What You Need To Know About Deleting Your Facebook Account
March 19, 2018 | Ann Brenoff, HuffPost

The real business of Facebook is collecting data, Egelman says, and for years now, the site has made it hard for users to delete theirs ― not that the internet allows erasures anyway. Once you post something, it is out there, somewhere, forever more.

Did This American Tech Help Turkey Spy In Syria?
March 9, 2018 | Thomas Fox-Brewster, Forbes

Bill Marczak, Citizen Lab researcher, told Forbes attacks using the PacketLogic box to redirect users to the StrongPity malware had continued up to this week.

Nicholas Weaver, a researcher at the International Computer Science Institute, told NPR earlier this year that nonpresidential campaigns are perfect phishing targets. "Phishing is unreliable — you might send out 500 phishing emails and only get a couple of responses," said Weaver. "But when you have [435] House races, each with dozens of potential staffers as targets, you're going to see a lot of these low-level attacks that are remarkably effective when you just use the law of large numbers."

A $5 Billion Cryptocurrency Has Enraged Cryptographers
March 2, 2018 | Daniel Oberhaus and Jordan Pearson, Motherboard

For example, security researcher Nicholas Weaver from UC Berkeley wrote that the IOTA team were “drooling idiots” in a tweet on Sunday, and Johns Hopkins cryptography professor Matthew Green tweeted that people should “avoid the IOTA project—with your brains and your money.”

New Reports Shine a Spotlight on Tether’s Legal Status
February 9, 2018 | Kai Sedgwick,

Nicholas Weaver is a computer security researcher at the International Computer Science Institute in Berkeley. On Thursday, he published a piece in Lawfareblog giving his thoughts on the likelihood of Tether being targeted by U.S. regulators.

Berkeley computer security researcher Nick Weaver argues that form of "arbitrage"—running a crime scheme with profitable victims in one locale, while hosting in another that's safer from prosecution—can provide more effective shielding for criminals than Tor. "You find a place where the local laws are happy and host there," Weaver says. "A cybercrime forum that is 'no damage to Russia' is generally allowed in Russia, no need to use Tor."

How to Hack an Election: An Intelligence Analysis
February 6, 2018 | Eric Haseltine PhD, Psychology Today

For instance, CNN online published a story quoting Dr. Nicholas Weaver, of the International Computer Science Institute at the University of California, Berkeley. "Nobody is going to be able to change the outcome of the presidential vote by hacking voting machines. The system is too distributed, too decentralized, too many implementations for any individual actor or group to make substantial change."

"Over the past couple of months, a huge amount of tether has been created, it has shifted to the Bitfinex exchange and presumably buys bitcoin and other cryptos. This, I believe, has been keeping the price up," Nicholas Weaver, a senior researcher at the International Computer Science Institute at Berkeley, California, told CNBC by phone Thursday.

Nicholas Weaver, a professor from UC Berkeley’s International Computer Science Institute has warned that a “bloodbath” would ensue if the claims turn out to be true.

The types of phishing attacks that garner data like that are cheap, effective, hard to track and perfect for the American electoral system, says Nicholas Weaver, a researcher at the International Computer Science Institute.