Technology in Hostile States: Ten Principles for User Protection mikeperry December 16, 2016

This blog post is meant to generate a conversation about best practices for using cryptography and privacy by design to improve security and protect user data from well-resourced attackers and oppr