Sponsor of the Day:
Jerkmate
https://www.schneier.com/tag/social-media/
social media Archives - Schneier on Security
social media archivesschneiersecurity
https://www.schneier.com/blog/archives/2026/04/google-wants-to-transition-to-post-quantum-cryptography-by-2029.html
Google Wants to Transition to Post-Quantum Cryptography by 2029 - Schneier on Security
Apr 6, 2026 - Google says that it will fully transition to post-quantum cryptography by 2029. I think this is a good move, not because I think we will have a useful quantum...
post quantum cryptographygoogle wantstransition2029schneier
https://www.schneier.com/blog/archives/2026/03/friday-squid-blogging-increased-squid-population-in-the-falklands.html
Friday Squid Blogging: Increased Squid Population in the Falklands - Schneier on Security
Some good news: squid stocks seem to be recovering in the waters off the Falkland Islands. As usual, you can also use this squid post to talk about the...
friday squid bloggingincreasedpopulationfalklandsschneier
https://www.schneier.com/blog/archives/2026/04/python-supply-chain-compromise.html
Python Supply-Chain Compromise - Schneier on Security
Apr 8, 2026 - This is news: A malicious supply chain compromise has been identified in the Python Package Index package litellm version 1.82.8. The published wheel contains...
supply chain compromisepythonschneiersecurity
https://www.schneier.com/blog/archives/2026/03/south-korean-police-accidentally-post-cryptocurrency-wallet-password.html
South Korean Police Accidentally Post Cryptocurrency Wallet Password - Schneier on Security
An expensive mistake: Someone jumped at the opportunity to steal $4.4 million in crypto assets after South Korea’s National Tax Service exposed publicly the...
south korean policecryptocurrency walletaccidentallypostpassword
https://www.schneier.com/blog/archives/2026/04/friday-squid-blogging-jurassic-fish-chokes-on-squid.html
Friday Squid Blogging: Jurassic Fish Chokes on Squid - Schneier on Security
Here’s a fossil of a 150-million year old fish that choked to death on a belemnite rostrum: the hard, internal shell of an extinct, squid-like animal. Original...
friday squid bloggingjurassic fishschneier securitychokes
https://cloud.withgoogle.com/cloudsecurity/podcast/ep256-rewiring-democracy-hacking-trust-bruce-schneier-on-the-ai-offense-defense-balance/
EP256 Rewiring Democracy & Hacking Trust: Bruce Schneier on the AI Offense-Defense Balance
The Cloud Security Podcast from Google is a weekly news and interview show with insights from the cloud security community.
bruce schneieroffense defenserewiringdemocracyhacking
https://www.schneier.com/blog/archives/2026/04/hong-kong-police-can-force-you-to-reveal-your-encryption-keys.html
Hong Kong Police Can Force You to Reveal Your Encryption Keys - Schneier on Security
Apr 7, 2026 - According to a new law, the Hong Kong police can demand that you reveal the encryption keys protecting your computer, phone, hard drives, etc.—even if you are...
hong kong policeencryption keysforcerevealschneier
https://www.grubstreet.com/author/matthew-schneier/?start=50
Matthew Schneier Author Archive
View an archive of articles by Matthew Schneier for Grub Street.
author archivematthewschneier
https://www.schneier.com/wp-login.php?redirect_to=https%3A%2F%2Fwww.schneier.com%2Fblog%2Farchives%2F2025%2F10%2Fagentic-ais-ooda-loop-problem.html
Log In ‹ Schneier on Security — WordPress
logschneiersecuritywordpress
https://www.schneier.com/tag/vulnerabilities/
vulnerabilities Archives - Schneier on Security
vulnerabilities archivesschneiersecurity
https://www.schneier.com/essays/archives/2025/11/four-ways-ai-is-being-used-to-strengthen-democracies-worldwide.html
Four Ways AI Is Being Used to Strengthen Democracies Worldwide - Schneier on Security
Jan 22, 2026 - Democracy is colliding with the technologies of artificial intelligence. Judging from the audience reaction at the recent World Forum on Democracy in...
