Robuta

Sponsor of the Day: Jerkmate
https://www.schneier.com/tag/social-media/ social media Archives - Schneier on Security social media archivesschneiersecurity https://www.schneier.com/blog/archives/2026/04/google-wants-to-transition-to-post-quantum-cryptography-by-2029.html Google Wants to Transition to Post-Quantum Cryptography by 2029 - Schneier on Security Apr 6, 2026 - Google says that it will fully transition to post-quantum cryptography by 2029. I think this is a good move, not because I think we will have a useful quantum... post quantum cryptographygoogle wantstransition2029schneier https://www.schneier.com/blog/archives/2026/03/friday-squid-blogging-increased-squid-population-in-the-falklands.html Friday Squid Blogging: Increased Squid Population in the Falklands - Schneier on Security Some good news: squid stocks seem to be recovering in the waters off the Falkland Islands. As usual, you can also use this squid post to talk about the... friday squid bloggingincreasedpopulationfalklandsschneier https://www.schneier.com/blog/archives/2026/04/python-supply-chain-compromise.html Python Supply-Chain Compromise - Schneier on Security Apr 8, 2026 - This is news: A malicious supply chain compromise has been identified in the Python Package Index package litellm version 1.82.8. The published wheel contains... supply chain compromisepythonschneiersecurity https://www.schneier.com/blog/archives/2026/03/south-korean-police-accidentally-post-cryptocurrency-wallet-password.html South Korean Police Accidentally Post Cryptocurrency Wallet Password - Schneier on Security An expensive mistake: Someone jumped at the opportunity to steal $4.4 million in crypto assets after South Korea’s National Tax Service exposed publicly the... south korean policecryptocurrency walletaccidentallypostpassword https://www.schneier.com/blog/archives/2026/04/friday-squid-blogging-jurassic-fish-chokes-on-squid.html Friday Squid Blogging: Jurassic Fish Chokes on Squid - Schneier on Security Here’s a fossil of a 150-million year old fish that choked to death on a belemnite rostrum: the hard, internal shell of an extinct, squid-like animal. Original... friday squid bloggingjurassic fishschneier securitychokes https://cloud.withgoogle.com/cloudsecurity/podcast/ep256-rewiring-democracy-hacking-trust-bruce-schneier-on-the-ai-offense-defense-balance/ EP256 Rewiring Democracy & Hacking Trust: Bruce Schneier on the AI Offense-Defense Balance The Cloud Security Podcast from Google is a weekly news and interview show with insights from the cloud security community. bruce schneieroffense defenserewiringdemocracyhacking https://www.schneier.com/blog/archives/2026/04/hong-kong-police-can-force-you-to-reveal-your-encryption-keys.html Hong Kong Police Can Force You to Reveal Your Encryption Keys - Schneier on Security Apr 7, 2026 - According to a new law, the Hong Kong police can demand that you reveal the encryption keys protecting your computer, phone, hard drives, etc.—even if you are... hong kong policeencryption keysforcerevealschneier https://www.grubstreet.com/author/matthew-schneier/?start=50 Matthew Schneier Author Archive View an archive of articles by Matthew Schneier for Grub Street. author archivematthewschneier https://www.schneier.com/wp-login.php?redirect_to=https%3A%2F%2Fwww.schneier.com%2Fblog%2Farchives%2F2025%2F10%2Fagentic-ais-ooda-loop-problem.html Log In ‹ Schneier on Security — WordPress logschneiersecuritywordpress https://www.schneier.com/tag/vulnerabilities/ vulnerabilities Archives - Schneier on Security vulnerabilities archivesschneiersecurity https://www.schneier.com/essays/archives/2025/11/four-ways-ai-is-being-used-to-strengthen-democracies-worldwide.html Four Ways AI Is Being Used to Strengthen Democracies Worldwide - Schneier on Security Jan 22, 2026 - Democracy is colliding with the technologies of artificial intelligence. Judging from the audience reaction at