From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
At a Congressional hearing earlier this week, Matt Blaze made the point that CALEA, the 1994 law that forces telecoms to make phone calls wiretappable, is outdated...Bruce Schneier From Schneier on Security | April 8, 2025 at 07:08 AM
In “Secrets and Lies” (2000), I wrote:
It is poor civic hygiene to install technologies that could someday facilitate a police state.
It’s something a bunch ofnews...Bruce Schneier From Schneier on Security | April 7, 2025 at 07:03 AM
The Brooklyn indie art-punk group, Two-Man Giant Squid, just released a new album.
As usual, you can also use this squid post to talk about the security stories...Bruce Schneier From Schneier on Security | April 4, 2025 at 05:03 PM
In case you need proof that anyone, even people who do cybersecurity for a living, Troy Hunt has a long, iterative story on his webpage about how he got phished...Bruce Schneier From Schneier on Security | April 4, 2025 at 07:02 AM
If you’ve ever taken a computer security class, you’ve probably learned about the three legs of computer security—confidentiality, integrity, and availability—known...Bruce Schneier From Schneier on Security | April 3, 2025 at 07:05 AM
John Kelsey and I wrote a short paper for the Rossfest Festschrift: “Rational Astrologies and Security“:
There is another non-security way that designers can spend...Bruce Schneier From Schneier on Security | April 2, 2025 at 07:04 AM
I have heard stories of more aggressive interrogation of electronic devices at US border crossings. I know a lot about securing computers, but very little about...Bruce Schneier From Schneier on Security | April 1, 2025 at 07:01 AM
US National Security Advisor Mike Waltz, who started the now-infamous group chat coordinating a US attack against the Yemen-based Houthis on March 15, is seemingly...Bruce Schneier From Schneier on Security | March 31, 2025 at 07:04 AM
In another rare squid/cybersecurity intersection, APT37 is also known as “Squid Werewolf.”
As usual, you can also use this squid post to talk about the security...Bruce Schneier From Schneier on Security | March 28, 2025 at 05:04 PM
This is a truly fascinating paper: “Trusted Machine Learning Models Unlock Private Inference for Problems Currently Infeasible with Cryptography.” The basic idea...Bruce Schneier From Schneier on Security | March 28, 2025 at 07:01 AM
NIST just released a comprehensive taxonomy of adversarial machine learning attacks and countermeasures.Bruce Schneier From Schneier on Security | March 27, 2025 at 07:00 AM
Cloudflare has a new feature—available to free users as well—that uses AI to generate random pages to feed to AI web crawlers:
Instead of simply blocking bots,...Bruce Schneier From Schneier on Security | March 26, 2025 at 07:07 AM
Citizen Lab has a new report on Paragon’s spyware:
Key Findings:
Introducing Paragon Solutions. Paragon Solutions was founded in Israel in 2019 and sells spyware...Bruce Schneier From Schneier on Security | March 25, 2025 at 07:05 AM
Last month I wrote about the UK forcing Apple to break its Advanced Data Protection encryption in iCloud. More recently, both Sweden and France are contemplating...Bruce Schneier From Schneier on Security | March 24, 2025 at 06:38 AM
New research:
An associate professor of chemistry and chemical biology at Northeastern University, Deravi’s recently published paper in the Journal of Materials...Bruce Schneier From Schneier on Security | March 21, 2025 at 04:30 PM
The Atlantic has a search tool that allows you to search for specific works in the “LibGen” database of copyrighted works that Meta used to train its AI models....Bruce Schneier From Schneier on Security | March 21, 2025 at 02:26 PM
The UK’s National Computer Security Center (part of GCHQ) released a timeline—also see their blog post—for migration to quantum-computer-resistant cryptography....Bruce Schneier From Schneier on Security | March 21, 2025 at 07:47 AM
This is serious:
A sophisticated cascading supply chain attack has compromised multiple GitHub Actions, exposing critical CI/CD secrets across tens of thousands...Bruce Schneier From Schneier on Security | March 20, 2025 at 11:14 AM
Really interesting research: “How WEIRD is Usable Privacy and Security Research?” by Ayako A. Hasegawa Daisuke Inoue, and Mitsuaki Akiyama:
Abstract: In human...Bruce Schneier From Schneier on Security | March 18, 2025 at 07:10 AM
New paper: “GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and TETRA: Brute Force Cryptanalysis of KASUMI, SPECK, and TEA3.”
Abstract: Key lengths...Bruce Schneier From Schneier on Security | March 17, 2025 at 11:09 AM