four waysaiusedstrengthendemocracies
https://www.schneier.com/blog/archives/2025/12/substitution-cipher-based-on-the-voynich-manuscript.html
Substitution Cipher Based on The Voynich Manuscript - Schneier on Security
Here’s a fun paper: “The Naibbe cipher: a substitution cipher that encrypts Latin and Italian as Voynich Manuscript-like ciphertext“: Abstract: In this...
voynich manuscriptschneier securitysubstitutioncipherbased
https://www.schneier.com/blog/archives/2025/10/social-engineering-peoples-credit-card-details.html
Social Engineering People's Credit Card Details - Schneier on Security
Good Wall Street Journal article on criminal gangs that scam people out of their credit card information: Your highway toll payment is now past due, one text...
social engineeringcredit cardpeopledetailsschneier
https://www.schneier.com/blog/newcomments.html/
Schneier on Security -
schneiersecurity
https://www.schneier.com/essays/archives/2005/09/terrorists_dont_do_m.html
Terrorists Don't Do Movie Plots - Schneier on Security
Jan 27, 2020 - Sometimes it seems like the people in charge of homeland security spend too much time watching action movies. They defend against specific movie plots instead...
terroristsmovieplotsschneiersecurity
https://www.schneier.com/tag/anonymous/
Anonymous Archives - Schneier on Security
anonymous archivesschneiersecurity
https://www.schneier.com/academic/twofish/
Twofish - Schneier on Security
Nov 7, 2022 - Twofish is a block cipher by Counterpane Labs, published in 1998. It was one of the five Advanced Encryption Standard (AES) finalists, and was not selected as...
twofishschneiersecurity
https://www.schneier.com/books/liars-and-outliers/
Liars and Outliers - Schneier on Security
Nov 21, 2025 - Liars and Outliers Enabling the Trust that Society Needs to Thrive A book by Bruce Schneier We don’t demand a background check on the plumber who shows up to...
liarsoutliersschneiersecurity
https://www.schneier.com/blog/archives/2014/04/heartbleed.html
Heartbleed - Schneier on Security
Jun 22, 2020 - Heartbleed is a catastrophic bug in OpenSSL: “The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable...
heartbleedschneiersecurity
https://www.schneier.com/blog/archives/2026/03/friday-squid-blogging-bioluminescent-bacteria-in-squid.html
Friday Squid Blogging: Bioluminescent Bacteria in Squid - Schneier on Security
Mar 28, 2026 - The Hawaiian bobtail squid has bioluminescent bacteria.
friday squid bloggingbioluminescentbacteriaschneiersecurity
https://krebsonsecurity.com/tag/bruce-schneier/
Bruce Schneier – Krebs on Security
bruce schneierkrebssecurity
https://www.schneier.com/blog/archives/2013/10/how_the_nsa_att.html
How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID - Schneier on Security
Jun 22, 2020 - The online anonymity network Tor is a high-priority target for the National Security Agency. The work of attacking Tor is done by the NSA‘s application...
nsaattackstorfirefoxusers
https://www.schneier.com/blog/archives/2026/04/on-anthropics-mythos-preview-and-project-glasswing.html
On Anthropic's Mythos Preview and Project Glasswing - Schneier on Security
Apr 13, 2026 - The cybersecurity industry is obsessing over Anthropic’s new model, Claude Mythos Preview, and its effects on cybersecurity. Anthropic said that it is not...
mythos previewproject glasswingschneier securityanthropic
https://www.schneier.com/
Schneier on Security -
schneiersecurity
https://www.schneier.com/blog/archives/2024/04/xz-utils-backdoor.html
XZ Utils Backdoor - Schneier on Security
Apr 10, 2024 - The cybersecurity world got really lucky last week. An intentionally placed backdoor in XZ Utils, an open-source compression utility, was pretty much...
xz utils backdoorschneiersecurity
https://www.schneier.com/blog/archives/2015/08/security_for_th.html
Security for the Rest of Us - Schneier on Security
Jan 27, 2020 - Good fictional account of an average computer user and how people understand and view security. Related: “Real World Use Cases for High-Risk Users.”