the recent World Forum on Democracy in... four waysaiusedstrengthendemocracies https://www.schneier.com/blog/archives/2025/12/substitution-cipher-based-on-the-voynich-manuscript.html Substitution Cipher Based on The Voynich Manuscript - Schneier on Security Here’s a fun paper: “The Naibbe cipher: a substitution cipher that encrypts Latin and Italian as Voynich Manuscript-like ciphertext“: Abstract: In this... voynich manuscriptschneier securitysubstitutioncipherbased https://www.schneier.com/blog/archives/2025/10/social-engineering-peoples-credit-card-details.html Social Engineering People's Credit Card Details - Schneier on Security Good Wall Street Journal article on criminal gangs that scam people out of their credit card information: Your highway toll payment is now past due, one text... social engineeringcredit cardpeopledetailsschneier https://www.schneier.com/blog/newcomments.html/ Schneier on Security - schneiersecurity https://www.schneier.com/essays/archives/2005/09/terrorists_dont_do_m.html Terrorists Don't Do Movie Plots - Schneier on Security Jan 27, 2020 - Sometimes it seems like the people in charge of homeland security spend too much time watching action movies. They defend against specific movie plots instead... terroristsmovieplotsschneiersecurity https://www.schneier.com/tag/anonymous/ Anonymous Archives - Schneier on Security anonymous archivesschneiersecurity https://www.schneier.com/academic/twofish/ Twofish - Schneier on Security Nov 7, 2022 - Twofish is a block cipher by Counterpane Labs, published in 1998. It was one of the five Advanced Encryption Standard (AES) finalists, and was not selected as... twofishschneiersecurity https://www.schneier.com/books/liars-and-outliers/ Liars and Outliers - Schneier on Security Nov 21, 2025 - Liars and Outliers Enabling the Trust that Society Needs to Thrive A book by Bruce Schneier We don’t demand a background check on the plumber who shows up to... liarsoutliersschneiersecurity https://www.schneier.com/blog/archives/2014/04/heartbleed.html Heartbleed - Schneier on Security Jun 22, 2020 - Heartbleed is a catastrophic bug in OpenSSL: “The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable... heartbleedschneiersecurity https://www.schneier.com/blog/archives/2026/03/friday-squid-blogging-bioluminescent-bacteria-in-squid.html Friday Squid Blogging: Bioluminescent Bacteria in Squid - Schneier on Security Mar 28, 2026 - The Hawaiian bobtail squid has bioluminescent bacteria. friday squid bloggingbioluminescentbacteriaschneiersecurity https://krebsonsecurity.com/tag/bruce-schneier/ Bruce Schneier – Krebs on Security bruce schneierkrebssecurity https://www.schneier.com/blog/archives/2013/10/how_the_nsa_att.html How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID - Schneier on Security Jun 22, 2020 - The online anonymity network Tor is a high-priority target for the National Security Agency. The work of attacking Tor is done by the NSA‘s application... nsaattackstorfirefoxusers https://www.schneier.com/blog/archives/2026/04/on-anthropics-mythos-preview-and-project-glasswing.html On Anthropic's Mythos Preview and Project Glasswing - Schneier on Security Apr 13, 2026 - The cybersecurity industry is obsessing over Anthropic’s new model, Claude Mythos Preview, and its effects on cybersecurity. Anthropic said that it is not... mythos previewproject glasswingschneier securityanthropic https://www.schneier.com/ Schneier on Security - schneiersecurity https://www.schneier.com/blog/archives/2024/04/xz-utils-backdoor.html XZ Utils Backdoor - Schneier on Security Apr 10, 2024 - The cybersecurity world got really lucky last week. An intentionally placed backdoor in XZ Utils, an open-source compression utility, was pretty much... xz utils backdoorschneiersecurity https://www.schneier.com/blog/archives/2015/08/security_for_th.html Security for the Rest of Us - Schneier on Security Jan 27, 2020 - Good