The End of Ordinary Money, Part 1 | How Big Brother took over the financial system. |
The End of Ordinary Money, Part 2 | Your banker is a snitch. Money laundering law & digital cash. |
The World Financial Police Attack Anonymity | We want to know where your money is and what you are doing with it. |
Another Whack Against GAK | The government's grip on cryptology slips. |
Plot to Spy on Banks Outlined in White House Email | Memo from 1986 details NSC/DOJ plot to spy on banks. |
Michael Riconosciuto on Encryption | Comments from architect of the PROMIS backdoor. |
Microsoft's "NSA Backdoor" | An NSA backdoor? Probably not, but Microsoft "security" is clearly a myth. |
How Secure is America's Nuclear Arsenal? | Public key cryptography and nuclear weapons. |
NSA, Crypto AG, and the Iraq-Iran War | How the NSA bugged international cryptography software. |
Clipper Chip Banking | Sandia National Laboratories create non-anonymous "anonymity." |
Letter from Bill Payne Regarding Cryptography at Sandia | |
Digital Signatures Illustrated | A tutorial. |
The DES Algorithm Illustrated | A tutorial. |
Cryptography and Number Theory for Digital Cash | A tutorial. |
The Wassenaar Invasion of Privacy | Global agreement on cryptography restriction. |
Intelink | The network linking US spook agencies. |
The Digital Monetary Trust, Part 1 | Anonymous banking based on cryptography, not bankers & lawyers. |
The Digital Monetary Trust, Part 2 | The mathematical details of the anonymous banking system. |
Louis Freeh Spies on Bill Clinton | How to exploit the hole in PGP. |
The Function of the Drug War | Economics dictates that failure will always be the criterion of success. |
The DSA Flaw in Open PGP | This article explains the flaw and also gives you a Java cryptanalysis program so you can exploit the flaw yourself. |