Lukasz Olejnik

@LukaszOlejnik
5.9K Followers
221 Following
2.4K Posts
Security & Privacy. Data protection. Research. Engineering. Strategy, communication. Analyst. Technology Policy. W3C standardisation. PhD (CS/privacy), LL.M (Information Technology Law). 
Consultant.
Reading & writing (scientific articles, sometimes op-eds, analyses, reports, books). Seems that I like it? 


email: me (at) lukaszolejnik.com. 

Books: https://lukaszolejnik.com/books


Twitter: @lukOlejnik
Sitehttps://lukaszolejnik.com
Bloghttps://blog.lukaszolejnik.com
Newsletterhttps://techletters.substack.com
Twitterhttps://twitter.com/lukOlejnik
According to "Emil Michael, the Pentagon’s chief technology officer", "Chinese open source models have infiltrated a lot of different companies". How does an AI model infiltrate a company? Raw model is not an agent. It does not sneak in, scan networks, or install itself.
I was the reviewer of the International Federation of Journalists's global study on journalist surveillance. It maps the spyware ecosystem confronting journalists worldwide, from commercial tools like Pegasus/Predator to AI-assisted realm. https://www.ifj.org/media-centre/news/detail/category/brave/article/global-ifj-study-exposes-worldwide-systemic-surveillance-of-journalists
Global IFJ study exposes worldwide systemic surveillance of journalists / IFJ

The International Federation of Journalists (IFJ), the world’s largest organisation of journalists, has launched a landmark investigative study on 28 April exposing how journalists across the globe are subject to a systemic infrastructure of control through increasingly sophisticated digital surveillance technologies. The study provides urgent recommendations to strengthen journalists’ security and protect the media.

A European Commission proposal could create one of Europe’s largest privacy and national-security risks in decades.

Through DMA enforcement, it may compel Google to hand over sensitive search data about millions of Europeans to third parties, including entities that could be used as fronts by hostile actors.

The privacy risk is serious. The national-security risk is real.

My analysis: https://techletters.substack.com/p/the-european-commission-is-turning
https://blog.lukaszolejnik.com/the-european-commission-is-turning-google-search-into-a-privacy-and-national-security-risk/

A European Commission proposal could create one of Europe’s largest privacy and national-security risks in decades.

Through DMA enforcement, it may compel Google to hand over sensitive search data about millions of Europeans to third parties, including entities that could be used as fronts by hostile actors.

The privacy risk is serious. The national-security risk is real.

My analysis: https://techletters.substack.com/p/the-european-commission-is-turning
https://blog.lukaszolejnik.com/the-european-commission-is-turning-google-search-into-a-privacy-and-national-security-risk/

Research shows that Chinese AI can reliably detect software vulnerabilities - and it is cost efficient. Kimi K2.5, an open-weight model was deployed in an agentic framework against Chrome and produced 10 previously unknown zero-days, including two critical sandbox-escape CVEs. The researchers noted it was cheaper to run than Claude Opus 4.6 at that scale. The most important word in the paper isn't "zero-day" -- it's "cheaper"? https://arxiv.org/pdf/2604.20801
A 4-star admiral told Congress the U.S. military runs a Bitcoin node to “secure networks” and endorsed Bitcoin as a “power projection” capability. The cryptographic primitives he cited like proof or work aren’t exactly earth shuttering in 2026. https://gooden.house.gov/2026/4/gooden-reveals-historic-u-s-military-use-of-bitcoin-node
Unauthorized users gained access to Claude Mythos Preview, a model with powerful cybersecurity capabilities Anthropic deliberately kept behind a restricted pilot program. They used the access to the most powerful cybrsecurity AI model to... build websites. https://www.bloomberg.com/news/articles/2026-04-21/anthropic-s-mythos-model-is-being-accessed-by-unauthorized-users

🧵 1/more

Nomen Nescio friends & me went a-hunting in the 3rd district of Vienna. Expected to discover another #SIGINT station on the Russian embassy to Austria. Surprise: we found a sat relay station

cc @mattblaze @ai6yr

https://www.golem.de/news/satellitenspionage-eine-relaisstation-fuer-putins-afrikakorps-2604-207591.html

Satellitenspionage: Eine Relaisstation für Putins Afrikakorps - Golem.de

Mit Antennen auf Botschaftsgebäuden in Wien funkt Russland zum Afrikakorps und spioniert Datenverkehr aus. Österreichs Regierung will das unterbinden - mit mäßigen Erfolgschancen.

Golem.de
Experience suggests that an increase of savagery in warfare is apt to follow new developments - technical or political - which unsettle the existing order. The advent of AI-driven and lethal autonomous weapons systems may be no exception.
$2,283 in tokens and ~20 hours of work to produce one a Chrome exploit chain is cheap when compared to the weeks of focused human effort it would normally take. https://www.hacktron.ai/blog/i-let-claude-opus-to-write-me-a-chrome-exploit