fictional account of an average computer user and how people understand and view security. Related: “Real World Use Cases for High-Risk Users.” securityrestusschneier https://www.schneier.com/talks/ Talks Archive - Schneier on Security talks archiveschneiersecurity https://www.schneier.com/blog/archives/2026/03/microsoft-xbox-hacked.html Microsoft Xbox One Hacked - Schneier on Security Mar 23, 2026 - It’s an impressive feat, over a decade after the box was released: Since reset glitching wasn’t possible, Gaasedelen thought some voltage glitching could do... microsoft xbox onehackedschneiersecurity https://www.schneier.com/blog/archives/2026/03/apples-camera-indicator-lights.html Apple's Camera Indicator Lights - Schneier on Security A thoughtful review of Apple’s system to alert users that the camera is on. It’s really well-designed, and important in a world where malware could... indicator lightsapplecameraschneiersecurity https://www.schneierfacts.com/ Bruce Schneier Facts Things you might not know about cryptographer and security expert Bruce Schneier bruce schneierfacts https://www.schneier.com/blog/archives/2026/03/proton-mail-shared-user-information-with-the-police.html Proton Mail Shared User Information with the Police - Schneier on Security 404 Media has a story about Proton Mail giving subscriber data to the Swiss government, who passed the information to the FBI. It’s metadata—payment... proton mailshared userinformationpoliceschneier https://www.schneier.com/blog/archives/2026/04/on-microsofts-lousy-cloud-security.html On Microsoft's Lousy Cloud Security - Schneier on Security Apr 9, 2026 - ProPublica has a scoop: In late 2024, the federal government’s cybersecurity evaluators rendered a troubling verdict on one of Microsoft’s biggest cloud... cloud securitymicrosoftlousyschneier https://www.unaoc.org/2011/03/rabbi-arthur-schneier/ Rabbi Arthur Schneier | UNAOC Jan 31, 2020 - Rabbi Arthur Schneier is internationally known for his leadership on behalf of religious freedom, human rights and inter-religious dialogue. Yeshiva rabbiarthurschneierunaoc https://www.schneier.com/tag/adware/ adware Archives - Schneier on Security archives schneieradwaresecurity https://www.schneier.com/blog/archives/2026/03/hacking-a-robot-vacuum.html Hacking a Robot Vacuum - Schneier on Security Someone tries to remote control his own DJI Romo vacuum, and ends up controlling 7,000 of them from all around the world. The IoT is horribly insecure, but we... robot vacuumhackingschneiersecurity https://www.schneier.com/essays/archives/2016/03/data_is_a_toxic_asse.html Data Is a Toxic Asset, So Why Not Throw It Out? - Schneier on Security Jan 22, 2026 - Thefts of personal information aren’t unusual. Every week, thieves break into networks and steal data about people, often tens of millions at a time. Most of... toxic assetdatathrowschneiersecurity https://www.schneier.com/blog/archives/2026/04/possible-us-government-iphone-hacking-tool-leaked.html Possible US Government iPhone Hacking Tool Leaked - Schneier on Security Apr 2, 2026 - Wired writes (alternate source): Security researchers at Google on Tuesday released a report describing what they’re calling “Coruna,” a highly sophisticated... possible usiphone hackinggovernmenttoolleaked https://henryfarrell.net/tag/with-bruce-schneier/ with Bruce Schneier – Henry Farrell bruce schneierhenry farrell https://www.schneier.com/blog/archives/2026/03/sen-wyden-warns-of-another-section-702-abuse.html Sen. Wyden Warns of Another Section 702 Abuse - Schneier on Security Mar 25, 2026 - Sen. Ron Wyden is warning us of an abuse of Section 702: Wyden took to the Senate floor to deliver a lengthy speech, ostensibly about the since approved (with... sen wydensection 702warnsanotherabuse https://www.schneier.com/essays/archives/2006/12/myspace_passwords_ar.html MySpace Passwords Aren't So Dumb - Schneier on Security Jan 27, 2020 - How good are