Should we chat, too? Security analysis of WeChat’s MMTLS encryption protocol. security Article 11 191 words 13 votes
The not-so-silent type. Vulnerabilities across keyboard apps reveal keystrokes to network eavesdroppers. security privacy Article 16 015 words 9 votes
NSO group’s Pegasus spyware returns in 2022 with a trio of iOS 15 and iOS 16 zero-click exploit chains security ios.15 ios.16 apple Article 3664 words 4 votes
Pegasus vs. Predator - Dissident’s doubly-infected iPhone reveals Cytrox mercenary spyware ios Article 5492 words 3 votes
A comparative analysis of security, privacy, and censorship issues in TikTok and Douyin, both developed by ByteDance privacy security social media Link 5 votes
An examination of Zoom's encryption and potential areas of concern in their infrastructure, including the transmission of meeting encryption keys through China privacy Article 2320 words 6 votes
Censored contagion - How information on the coronavirus is managed on Chinese social media social media Article 4605 words 9 votes
NSO exploited WhatsApp to hack at least 1400 phones and spy on top government officials at US allies facebook privacy security Article 1077 words 16 votes