Wikileaks once again successfully hacked the media, shaping discussions into deliberately deceptive ways.
An initial analysis of the trove of CIA documents released by Wikileaks.
President Trump's continued use of a dangerously insecure, out-of-date Android device should cause real panic.
FBI-style NITs to deanonymize Tor hidden service criminals may be on their way out. But going forward, law enforcement may be able to directly monitor the Tor network to perform targeted deanonymization.
Benjamin Wittes flags that much of the Yahoo story is unclear, including legal arguments and the objective of the search, and further reporting from Motherboard and the Intercept further confuses the possible mechanism of the search, describing it not as a spam filter but like a "rootkit" and opening up a significant vulnerability.