Microsoft Research Blog
Avoiding Vulnerable Passwords—and Rules, Too
You could think of it as a brainteaser: Create a sequence of eight or more characters that includes at least one uppercase letter, one lowercase letter, a digit, and a symbol, that doesn’t contain any…
Publication
Retroactive security (slides)
Video
Can You Hide in an Internet Panopticon?
Many people have legitimate needs to avoid their online activities being tracked and linked to their real-world identities – from citizens of authoritarian regimes, to everyday victims of domestic abuse or law enforcement officers investigating…