Six Lines Archive
Posts from this year
- » Google's Quantum Computing Breakthrough
 - » Trust, Truth, and Science
 - » Standard Ebooks
 - » Sharing Happiness for the Sake of Happiness
 
2018
- » Sasse's Thoughts on Deepfakes
 - » Remembering the Past
 - » Crying Wolf and Cyber Attacks
 - » The Promise and Peril of Big Tech
 - » Secret Meetings and Deepfakes
 - » Book Review – Sapiens
 - » The Cabinet Files
 - » Bad Analogies for Network Neutrality
 
2017
- » On Objective Standards for Removing Confederate Monuments
 - » Why Privacy Regulation Will Happen
 - » Network Neutrality, Again
 - » Misunderstanding Encryption
 
2016
- » Responding to Opinion-oriented Questions on Stack Exchange Sites
 - » Perfect Security Doesn't Exist
 - » Developments in Electronic Voting
 - » Tim Cook Believes Privacy is a Civil Liberty
 - » E-books and Physical Books
 - » Science and Screen Time
 - » Nuclear Threats are Still Threats
 - » Encryption isn't Even a Luxury
 - » Unfit Bits
 - » Peyton Manning on Healthcare Privacy
 
2015
- » Lifelock's $100M Settlement
 - » An Amendment for Privacy
 - » Net of Insecurity
 - » Home Address versus Email Address
 - » Tim Cook Interview on NPR
 - » Something We Might Lose
 - » Tim Cook on Stephen Colbert
 
2014
- » Apple's Encryption “Announcement”
 - » Should Pseudonyms be Protected?
 - » On Our Supposedly Dystopian Future
 - » The Internet with a Regulatory Face
 - » Heartbleed
 - » Simple Introduction to 1Password
 - » Apple's SSL Failure
 - » TED Radio Hour on Privacy
 - » Point of Sale Terminals and Open Source Software
 - » Security and Privacy in 2014
 
2013
- » Expectations and Education
 - » Will Teaching People to Code Improve Privacy?
 - » Book Review – Jim Henson
 - » The Google Books Settlement and the NSA
 - » Acquisti on Why Privacy Matters
 - » XKCD on Privacy
 - » We Need the Rest of the Story
 - » Teaching Software Engineering Ethics
 - » policies.txt
 - » Encryption Alone Doesn't Protect Privacy
 - » On Meeting with Foreign Leaders
 - » Two Clever Approaches to Revealing Government Secrets
 - » Ethical User Interface Design
 
2012
2011
- » EFF on Public Key Infrastructure
 - » Code Signing Flaw in iOS
 - » Software Security on Mac OS X
 - » Cloud Computing Privacy
 - » Adobe Flash Security
 - » EFF Satisfied With Amazon Silk
 - » Air Travel Absurdity
 - » ▶ The Privacy Implications of Amazon’s Silk Browser
 - » Paper-Based Violation of HIPAA
 - » Barnes & Noble Purchasing Borders Customer Data
 - » danah boyd on Teen Privacy
 - » Joel Stein on Passwords
 - » Google’s Page Speed Service
 - » Banks as Groupon Competitors
 - » Software Security Rating Systems
 - » Liability and Software Security
 - » A Detailed Guide to Creating Passwords
 - » Communications Privacy in Tennessee
 - » Best Practices for a Secure Cloud
 - » The Continuing Saga of Dropbox
 - » Pinboard vs. Urchin
 - » Texas vs. the TSA
 - » The “Nothing to Hide” Argument
 - » Complaint to FTC about Dropbox
 - » Why Privacy Mattered
 - » Connecting the Dots
 - » Smartphones and Social Networks
 - » Facebook Apps Security Hole
 - » Google Location Data Lawsuit
 - » Creepy Location Tool
 - » Apple Responds to Location Data Concerns
 - » ▶ Apple and Location Data
 - » Hard Drive Steganography
 - » Relying on Regulation
 - » Dilbert on Privacy
 - » Schneier’s Law
 - » Dropbox Encryption
 - » Email and the Fourth Amendment
 - » Asymmetry and Security
 - » The Only Secure Password
 - » Stuxnet TED Talk
 - » HTTPS Tradeoffs
 - » Obama Administration Backs Privacy Law
 - » Facebook Logins and Job Interviews
 - » Password Management
 - » Security State of the Union
 - » Location Privacy
 - » Facebook and HTTPS
 - » ▶ The Difference Between Cryptography and Security
 - » Facebook Reconsiders Address and Mobile Number Sharing
 - » Facebook Allows API Access to Phone Numbers and Addresses
 
2010
- » HTTPS Everywhere Updated for Firesheep
 - » Data Mining for Life Insurance
 - » Bruce Schneier on Reconceptualizing Security
 - » The Ethics of Firesheep
 - » Felten Named FTC Chief Technologist
 - » Federal Cloud Computing Security Requirements
 - » The Problems of Government Cryptographic Policy
 - » Protection from Firesheep
 - » Destroying the Indestructible Cookie
 - » CNN Covers Voting Hacks
 - » 280,000 Missing Medical Records
 - » Firesheep
 - » Apple Deprecates Java for Security?
 - » FaceTime Security Hole
 - » More Proposals for Wiretapping the Internet
 - » Lower Merion Webcam Privacy Case Resolved
 - » Intro to Smart Grid Privacy
 - » Problems with Internet Voting
 - » U.S. Customs and Border Protection
 - » Supreme Court to Hear Employee Privacy Case
 - » All About Stuxnet
 - » Wiretapping the Internet
 - » Indestructible Cookies
 - » The Market for Credit Cards
 - » The Inevitable Dislike Button
 - » Rubin’s Privacy Fallacies
 - » Stephen Colbert on Privacy
 - » Internet Explorer Privacy
 - » E-Books and Privacy
 - » Cyberwar Rhetoric
 - » ▶ Rush Introduces Privacy Bill
 - » ECPA Reform Videos
 - » Geolocation Privacy
 - » Facebook and Protecting Children
 - » Cyber Command Logo Challenge Disappointment
 - » Schneier on Cyberwar Hype
 - » Cyber Command Logo Challenge
 - » NPR’s End of Privacy Series
 - » Privacy and Celebrity
 - » Point-Counterpoint: Hiring Hackers
 - » Last Lakota Code Talker Dies
 - » The Cyberwar Threat
 - » Fifth Annual Movie Plot Threat Contest Winner
 - » Permanent Deletion
 - » Carl Malamud at Gov2.0
 - » Opt-out for Google Analytics
 - » One Nation Under CCTV No Longer?
 - » The Government Cloud
 - » Digital Copiers as Time-Bombs
 - » Schneier’s Fifth Annual Movie Plot Threat Contest
 - » Warrantless Wiretapping is Illegal
 - » EFF Panel on Desigining Security and Privacy
 - » Breaking SSL Encryption
 - » The Cybersecurity Act
 - » danah boyd on Chatroulette
 - » Netflix Privacy Research
 - » Open Government: The Privacy Imperative
 - » Mac OS X Zero-Day Threats
 - » Harper on Schumer and Graham
 - » ▶ Introducing Six Lines
 - » Another Horrible Plan for National Identification
 
