Reason number 43,756 why a #BuyEuropean tech policy or mandate makes no sense:
https://www.heise.de/en/news/USA-bans-all-new-routers-for-consumers-11222049.html
🇺🇦Prof. for networks and security at #JKULinz + dabbling in Android platform security at #Google. This account will mostly carry IT security stuff, occasionally politics and other comedy.
Screeching voice of the minority. I will not cooperate with fascists or nazis - traditional or neo; Austrian, German, US, Russian, or otherwise. I will not help build surveillance and oppression states. Never again.
"I need privacy, not because my actions are questionable, but because your judgement and intentions are."
Statements are only my own opinion, not my employers'.
This is currently my primary infosec account in the #Fediverse. It should be #searchable through https://tootfinder.ch. Previous Twitter posts are available in archival form at https://twitterarchive.mayrhofer.eu.org/.
| Homepage | https://www.mayrhofer.eu.org |
| University | https://jku.at/ins |
Reason number 43,756 why a #BuyEuropean tech policy or mandate makes no sense:
https://www.heise.de/en/news/USA-bans-all-new-routers-for-consumers-11222049.html
I wrote some lines about mitigating vibe-coding risks by adopting a development model inspired by old-school computer breakin folks:
https://addxorrol.blogspot.com/2026/03/slightly-safer-vibecoding-by-adopting.html
Yes, the vulnerability is so old, it dates from a time when networks charged on a ‘per-packet basis’.

A long, long time ago, in a land free of binary exploit mitigations, when Unix still roamed the Earth, there lived a pre-authentication Telnetd vulnerability. In fact, this vulnerability was born so long ago (way back in 1994) that it may even be older than you. To put the timespan
I just learned that a new release of the decentralized, open source Android (and iOS, but that requires a centralized Apple service) key attestation library warden-supreme has landed. It explicitly supports alternative/custom roots of trust for the attestation chain now and comes with a test for @GrapheneOS keys: https://github.com/a-sit-plus/warden-supreme/blob/development/serverside/roboto/src/test/kotlin/GrapheneOsTests.kt
Nice! That's a good match to our academic research direction on digital identity (https://digidow.eu) - avoiding points of centralization for better resilience (against many types of threats). We'll most probably use this for our prototype Android apps that require or benefit from key attestation guarantees and can't/shouldn't use Play Integrity (e.g., because they only communicate over Tor hidden services with each other, and having a Warden backend included on one side is much easier than coming up with a form of mixnet proxy service for querying central instances while retaining an unlinkability guarantee).
Whoa, that escalated quickly. This just got sent out by the press folks at the Federal Communications Commission (FCC). The FCC says it has decided that all foreign-made consumer-grade Internet routers are henceforth prohibited from receiving FCC authorization and are therefore prohibited from being imported for use or sale in the United States.
"Update Follows Determination by Executive Branch Agencies that Consumer-Grade Routers Produced in Foreign Countries Threaten National Security
WASHINGTON, March 23, 2026—Today, the Federal Communications Commission updated its Covered List to include all consumer-grade routers produced in foreign countries. Routers are the boxes in every home that connect computers, phones, and smart devices to the internet. This followed a determination by a White House-convened Executive Branch interagency body with appropriate national security expertise that such routers “pose unacceptable risks to the national security of the United States or the safety and security of United States persons.”
"The Executive Branch determination noted that foreign-produced routers (1) introduce “a supply chain vulnerability that could disrupt the U.S. economy, critical infrastructure, and national defense” and (2) pose “a severe cybersecurity risk that could be leveraged to immediately and severely disrupt U.S. critical infrastructure and directly harm U.S. persons.”
"This action does not affect any previously-purchased consumer-grade routers. Consumers can continue to use any router they have already lawfully purchased or acquired."
"Producers of consumer-grade routers that receive Conditional Approval from DoW or DHS can continue to receive FCC equipment authorizations. Interested applicants are encouraged to submit applications to [email protected]."
Not sure how many consumer-grade routers will be left for sale if it really is a ban on approvals for any foreign-made consumer routers like they said, and not just a bunch of already restricted Chinese makers like Huawei and ZTE.
https://www.fcc.gov/document/fcc-updates-covered-list-include-foreign-made-consumer-routers
FCC's "covered list" of "thou shalt not entities": https://www.fcc.gov/supplychain/coveredlist
🚨 Urgent: The EU Parliament voted against #ChatControl earlier this month – to the displeasure of Big Tech and, ironically, child protection groups. Now they’re pushing for a re-vote.
Re-doing a vote that already has a clear outcome is not how democracy should work.
Stop #Chatcontrol. Share this. Contact your MEP 👉 https://fightchatcontrol.eu/
SCOOP: Someone has found new samples of the iPhone spyware DarkSword and published them on GitHub, putting millions of iOS users at risk.
A cybersecurity researcher told us that the leaked spyware is "way too easy to repurpose" and "we need to expect criminals and others to start deploying this."
"The exploits will work out of the box," iVerify's Matthias Frielingsdorf said. "There is no iOS expertise required."
A popular open-source vulnerability scanner (Trivy) was compromised last week in a supply chain attack
https://www.aikido.dev/blog/teampcp-deploys-worm-npm-trivy-compromise
https://github.com/aquasecurity/trivy/discussions/10425
https://socket.dev/blog/trivy-under-attack-again-github-actions-compromise
https://www.stepsecurity.io/blog/trivy-compromised-a-second-time---malicious-v0-69-4-release
https://www.wiz.io/blog/trivy-compromised-teampcp-supply-chain-attack

Open Source Security Advisory What Happened On March 19, 2026, a threat actor used compromised credentials to publish malicious releases of Trivy version 0.69.4, along with trivy-action and setup-trivy. While this activity initially appeared to be an isolated event, it was the result of a broader, multi-stage supply chain attack that began weeks earlier. Attack …