Lukasz Olejnik

@LukaszOlejnik
5.9K Followers
221 Following
2.4K Posts
Security & Privacy. Data protection. Research. Engineering. Strategy, communication. Analyst. Technology Policy. W3C standardisation. PhD (CS/privacy), LL.M (Information Technology Law). 
Consultant.
Reading & writing (scientific articles, sometimes op-eds, analyses, reports, books). Seems that I like it? 


email: me (at) lukaszolejnik.com. 

Books: https://lukaszolejnik.com/books


Twitter: @lukOlejnik
Sitehttps://lukaszolejnik.com
Bloghttps://blog.lukaszolejnik.com
Newsletterhttps://techletters.substack.com
Twitterhttps://twitter.com/lukOlejnik

A European Commission proposal could create one of Europe’s largest privacy and national-security risks in decades.

Through DMA enforcement, it may compel Google to hand over sensitive search data about millions of Europeans to third parties, including entities that could be used as fronts by hostile actors.

The privacy risk is serious. The national-security risk is real.

My analysis: https://techletters.substack.com/p/the-european-commission-is-turning
https://blog.lukaszolejnik.com/the-european-commission-is-turning-google-search-into-a-privacy-and-national-security-risk/

Research shows that Chinese AI can reliably detect software vulnerabilities - and it is cost efficient. Kimi K2.5, an open-weight model was deployed in an agentic framework against Chrome and produced 10 previously unknown zero-days, including two critical sandbox-escape CVEs. The researchers noted it was cheaper to run than Claude Opus 4.6 at that scale. The most important word in the paper isn't "zero-day" -- it's "cheaper"? https://arxiv.org/pdf/2604.20801
A 4-star admiral told Congress the U.S. military runs a Bitcoin node to “secure networks” and endorsed Bitcoin as a “power projection” capability. The cryptographic primitives he cited like proof or work aren’t exactly earth shuttering in 2026. https://gooden.house.gov/2026/4/gooden-reveals-historic-u-s-military-use-of-bitcoin-node
Unauthorized users gained access to Claude Mythos Preview, a model with powerful cybersecurity capabilities Anthropic deliberately kept behind a restricted pilot program. They used the access to the most powerful cybrsecurity AI model to... build websites. https://www.bloomberg.com/news/articles/2026-04-21/anthropic-s-mythos-model-is-being-accessed-by-unauthorized-users

🧵 1/more

Nomen Nescio friends & me went a-hunting in the 3rd district of Vienna. Expected to discover another #SIGINT station on the Russian embassy to Austria. Surprise: we found a sat relay station

cc @mattblaze @ai6yr

https://www.golem.de/news/satellitenspionage-eine-relaisstation-fuer-putins-afrikakorps-2604-207591.html

Satellitenspionage: Eine Relaisstation für Putins Afrikakorps - Golem.de

Mit Antennen auf Botschaftsgebäuden in Wien funkt Russland zum Afrikakorps und spioniert Datenverkehr aus. Österreichs Regierung will das unterbinden - mit mäßigen Erfolgschancen.

Golem.de
Experience suggests that an increase of savagery in warfare is apt to follow new developments - technical or political - which unsettle the existing order. The advent of AI-driven and lethal autonomous weapons systems may be no exception.
$2,283 in tokens and ~20 hours of work to produce one a Chrome exploit chain is cheap when compared to the weeks of focused human effort it would normally take. https://www.hacktron.ai/blog/i-let-claude-opus-to-write-me-a-chrome-exploit
According to UK government, frontier AI model cyberattack capabilities are doubling every 4 months, compared to every 8 months previously. However, despiite what the UK government says "steps organisations should take to protect against AI-driven cyber threats" are NOT the same cyber hygiene measures recommended for traditional cyber threats https://www.gov.uk/government/publications/ai-cyber-threats-open-letter-to-business-leaders/ai-cyber-threats-open-letter-to-business-leaders-html
AI cyber threats: open letter to business leaders (HTML)

GOV.UK
The marginal electricity cost per broken secp256k1 cryptographic key is about $59 for a 23-minute attack (500000×0.38≈191667 qubit-hours=7986=7986 qubit-days). This means that for bitcoin it could be 62 keys/day. Assuming that a quantum computer exists (which it doesn't, today). https://arxiv.org/pdf/2304.14344 https://arxiv.org/pdf/2304.14344
AI has significantly increased the likelihood of attackers discovering new vulnerabilities, creating new exploits, and using them in complex automated attacks at scale. AI increases the speed to develop patches, and reduces defects in new software, the burden on defenders, by comparison, increases due to the inherent limitations of patching. The attackers gain asymmetric benefits. https://labs.cloudsecurityalliance.org/wp-content/uploads/2026/04/mythosready.pdf