Monthly Archives: June 2012

The crypto triple threat club

My written one-to-one communication patterns can be grouped into three major categories: longform, synchronous shortform, and asynchronous shortform. For the most part I use email, IMs, and SMS, respectively, for those purposes. Each of those technologies has its own end-to-end encryption protocol. 1In some cases, more than one. I’m just listing the ones I use. […]

Bad civic hygiene

Bruce Schneier has a great cautionary quote about technology and its tendency to be subverted: It’s bad civic hygiene to build technologies that could someday be used to facilitate a police state. He’s used the line in a few essays: one about data reuse and the role of the US census in Japanese internment, one […]