Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

schneier.com

Schneier on Security

Get the latest updates from Schneier on Security directly as they happen.

Follow now 2191 followers

Latest posts

Last updated about 20 hours ago

Rational Astrologies and Security

about 20 hours ago

John Kelsey and I wrote a short paper for the Rossfest Festschrift...

Cell Phone OPSEC for Border Crossings

2 days ago

I have heard stories of more aggressive interrogation of electronic devices at...

The Signal Chat Leak and the NSA

3 days ago

US National Security Advisor Mike Waltz, who started the now-infamous group chat...

Friday Squid Blogging: Squid Werewolf Hacking Group

5 days ago

In another rare squid/cybersecurity intersection, APT37 is also known as “Squid Werewolf.”...

AIs as Trusted Third Parties

6 days ago

This is a truly fascinating paper: “Trusted Machine Learning Models Unlock Private...

A Taxonomy of Adversarial Machine Learning Attacks and Mitigations

7 days ago

NIST just released a comprehensive taxonomy of adversarial machine learning attacks and...

AI Data Poisoning

8 days ago

Cloudflare has a new feature—available to free users as well—that uses AI...

Report on Paragon Spyware

9 days ago

Citizen Lab has a new report on Paragon’s spyware Key Findings: Introducing...

More Countries are Demanding Backdoors to Encrypted Apps

10 days ago

Last month, I wrote about the UK forcing Apple to break its...

Friday Squid Blogging: A New Explanation of Squid Camouflage

12 days ago

New research An associate professor of chemistry and chemical biology at Northeastern...

My Writings Are in the LibGen AI Training Corpus

13 days ago

The Atlantic has a search tool that allows you to search for...

NCSC Releases Post-Quantum Cryptography Timeline

13 days ago

The UK’s National Computer Security Center (part of GCHQ) released a timeline—also...