Schneier on Security RSS

2.2K Followers
0 Following
1.6K Posts
Automated toots from the Schneier on Security RSS feed. This account is not affiliated with Bruce Schneier.
Bruce Schneierhttps://www.schneier.com/
avatar image byJoe MacInnis
powered by feed2toothttps://gitlab.com/chaica/feed2toot/

Friday Squid Blogging: Jurassic Fish Chokes on Squid

Here’s a fossil of a 150-million year old fish that choked to death on a... https://www.schneier.com/blog/archives/2026/04/friday-squid-blogging-jurassic-fish-chokes-on-squid.html

#Uncategorized #squid

Friday Squid Blogging: Jurassic Fish Chokes on Squid - Schneier on Security

Here’s a fossil of a 150-million year old fish that choked to death on a belemnite rostrum: the hard, internal shell of an extinct, squid-like animal. Original paper. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy.

Schneier on Security

Company that Secretly Records and Publishes Zoom Meetings

WebinarTV searches the internet for public Zoom invites, joins the meetings, secretly records them, and publishes (alternate

US Bans All Foreign-Made Consumer Routers

This is for new routers; you don’t have to throw away your existing ones:
The Executive Branch determination noted that foreign-produced routers (1) in... https://www.schneier.com/blog/archives/2026/04/us-bans-all-foreign-made-consumer-routers.html

#nationalsecuritypolicy #Uncategorized #cyberattack #hardware #China

US Bans All Foreign-Made Consumer Routers - Schneier on Security

This is for new routers; you don’t have to throw away your existing ones: The Executive Branch determination noted that foreign-produced routers (1) introduce “a supply chain vulnerability that could disrupt the U.S. economy, critical infrastructure, and national defense” and (2) pose “a severe cybersecurity risk that could be leveraged to immediately and severely disrupt U.S. critical infrastructure and directly harm U.S. persons.” More information: Any new router made outside the US will now need to be approved by the FCC before it can be imported, marketed, or sold in the country...

Schneier on Security

Possible US Government iPhone Hacking Tool Leaked

Wired writes (alternate source):
Security researchers at Google on Tuesday

Is “Hackback” Official US Cybersecurity Strategy?

The 2026 US “Cyber Strategy for America” document is mostly the same thing we’ve seen out of the White House for ... https://www.schneier.com/blog/archives/2026/04/is-hackback-official-us-cybersecurity-strategy.html

#nationalsecuritypolicy #Uncategorized #cybersecurity #hackback #hacking

Is "Hackback" Official US Cybersecurity Strategy? - Schneier on Security

The 2026 US “Cyber Strategy for America” document is mostly the same thing we’ve seen out of the White House for over a decade, but with a more aggressive tone. But one sentence stood out: “We will unleash the private sector by creating incentives to identify and disrupt adversary networks and scale our national capabilities.” This sounds like a call for hackback: giving private companies permission to conduct offensive cyber operations. The Economist noticed (alternate link) this, too. I think this is an incredibly dumb idea: In warfare, the notion of counterattack is extremely powerful. Going after the enemy­—its positions, its supply lines, its factories, its infrastructure—­is an age-old military tactic. But in peacetime, we call it revenge, and consider it dangerous. Anyone accused of a crime deserves a fair trial. The accused has the right to defend himself, to face his accuser, to an attorney, and to be presumed innocent until proven guilty...

Schneier on Security

A Taxonomy of Cognitive Security

Last week, I listened to a fascinating talk by K. Melton on cognitive security, cognitive hacking, and reality pentesting. The slides from the talk are

Inventors of Quantum Cryptography Win Turing Award

Charles Bennett and Gilles Brassard have won the 2026 Turing Award for inventing quantum cryptography.
I am incredibly pleased to see... https://www.schneier.com/blog/archives/2026/03/inventors-of-quantum-cryptography-win-turing-award.html

#historyofcryptography #quantumcryptography #quantumcomputing #Uncategorized

Inventors of Quantum Cryptography Win Turing Award - Schneier on Security

Charles Bennett and Gilles Brassard have won the 2026 Turing Award for inventing quantum cryptography. I am incredibly pleased to see them get this recognition. I have always thought the technology to be fantastic, even though I think it’s largely unnecessary. I wrote up my thoughts back in 2008, in an essay titled “Quantum Cryptography: As Awesome As It Is Pointless.” Back then, I wrote: While I like the science of quantum cryptography—my undergraduate degree was in physics—I don’t see any commercial value in it. I don’t believe it solves any security problem that needs solving. I don’t believe that it’s worth paying for, and I can’t imagine anyone but a few technophiles buying and deploying it. Systems that use it don’t magically become unbreakable, because the quantum part doesn’t address the weak points of the system...

Schneier on Security

Apple’s Camera Indicator Lights

A thoughtful review of Apple’s system to alert users that the camera is on. It’s really well-designed, and important in a world where malware could su... https://www.schneier.com/blog/archives/2026/03/apples-camera-indicator-lights.html

#Uncategorized #cameras #malware #Apple

Apple's Camera Indicator Lights - Schneier on Security

A thoughtful review of Apple’s system to alert users that the camera is on. It’s really well-designed, and important in a world where malware could surreptitiously start recording. The reason it’s tempting to think that a dedicated camera indicator light is more secure than an on-display indicator is the fact that hardware is generally more secure than software, because it’s harder to tamper with. With hardware, a dedicated hardware indicator light can be connected to the camera hardware such that if the camera is accessed, the light must turn on, with no way for software running on the device, no matter its privileges, to change that. With an indicator light that is rendered on the display, it’s not foolish to worry that malicious software, with sufficient privileges, could draw over the pixels on the display where the camera indicator is rendered, disguising that the camera is in use...

Schneier on Security

Friday Squid Blogging: Bioluminescent Bacteria in Squid

The Hawaiian bobtail squid has bioluminescent bacteria.... https://www.schneier.com/blog/archives/2026/03/friday-squid-blogging-bioluminescent-bacteria-in-squid.html

#Uncategorized

Friday Squid Blogging: Bioluminescent Bacteria in Squid - Schneier on Security

The Hawaiian bobtail squid has bioluminescent bacteria.

Schneier on Security

As the US Midterms Approach, AI Is Going to Emerge as a Key Issue Concerning Voters

In December, the Trump administration signed an executive order that neutered states’ ability to regulate AI by ordering his administration to both sue... https://www.schneier.com/blog/archives/2026/03/as-the-us-midterms-approach-ai-is-going-to-emerge-as-a-key-issue-concerning-voters.html

#Uncategorized #LLM #AI

As the US Midterms Approach, AI Is Going to Emerge as a Key Issue Concerning Voters - Schneier on Security

In December, the Trump administration signed an executive order that neutered states’ ability to regulate AI by ordering his administration to both sue and withhold funds from states that try to do so. This action pointedly supported industry lobbyists keen to avoid any constraints and consequences on their deployment of AI, while undermining the efforts of consumers, advocates, and industry associations concerned about AI’s harms who have spent years pushing for state regulation. Trump’s actions have clarified the ideological alignments around AI within America’s electoral factions. They set down lines on a new playing field for the midterm elections, prompting members of his party, the opposition, and all of us to consider where we stand in the debate over how and where to let AI transform our lives...

Schneier on Security