#schneieronsecurity — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #schneieronsecurity, aggregated by home.social.
-
1965 Cryptanalysis Training Workbook Released by the NSA – Source: www.schneier.com https://ciso2ciso.com/1965-cryptanalysis-training-workbook-released-by-the-nsa-source-www-schneier-com/ #rssfeedpostgeneratorecho #historyofcryptography #SchneierOnSecurity #SchneieronSecurity #CyberSecurityNews #cryptanalysis #Uncategorized #NSA
-
The UK May Be Dropping Its Backdoor Mandate – Source: www.schneier.com https://ciso2ciso.com/the-uk-may-be-dropping-its-backdoor-mandate-source-www-schneier-com/ #rssfeedpostgeneratorecho #SchneierOnSecurity #SchneieronSecurity #CyberSecurityNews #Uncategorized #cryptowars #backdoors #iPhone #Apple #UK
-
I’m Spending the Year at the Munk School – Source: www.schneier.com https://ciso2ciso.com/im-spending-the-year-at-the-munk-school-source-www-schneier-com/ #rssfeedpostgeneratorecho #SchneierOnSecurity #SchneieronSecurity #CyberSecurityNews #Cybersecurity #Uncategorized #Schneiernews #CitizenLab #Schools
-
Surveillance Used by a Drug Cartel – Source: www.schneier.com https://ciso2ciso.com/surveillance-used-by-a-drug-cartel-source-www-schneier-com/ #rssfeedpostgeneratorecho #SchneierOnSecurity #SchneieronSecurity #CyberSecurityNews #Uncategorized #surveillance #geolocation #drugtrade #privacy #Reports #fbi
-
The NSA’s “Fifty Years of Mathematical Cryptanalysis (1937–1987)” – Source: www.schneier.com https://ciso2ciso.com/the-nsas-fifty-years-of-mathematical-cryptanalysis-1937-1987-source-www-schneier-com/ #rssfeedpostgeneratorecho #SchneierOnSecurity #SchneieronSecurity #CyberSecurityNews #cryptanalysis #Uncategorized #mathematics #Reports #NSA
-
New Linux Rootkit – Source: www.schneier.com https://ciso2ciso.com/new-linux-rootkit-source-www-schneier-com/ #rssfeedpostgeneratorecho #SchneierOnSecurity #SchneieronSecurity #CyberSecurityNews #Uncategorized #Rootkits #LINUX
-
Regulating AI Behavior with a Hypervisor – Source: www.schneier.com https://ciso2ciso.com/regulating-ai-behavior-with-a-hypervisor-source-www-schneier-com/ #rssfeedpostgeneratorecho #SchneierOnSecurity #SchneieronSecurity #CyberSecurityNews #physicalsecurity #academicpapers #Uncategorized #threatmodels #AI
-
Cell Phone OPSEC for Border Crossings – Source: www.schneier.com https://ciso2ciso.com/cell-phone-opsec-for-border-crossings-source-www-schneier-com/ #rssfeedpostgeneratorecho #operationalsecurity #SchneierOnSecurity #SchneieronSecurity #CyberSecurityNews #Uncategorized #cellphones #borders
-
NCSC Releases Post-Quantum Cryptography Timeline – Source: www.schneier.com https://ciso2ciso.com/ncsc-releases-post-quantum-cryptography-timeline-source-www-schneier-com/ #rssfeedpostgeneratorecho #Quantumcryptography #SchneierOnSecurity #SchneieronSecurity #CyberSecurityNews #Uncategorized #Cryptography #UK
-
Improvements in Brute Force Attacks – Source: www.schneier.com https://ciso2ciso.com/improvements-in-brute-force-attacks-source-www-schneier-com/ #rssfeedpostgeneratorecho #SchneierOnSecurity #SchneieronSecurity #CyberSecurityNews #academicpapers #cryptanalysis #Uncategorized #keys
-
Implementing Cryptography in AI Systems – Source: www.schneier.com https://ciso2ciso.com/implementing-cryptography-in-ai-systems-source-www-schneier-com/ #rssfeedpostgeneratorecho #SchneierOnSecurity #SchneieronSecurity #CyberSecurityNews #academicpapers #cryptanalysis #Uncategorized #Cryptography #AI
-
Good Essay on the History of Bad Password Policies – Source: www.schneier.com https://ciso2ciso.com/good-essay-on-the-history-of-bad-password-policies-source-www-schneier-com/ #rssfeedpostgeneratorecho #SchneierOnSecurity #SchneieronSecurity #CyberSecurityNews #historyofsecurity #Uncategorized #passwords #hashes
-
New Attack Against Self-Driving Car AI – Source: www.schneier.com https://ciso2ciso.com/new-attack-against-self-driving-car-ai-source-www-schneier-com/ #rssfeedpostgeneratorecho #ArtificialIntelligence #SchneierOnSecurity #sidechannelattacks #SchneieronSecurity #CyberSecurityNews #academicpapers #Uncategorized #Cyberattack #cars
-
Hardware Vulnerability in Apple’s M-Series Chips – Source: www.schneier.com https://ciso2ciso.com/hardware-vulnerability-in-apples-m-series-chips-source-www-schneier-com/ #rssfeedpostgeneratorecho #SchneierOnSecurity #sidechannelattacks #SchneieronSecurity #CyberSecurityNews #Uncategorized #Encryption #hardware #Apple