securityrestusschneier
https://www.schneier.com/talks/
Talks Archive - Schneier on Security
talks archiveschneiersecurity
https://www.schneier.com/blog/archives/2026/03/microsoft-xbox-hacked.html
Microsoft Xbox One Hacked - Schneier on Security
Mar 23, 2026 - It’s an impressive feat, over a decade after the box was released: Since reset glitching wasn’t possible, Gaasedelen thought some voltage glitching could do...
microsoft xbox onehackedschneiersecurity
https://www.schneier.com/blog/archives/2026/03/apples-camera-indicator-lights.html
Apple's Camera Indicator Lights - Schneier on Security
A thoughtful review of Apple’s system to alert users that the camera is on. It’s really well-designed, and important in a world where malware could...
indicator lightsapplecameraschneiersecurity
https://www.schneierfacts.com/
Bruce Schneier Facts
Things you might not know about cryptographer and security expert Bruce Schneier
bruce schneierfacts
https://www.schneier.com/blog/archives/2026/03/proton-mail-shared-user-information-with-the-police.html
Proton Mail Shared User Information with the Police - Schneier on Security
404 Media has a story about Proton Mail giving subscriber data to the Swiss government, who passed the information to the FBI. It’s metadata—payment...
proton mailshared userinformationpoliceschneier
https://www.schneier.com/blog/archives/2026/04/on-microsofts-lousy-cloud-security.html
On Microsoft's Lousy Cloud Security - Schneier on Security
Apr 9, 2026 - ProPublica has a scoop: In late 2024, the federal government’s cybersecurity evaluators rendered a troubling verdict on one of Microsoft’s biggest cloud...
cloud securitymicrosoftlousyschneier
https://www.unaoc.org/2011/03/rabbi-arthur-schneier/
Rabbi Arthur Schneier | UNAOC
Jan 31, 2020 - Rabbi Arthur Schneier is internationally known for his leadership on behalf of religious freedom, human rights and inter-religious dialogue. Yeshiva
rabbiarthurschneierunaoc
https://www.schneier.com/tag/adware/
adware Archives - Schneier on Security
archives schneieradwaresecurity
https://www.schneier.com/blog/archives/2026/03/hacking-a-robot-vacuum.html
Hacking a Robot Vacuum - Schneier on Security
Someone tries to remote control his own DJI Romo vacuum, and ends up controlling 7,000 of them from all around the world. The IoT is horribly insecure, but we...
robot vacuumhackingschneiersecurity
https://www.schneier.com/essays/archives/2016/03/data_is_a_toxic_asse.html
Data Is a Toxic Asset, So Why Not Throw It Out? - Schneier on Security
Jan 22, 2026 - Thefts of personal information aren’t unusual. Every week, thieves break into networks and steal data about people, often tens of millions at a time. Most of...
toxic assetdatathrowschneiersecurity
https://www.schneier.com/blog/archives/2026/04/possible-us-government-iphone-hacking-tool-leaked.html
Possible US Government iPhone Hacking Tool Leaked - Schneier on Security
Apr 2, 2026 - Wired writes (alternate source): Security researchers at Google on Tuesday released a report describing what they’re calling “Coruna,” a highly sophisticated...
possible usiphone hackinggovernmenttoolleaked
https://henryfarrell.net/tag/with-bruce-schneier/
with Bruce Schneier – Henry Farrell
bruce schneierhenry farrell
https://www.schneier.com/blog/archives/2026/03/sen-wyden-warns-of-another-section-702-abuse.html
Sen. Wyden Warns of Another Section 702 Abuse - Schneier on Security
Mar 25, 2026 - Sen. Ron Wyden is warning us of an abuse of Section 702: Wyden took to the Senate floor to deliver a lengthy speech, ostensibly about the since approved (with...
sen wydensection 702warnsanotherabuse
https://www.schneier.com/essays/archives/2006/12/myspace_passwords_ar.html
MySpace Passwords Aren't So Dumb - Schneier on Security
Jan 27, 2020 - How good are the passwords people are choosing to protect their computers and online accounts? It’s a hard question to answer because data is scarce. But...
