Should we chat, too? Security analysis of WeChat’s MMTLS encryption protocol. ~tech security Article 11 191 words 13 votes
The not-so-silent type. Vulnerabilities across keyboard apps reveal keystrokes to network eavesdroppers. ~tech security privacy Article 16 015 words 9 votes
Censored contagion - How information on the coronavirus is managed on Chinese social media ~tech social media Article 4605 words 9 votes