ 12 comments
- When Computer are considered infallible by courts https://www.benthamsgaze.org/2022/06/30/the-legal-rule-that-computers-are-presumed-to-be-operating-correctly-unforeseen-and-unjust-consequences/ 2 comments
- The legal rule (Eng&Wales) that computers are presumed to be operating correctly [pdf] https://www.benthamsgaze.org/wp-content/uploads/2022/06/briefing-presumption-that-computers-are-reliable.pdf 26 comments
- How 4chan and The_Donald Influence the Fake News Ecosystem https://www.benthamsgaze.org/2017/10/04/how-4chan-and-the_donald-influence-the-fake-news-ecosystem/ 25 comments
- Detecting Android malware by building Markov chains of behavioral models https://www.benthamsgaze.org/2017/03/28/mamadroid-detecting-android-malware-by-building-markov-chains-of-behavioral-models/ 2 comments
- How contactless cards are still vulnerable to relay attack https://www.benthamsgaze.org/2016/08/02/do-you-know-what-youre-paying-for-how-contactless-cards-are-still-vulnerable-to-relay-attack/ 48 comments
- On the hunt for Facebook’s army of fake likes https://www.benthamsgaze.org/2016/05/12/on-the-hunt-for-facebooks-army-of-fake-likes/ 59 comments
- Insecure by design: protocols for encrypted phone calls https://www.benthamsgaze.org/2016/01/19/insecure-by-design-protocols-for-encrypted-phone-calls/ 30 comments
- 3.67% of the most popular websites block Tor (because of Akamai and CloudFlare) https://www.benthamsgaze.org/2016/02/23/do-you-see-what-i-see/ 2 comments
- Insecure by design: protocols for encrypted phone calls https://www.benthamsgaze.org/2016/01/19/insecure-by-design-protocols-for-encrypted-phone-calls/ 2 comments
- Insecure by design: protocols for encrypted phone calls https://www.benthamsgaze.org/2016/01/19/insecure-by-design-protocols-for-encrypted-phone-calls/ 2 comments
- Scaling Tor Hidden Services https://www.benthamsgaze.org/2015/11/17/scaling-tor-hidden-services/ 2 comments
- Criminals exploit vuln in Chip and PIN that banks claimed would never be seen https://www.benthamsgaze.org/2015/10/14/just-how-sophisticated-will-card-fraud-techniques-become/ 5 comments
- Vulnerability in the enforcement of group permissions in Linux containers (Docker, Kubernetes, etc.) https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/ 2 comments netsec
- New threat models in the face of British intelligence and the Five Eyes’ new end-to-end encryption interception strategy https://www.benthamsgaze.org/2018/12/06/new-threat-models-in-the-face-of-british-intelligence-and-the-five-eyes-new-end-to-end-encryption-interception-strategy/ 3 comments crypto
- A witch-hunt for trojans in our chips https://www.benthamsgaze.org/2018/02/06/a-witch-hunt-for-trojans-in-our-chips/ 3 comments netsec
- The end of the billion-user Password:Impossible (on the cost of misguided password policies) https://www.benthamsgaze.org/2017/08/11/the-end-of-the-billion-user-passwordimpossible/ 36 comments netsec
- PayBreak able to defeat WannaCry/WannaCryptor ransomware https://www.benthamsgaze.org/2017/05/16/paybreak-able-to-defeat-wannacrywannacryptor-ransomware/ 8 comments netsec
- UK government (through GCHQ) are mandating a voice encryption protocol – MIKEY-SAKKE – with a key-escrow backdoor https://www.benthamsgaze.org/2016/01/19/insecure-by-design-protocols-for-encrypted-phone-calls/ 5 comments technology
- UK government (through GCHQ) are mandating a voice encryption protocol – MIKEY-SAKKE – with a key-escrow backdoor https://www.benthamsgaze.org/2016/01/19/insecure-by-design-protocols-for-encrypted-phone-calls/ 16 comments crypto
- Criminals exploit vulnerability in Chip and PIN that banks claimed would never be seen https://www.benthamsgaze.org/2015/10/14/just-how-sophisticated-will-card-fraud-techniques-become/ 5 comments netsec