Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

schneier.com

Schneier on Security

Get the latest updates from Schneier on Security directly as they happen.

Follow now 2192 followers

Latest posts

Last updated about 10 hours ago

AIs as Trusted Third Parties

about 10 hours ago

This is a truly fascinating paper: “Trusted Machine Learning Models Unlock Private...

A Taxonomy of Adversarial Machine Learning Attacks and Mitigations

1 day ago

NIST just released a comprehensive taxonomy of adversarial machine learning attacks and...

AI Data Poisoning

2 days ago

Cloudflare has a new feature—available to free users as well—that uses AI...

Report on Paragon Spyware

3 days ago

Citizen Lab has a new report on Paragon’s spyware Key Findings: Introducing...

More Countries are Demanding Backdoors to Encrypted Apps

4 days ago

Last month, I wrote about the UK forcing Apple to break its...

Friday Squid Blogging: A New Explanation of Squid Camouflage

7 days ago

New research An associate professor of chemistry and chemical biology at Northeastern...

My Writings Are in the LibGen AI Training Corpus

7 days ago

The Atlantic has a search tool that allows you to search for...

NCSC Releases Post-Quantum Cryptography Timeline

7 days ago

The UK’s National Computer Security Center (part of GCHQ) released a timeline—also...

Critical GitHub Attack

8 days ago

This is serious A sophisticated cascading supply chain attack has compromised multiple...

Is Security Human Factors Research Skewed Towards Western Ideas and Habits?

10 days ago

Really interesting research: “How WEIRD is Usable Privacy and Security Research?” by...

Improvements in Brute Force Attacks

11 days ago

New paper: “GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and...

Friday Squid Blogging: SQUID Band

14 days ago

A bagpipe and drum band SQUID transforms traditional Bagpipe and Drum Band...