myspacepasswordsdumbschneiersecurity
https://www.schneier.com/blog/archives/2026/03/inventors-of-quantum-cryptography-win-turing-award.html
Inventors of Quantum Cryptography Win Turing Award - Schneier on Security
Apr 1, 2026 - Charles Bennett and Gilles Brassard have won the 2026 Turing Award for inventing quantum cryptography. I am incredibly pleased to see them get this...
quantum cryptographyturing awardinventorswinschneier
https://www.schneier.com/blog/archives/2017/03/using_intels_sg.html
Using Intel's SGX to Attack Itself - Schneier on Security
Jan 27, 2020 - Researchers have demonstrated using Intel’s Software Guard Extensions to hide malware and steal cryptographic keys from inside SGX’s protected enclave: Malware...
using intelsgxattackschneiersecurity
https://www.schneier.com/blog/archives/2026/04/company-that-secretly-records-and-publishes-zoom-meetings.html
Company that Secretly Records and Publishes Zoom Meetings - Schneier on Security
Apr 3, 2026 - WebinarTV searches the internet for public Zoom invites, joins the meetings, secretly records them, and publishes (alternate link) the recordings. It doesn’t...
secretly recordszoom meetingscompanypublishesschneier
https://www.schneier.com/essays/archives/2023/12/ai-and-trust.html
AI and Trust - Schneier on Security
Jan 22, 2026 - German translation Italian translation I trusted a lot today. I trusted my phone to wake me on time. I trusted Uber to arrange a taxi for me, and the driver to...
aitrustschneiersecurity
https://www.schneier.com/crypto-gram/
Crypto-Gram Newsletter - Schneier on Security
Nov 25, 2019 - Crypto-Gram is a free monthly e-mail digest of posts from Bruce Schneier’s Schneier on Security blog. Subscribe Unsubscribe Archives Translations Other Formats...
cryptogramnewsletterschneiersecurity
https://www.schneier.com/blog/archives/2026/03/academia-and-the-ai-brain-drain.html
Academia and the "AI Brain Drain" - Schneier on Security
In 2025, Google, Amazon, Microsoft and Meta collectively spent US$380 billion on building artificial-intelligence tools. That number is expected to surge still...
ai brainacademiadrainschneiersecurity
https://www.schneier.com/blog/archives/2026/02/the-promptware-kill-chain.html
The Promptware Kill Chain - Schneier on Security
Mar 14, 2026 - Attacks against modern generative artificial intelligence (AI) large language models (LLMs) pose a real threat. Yet discussions around these attacks and their...
promptware kill chainschneiersecurity
https://www.schneier.com/blog/archives/2026/04/human-trust-of-ai-agents.html
Human Trust of AI Agents - Schneier on Security
Apr 16, 2026 - Interesting research: “Humans expect rationality and cooperation from LLM opponents in strategic games.” Abstract: As Large Language Models (LLMs) integrate...
human trustai agentsschneiersecurity
https://www.schneier.com/blog/archives/2026/03/as-the-us-midterms-approach-ai-is-going-to-emerge-as-a-key-issue-concerning-voters.html
As the US Midterms Approach, AI Is Going to Emerge as a Key Issue Concerning Voters - Schneier on...
Mar 27, 2026 - In December, the Trump administration signed an executive order that neutered states’ ability to regulate AI by ordering his administration to both sue and...
us midtermsapproach aikey issuegoingemerge
https://www.schneier.com/blog/archives/2026/03/metas-ai-glasses-and-privacy.html
Meta's AI Glasses and Privacy - Schneier on Security
Surprising no one, Meta’s new AI glasses are a privacy disaster. I’m not sure what can be done here. This is a technology that will exist, whether we like it...
ai glassesmetaprivacyschneiersecurity
https://www.grubstreet.com/author/matthew-schneier/
Matthew Schneier Author Archive
View an archive of articles by Matthew Schneier for Grub Street.
author archivematthewschneier