the passwords people are choosing to protect their computers and online accounts? It’s a hard question to answer because data is scarce. But... myspacepasswordsdumbschneiersecurity https://www.schneier.com/blog/archives/2026/03/inventors-of-quantum-cryptography-win-turing-award.html Inventors of Quantum Cryptography Win Turing Award - Schneier on Security Apr 1, 2026 - Charles Bennett and Gilles Brassard have won the 2026 Turing Award for inventing quantum cryptography. I am incredibly pleased to see them get this... quantum cryptographyturing awardinventorswinschneier https://www.schneier.com/blog/archives/2017/03/using_intels_sg.html Using Intel's SGX to Attack Itself - Schneier on Security Jan 27, 2020 - Researchers have demonstrated using Intel’s Software Guard Extensions to hide malware and steal cryptographic keys from inside SGX’s protected enclave: Malware... using intelsgxattackschneiersecurity https://www.schneier.com/blog/archives/2026/04/company-that-secretly-records-and-publishes-zoom-meetings.html Company that Secretly Records and Publishes Zoom Meetings - Schneier on Security Apr 3, 2026 - WebinarTV searches the internet for public Zoom invites, joins the meetings, secretly records them, and publishes (alternate link) the recordings. It doesn’t... secretly recordszoom meetingscompanypublishesschneier https://www.schneier.com/essays/archives/2023/12/ai-and-trust.html AI and Trust - Schneier on Security Jan 22, 2026 - German translation Italian translation I trusted a lot today. I trusted my phone to wake me on time. I trusted Uber to arrange a taxi for me, and the driver to... aitrustschneiersecurity https://www.schneier.com/crypto-gram/ Crypto-Gram Newsletter - Schneier on Security Nov 25, 2019 - Crypto-Gram is a free monthly e-mail digest of posts from Bruce Schneier’s Schneier on Security blog. Subscribe Unsubscribe Archives Translations Other Formats... cryptogramnewsletterschneiersecurity https://www.schneier.com/blog/archives/2026/03/academia-and-the-ai-brain-drain.html Academia and the "AI Brain Drain" - Schneier on Security In 2025, Google, Amazon, Microsoft and Meta collectively spent US$380 billion on building artificial-intelligence tools. That number is expected to surge still... ai brainacademiadrainschneiersecurity https://www.schneier.com/blog/archives/2026/02/the-promptware-kill-chain.html The Promptware Kill Chain - Schneier on Security Mar 14, 2026 - Attacks against modern generative artificial intelligence (AI) large language models (LLMs) pose a real threat. Yet discussions around these attacks and their... promptware kill chainschneiersecurity https://www.schneier.com/blog/archives/2026/04/human-trust-of-ai-agents.html Human Trust of AI Agents - Schneier on Security Apr 16, 2026 - Interesting research: “Humans expect rationality and cooperation from LLM opponents in strategic games.” Abstract: As Large Language Models (LLMs) integrate... human trustai agentsschneiersecurity https://www.schneier.com/blog/archives/2026/03/as-the-us-midterms-approach-ai-is-going-to-emerge-as-a-key-issue-concerning-voters.html As the US Midterms Approach, AI Is Going to Emerge as a Key Issue Concerning Voters - Schneier on... Mar 27, 2026 - In December, the Trump administration signed an executive order that neutered states’ ability to regulate AI by ordering his administration to both sue and... us midtermsapproach aikey issuegoingemerge https://www.schneier.com/blog/archives/2026/03/metas-ai-glasses-and-privacy.html Meta's AI Glasses and Privacy - Schneier on Security Surprising no one, Meta’s new AI glasses are a privacy disaster. I’m not sure what can be done here. This is a technology that will exist, whether we like it... ai glassesmetaprivacyschneiersecurity https://www.grubstreet.com/author/matthew-schneier/ Matthew Schneier Author Archive View an archive of articles by Matthew Schneier for Grub Street. author archivematthewschneier