Schneier on Security RSS

2.2K Followers
0 Following
1.6K Posts
Automated toots from the Schneier on Security RSS feed. This account is not affiliated with Bruce Schneier.
Bruce Schneierhttps://www.schneier.com/
avatar image byJoe MacInnis
powered by feed2toothttps://gitlab.com/chaica/feed2toot/

As the US Midterms Approach, AI Is Going to Emerge as a Key Issue Concerning Voters

In December, the Trump administration signed an executive order that neutered states’ ability to regulate AI by ordering his administration to both sue... https://www.schneier.com/blog/archives/2026/03/as-the-us-midterms-approach-ai-is-going-to-emerge-as-a-key-issue-concerning-voters.html

#Uncategorized #LLM #AI

As the US Midterms Approach, AI Is Going to Emerge as a Key Issue Concerning Voters - Schneier on Security

In December, the Trump administration signed an executive order that neutered states’ ability to regulate AI by ordering his administration to both sue and withhold funds from states that try to do so. This action pointedly supported industry lobbyists keen to avoid any constraints and consequences on their deployment of AI, while undermining the efforts of consumers, advocates, and industry associations concerned about AI’s harms who have spent years pushing for state regulation. Trump’s actions have clarified the ideological alignments around AI within America’s electoral factions. They set down lines on a new playing field for the midterm elections, prompting members of his party, the opposition, and all of us to consider where we stand in the debate over how and where to let AI transform our lives...

Schneier on Security

Sen. Wyden Warns of Another Section 702 Abuse

Sen. Ron Wyden is warning us of an abuse of Section 702:
Wyden took to the Senate floor... https://www.schneier.com/blog/archives/2026/03/sen-wyden-warns-of-another-section-702-abuse.html

#Uncategorized #surveillance #privacy #NSA

Sen. Wyden Warns of Another Section 702 Abuse - Schneier on Security

Sen. Ron Wyden is warning us of an abuse of Section 702: Wyden took to the Senate floor to deliver a lengthy speech, ostensibly about the since approved (with support of many Democrats) nomination of Joshua Rudd to lead the NSA. Wyden was protesting that nomination, but in the context of Rudd being unwilling to agree to basic constitutional limitations on NSA surveillance. But that’s just a jumping off point ahead of Section 702’s upcoming reauthorization deadline. Buried in the speech is a passage that should set off every alarm bell: There’s another example of secret law related to Section 702, one that directly affects the privacy rights of Americans. For years, I have asked various administrations to declassify this matter. Thus far they have all refused, although I am still waiting for a response from DNI Gabbard. I strongly believe that this matter can and should be declassified and that Congress needs to debate it openly before Section 702 is reauthorized. In fact, ...

Schneier on Security

Team Mirai and Democracy

Japan’s election last month and the rise of the country’s newest and most innovative pol... https://www.schneier.com/blog/archives/2026/03/team-mirai-and-democracy.html

#Uncategorized #democracy #Japan #LLM #AI

Team Mirai and Democracy - Schneier on Security

Japan’s election last month and the rise of the country’s newest and most innovative political party, Team Mirai, illustrates the viability of a different way to do politics. In this model, technology is used to make democratic processes stronger, instead of undermining them. It is harnessed to root out corruption, instead of serving as a cash cow for campaign donations. Imagine an election where every voter has the opportunity to opine directly to politicians on precisely the issues they care about. They’re not expected to spend hours becoming policy experts. Instead, an ...

Schneier on Security
Microsoft Xbox One Hacked - Schneier on Security

It’s an impressive feat, over a decade after the box was released: Since reset glitching wasn’t possible, Gaasedelen thought some voltage glitching could do the trick. So, instead of tinkering with the system rest pin(s) the hacker targeted the momentary collapse of the CPU voltage rail. This was quite a feat, as Gaasedelen couldn’t ‘see’ into the Xbox One, so had to develop new hardware introspection tools. Eventually, the Bliss exploit was formulated, where two precise voltage glitches were made to land in succession. One skipped the loop where the ...

Schneier on Security

Friday Squid Blogging: Jumbo Flying Squid in the South Pacific

The population needs better conservation.
As usual, you can also use this squid post to talk about the security stori... https://www.schneier.com/blog/archives/2026/03/friday-squid-blogging-jumbo-flying-squid-in-the-south-pacific.html

#Uncategorized #squid

Friday Squid Blogging: Jumbo Flying Squid in the South Pacific - Schneier on Security

The population needs better conservation. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy.

Schneier on Security

Proton Mail Shared User Information with the Police

404 Media has a story about Proton Mail giving subscriber data to the Swiss government, who passed the information to the FBI.
It’s... https://www.schneier.com/blog/archives/2026/03/proton-mail-shared-user-information-with-the-police.html

#de-anonymization #Uncategorized #Switzerland #privacy #police #crime #email #FBI

Proton Mail Shared User Information with the Police - Schneier on Security

404 Media has a story about Proton Mail giving subscriber data to the Swiss government, who passed the information to the FBI. It’s metadata—payment information related to a particular account—but still important knowledge. This sort of thing happens, even to privacy-centric companies like Proton Mail.

Schneier on Security

Hacking a Robot Vacuum

Someone tries to remote control his own DJI Romo vacuum, and ends up controlling 7,000 of them from all around the world.
The I... https://www.schneier.com/blog/archives/2026/03/hacking-a-robot-vacuum.html

#InternetofThings #vulnerabilities #Uncategorized

Hacking a Robot Vacuum - Schneier on Security

Someone tries to remote control his own DJI Romo vacuum, and ends up controlling 7,000 of them from all around the world. The IoT is horribly insecure, but we already knew that.

Schneier on Security

Meta’s AI Glasses and Privacy

Surprising no one, Meta’s new AI glasses are a privacy disaster.
I’m not sure what can be done here. This is ... https://www.schneier.com/blog/archives/2026/03/metas-ai-glasses-and-privacy.html

#Uncategorized #privacy #Meta #AI

Meta's AI Glasses and Privacy - Schneier on Security

Surprising no one, Meta’s new AI glasses are a privacy disaster. I’m not sure what can be done here. This is a technology that will exist, whether we like it or not. Meanwhile, there is a new Android app that detects when there are smart glasses nearby.

Schneier on Security

South Korean Police Accidentally Post Cryptocurrency Wallet Password

An expensive mistake:

Someone jumped at the opportunity to steal $4.4 million in crypto assets after... https://www.schneier.com/blog/archives/2026/03/south-korean-police-accidentally-post-cryptocurrency-wallet-password.html

#operationalsecurity #cryptocurrency #Uncategorized

South Korean Police Accidentally Post Cryptocurrency Wallet Password - Schneier on Security

An expensive mistake: Someone jumped at the opportunity to steal $4.4 million in crypto assets after South Korea’s National Tax Service exposed publicly the mnemonic recovery phrase of a seized cryptocurrency wallet. The funds were stored in a Ledger cold wallet seized in law enforcement raids at 124 high-value tax evaders that resulted in confiscating digital assets worth 8.1 billion won (currently approximately $5.6 million). When announcing the success of the operation, the agency released photos of a Ledger device, a popular hardware wallet for crypto storage and management...

Schneier on Security

Possible New Result in Quantum Factorization

I’m skeptical about—and not qualified to review—this new result in factorization with a quantum computer, but if it’s true it’s a