Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

schneier.com

Schneier on Security

Get the latest updates from Schneier on Security directly as they happen.

Follow now 2191 followers

Latest posts

Last updated about 11 hours ago

How to Leak to a Journalist

about 11 hours ago

Neiman Lab has some good advice on how to leak a story...

Arguing Against CALEA

1 day ago

At a Congressional hearing earlier this week, Matt Blaze made the point...

DIRNSA Fired

2 days ago

In “Secrets and Lies” (2000), I wrote It is poor civic hygiene...

Friday Squid Blogging: Two-Man Giant Squid

5 days ago

The Brooklyn indie art-punk group, Two-Man Giant Squid, just released a new...

Troy Hunt Gets Phished

5 days ago

In case you need proof that anyone, even people who do cybersecurity...

Web 3.0 Requires Data Integrity

6 days ago

If you’ve ever taken a computer security class, you’ve probably learned about...

Rational Astrologies and Security

7 days ago

John Kelsey and I wrote a short paper for the Rossfest Festschrift...

Cell Phone OPSEC for Border Crossings

8 days ago

I have heard stories of more aggressive interrogation of electronic devices at...

The Signal Chat Leak and the NSA

9 days ago

US National Security Advisor Mike Waltz, who started the now-infamous group chat...

Friday Squid Blogging: Squid Werewolf Hacking Group

12 days ago

In another rare squid/cybersecurity intersection, APT37 is also known as “Squid Werewolf.”...

AIs as Trusted Third Parties

12 days ago

This is a truly fascinating paper: “Trusted Machine Learning Models Unlock Private...

A Taxonomy of Adversarial Machine Learning Attacks and Mitigations

13 days ago

NIST just released a comprehensive taxonomy of adversarial machine learning attacks and...