Schneier

NordVPN Breached

NordVPN Breached

NordVPN Breached NordVPN Breached- There was a successful attack against NordVPN: Based on the command log, another of the leaked secret keys appeared to secure a private certificate authority that NordVPN...
Information Privacy

A Feminist Take on Information Privacy

Information Privacy Information Privacy- Maria Farrell has a really interesting framing of information/device privacy: What our smartphones and relationship abusers share is that they both exert power over...
Russians Hack

Russians Hack FBI Comms System

Russians Hack Russians Hack- Yahoo News reported that the Russians have successfully targeted an FBI communications system: American officials discovered that the Russians had dramatically improved their a...
Spy Train

On Chinese “Spy Trains”

Spy Train Spy Train- The trade war with China has reached a new industry: subway cars. Congress is considering legislation that would prevent the world's largest train maker, the Chinese-owned CRRC Corporat...
Consumer Security

The Myth of Consumer-Grade Security

Consumer Security Consumer Security- The Department of Justice wants access to encrypted consumer devices but promises not to infiltrate business products or affect critical infrastructure. Yet that's not p...
AI Arms Race

AI Emotion-Detection Arms Race

AI Arms Race Voice systems are increasingly using AI techniques to determine emotion. A new paper describes an AI-based countermeasure to mask emotion in spoken words. Their method for masking emotion invo...
Intel Secure Enclave

Attacking the Intel Secure Enclave

Intel Secure Enclave Intel Secure Enclave- Interesting paper by Michael Schwarz, Samuel Weiser, Daniel Gruss. The upshot is that both Intel and AMD have assumed that trusted enclaves will run only trustwort...