
Schneier Blog
@schneierblog
Followers
143K
Following
1
Media
2
Statuses
7K
Bruce Schneier is an internationally renowned security technologist and author. Described by The Economist as a "security guru"
Auto-Feed of news/blogs
Joined December 2008
New Cryptanalysis of the Fiat-Shamir Protocol
schneier.com
A couple of months ago, a new paper demonstrated some new attacks against the Fiat-Shamir transformation. Quanta published a good article that explains the results. This is a pretty exciting paper...
0
1
13
Friday Squid Blogging: The Origin and Propagation of Squid
schneier.com
New research (paywalled): Editor’s summary: Cephalopods are one of the most successful marine invertebrates in modern oceans, and they have a 500-million-year-old history. However, we know very...
1
1
6
GPT-4o-mini Falls for Psychological Manipulation
schneier.com
Interesting experiment: To design their experiment, the University of Pennsylvania researchers tested 2024’s GPT-4o-mini model on two requests that it should ideally refuse: calling the user a jerk...
1
4
16
Indirect Prompt Injection Attacks Against LLM Assistants
schneier.com
Really good research on practical attacks against LLM agents. “Invitation Is All You Need! Promptware Attacks Against LLM-Powered Assistants in Production Are Practical and Dangerous” Abstract: The...
0
10
23
1965 Cryptanalysis Training Workbook Released by the NSA
schneier.com
In the early 1960s, National Security Agency cryptanalyst and cryptanalysis instructor Lambros D. Callimahos coined the term “Stethoscope” to describe a diagnostic computer program used to unravel...
1
6
30
We Are Still Unable to Secure LLMs from Malicious Inputs
schneier.com
Nice indirect prompt injection attack: Bargury’s attack starts with a poisoned document, which is shared to a potential victim’s Google Drive. (Bargury says a victim could have also uploaded a...
5
16
52
Encryption Backdoor in Military/Police Radios
schneier.com
I wrote about this in 2023. Here’s the story: Three Dutch security analysts discovered the vulnerabilities—five in total—in a European radio standard called TETRA (Terrestrial Trunked Radio), which...
2
14
48
Poor Password Choices
schneier.com
Look at this: McDonald’s chose the password “123456” for a major corporate system.
2
5
21
Jim Sanborn Is Auctioning Off the Solution to Part Four of the Kryptos Sculpture
schneier.com
Well, this is interesting: The auction, which will include other items related to cryptology, will be held Nov. 20. RR Auction, the company arranging the sale, estimates a winning bid between...
2
4
12
Subverting AIOps Systems Through Poisoned Input Data
schneier.com
In this input integrity attack against an AI system, researchers were able to fool AIOps tools: AIOps refers to the use of LLM-based agents to gather and analyze application telemetry, including...
1
5
19