Slides from my CCC Talk

Slides from my Pursuance talk given at 34C3 on December 30, 2017 in Germany: »

The Human Colossus

An excerpt from the brilliant -- If an individual human’s core motivation is to pass its genes on »

Slides from Latest Surveillance Self-defense Workshop

My good friend AJ Bahnken and I hosted a CryptoParty/surveillance self-defense workshop/security training in December of 2017. Here are our slides: My slides: https »


The projects of mine that I'm currently focused on, as of... November 2017 Since April 2017 I have been maniacally focused on building and coordinating the »

Backchannel UI Design

In 2015 I worked with a designer friend of mine, Sky Gilbar, to create this click-through prototype of Backchannel, an imagined mobile app for secure "chat »

How to Learn Python

I've taught several people the basics of coding throughout the years. If Python is the language you should learn first (rather than, say, JavaScript), do this »


From mid-2015 to mid-2016 I got about 1/3 of my calories from Soylent, a "meal replacement" that's kind of like a protein shake, except there's »

Insightful People, Blogs, Books

Technology Jeff Lindsay Rich Hickey Rob Pike Alan Kay Bret Victor The Future Peter Diamandis Digital Security Bruce Schneier Edward Snowden Julian Assange Jacob Appelbaum Motherboard »

PostgREST: The most important technology you've never used

The most unknown and underrated technology I've ever used is certainly PostgREST. What is PostgREST, and what does it do for you? Your Postgres table definitions »

LeapChat »

Why Superintelligent AI is a Threat

[The following fictional story is meant as an example for how dangerous superintelligent artificial intelligence will be, and how easily malicious people will be able to »

OVH is not Unmetered

OVH's "unmetered" servers are as "unlimited" as T-Mobile's 4G -- once you use a certain amount of data transfer, you're throttled. Excerpt from the OVH license »

LetsEncrypt SSL cert on GoDaddy Shared Hosting with No Root and No nc

$ --issue -d -d -w ~/www --dns dns_gd Looks simple, doesn't it? Nope. Here's what you have to do » Review

In using for the past 13 months, I didn't notice any downtime during my stay, which I appreciate. But I'm leaving for a few »

UC Berkeley CryptoParty

My (Steve's) slides, covering why privacy is important, why surveillance is so dangerous, historical examples of surveillance being abused, and more: »

CrypTag Notes

The first version of CrypTag Notes, the secure note-taking and shared wiki page desktop app, has launched!!! »

Getting Started with Git (and GitHub) on Windows

Install Create a GitHub account at Follow these instructions to generate an SSH key and add it to your »


Use Signal, the encrypted mobile messaging app. It's open source, it's created by great hackers over at Open Whisper Systems. iPhone/iOS version Android version »

Revolution LA CryptoParty #1

I really enjoyed teaching members of Revolution LA how to use various privacy-enhancing tools at our 3-hour event on December 11, 2016. Thank you Trinity for »


Below is a list of horribly bad, true things that have happened, many of them perpetrated by the US government. 2020.09.17: Some prisons are »

On Obama

Perhaps because most of us suspect that both Hillary Clinton and Donald Trump would make even worse presidents than Barack Obama has been, this has led »

Talk: Intro to Computer Security

Slides from the talk I gave to Santa Barbara High School students: »

Data Double Standard

Great point made in this Hacker News comment: Corporations will abuse your personal integrity whenever they get a chance, while abiding the law. Corporations will cry »

"Mankind's Greatest Achievement" by Nikola Tesla

"Mankind's Greatest Achievement" by Nikola Tesla: When a child is born its sense-organs are brought in contact with the outer world. The waves of sound, heat »

Don't Use

Don't buy/rent servers from Why? Several reasons: The way they set up automatic backups is clearly a scheme to nickel and dime you »