Start typing to search content
Get the app experience
51 items shared from this domain
It was used to track a Dutch naval ship: Dutch journalist Just Vervaart, working for regional media network Omroep Gelderland, followed the directions posted o…
404 Media reports (alternate site): The FBI was able to forensically extract copies of incoming Signal messages from a defendant’s iPhone, even after the app w…
ICE has admitted that it uses spyware from the Israeli company Graphite.
Grupo Seguritech is a Mexican surveillance company that is expanding into the US.
The New York Times has a long article where the author lays out an impressive array of circumstantial evidence that the inventor of Bitcoin is the cypherpunk A…
Pretty fantastic video from Japan of a giant squid eating another squid. As usual, you can also use this squid post to talk about the security stories in the n…
Last week, Anthropic pulled back the curtain on Claude Mythos Preview, an AI model so capable at finding and exploiting software vulnerabilities that the compa…
Interesting research: “Humans expect rationality and cooperation from LLM opponents in strategic games. ” Abstract: As Large Language Models (LLMs)…
This article on the walls of Constantinople is fascinating. The system comprised four defensive lines arranged in formidable layers: The brick-lined ditch, di…
This is a current list of where and when I am scheduled to speak: I’m speaking at DemocracyXChange 2026 in Toronto, Ontario, Canada, on April 18, 2026. I’m sp…
Interesting paper: “What hackers talk about when they talk about AI: Early-stage diffusion of a cybercrime innovation. ” Abstract: The rapid expans…
The cybersecurity industry is obsessing over Anthropic’s new model, Claude Mythos Preview, and its effects on cybersecurity. Anthropic said that it is no…
Regulation is hard: The South Pacific Regional Fisheries Management Organization (SPRFMO) oversees fishing across roughly 59 million square kilometers (22 mill…
Claude is actually pretty good on the issues.
ProPublica has a scoop: In late 2024, the federal government’s cybersecurity evaluators rendered a troubling verdict on one of Microsoft’s biggest…
This is news: A malicious supply chain compromise has been identified in the Python Package Index package litellm version 1. 82. 8. The published wheel contain…
According to a new law, the Hong Kong police can demand that you reveal the encryption keys protecting your computer, phone, hard drives, etc. —even if y…
Mike Masnick points out that the recent New Mexico court ruling against Meta has some bad implications for end-to-end encryption, and security in general: If…
Here’s a fossil of a 150-million year old fish that choked to death on a belemnite rostrum: the hard, internal shell of an extinct, squid-like animal. Or…
WebinarTV searches the internet for public Zoom invites, joins the meetings, secretly records them, and publishes (alternate link) the recordings. It doesnR…
This is for new routers; you don’t have to throw away your existing ones: The Executive Branch determination noted that foreign-produced routers (1) intr…
The 2026 US “Cyber Strategy for America” document is mostly the same thing we’ve seen out of the White House for over a decade, but with a mo…
A thoughtful review of Apple’s system to alert users that the camera is on. It’s really well-designed, and important in a world where malware could…
The Hawaiian bobtail squid has bioluminescent bacteria.
In December, the Trump administration signed an executive order that neutered states’ ability to regulate AI by ordering his administration to both sue a…
Sen. Ron Wyden is warning us of an abuse of Section 702: Wyden took to the Senate floor to deliver a lengthy speech, ostensibly about the since approved (with…
Japan’s election last month and the rise of the country’s newest and most innovative political party, Team Mirai, illustrates the viability of a different way…
It’s an impressive feat, over a decade after the box was released: Since reset glitching wasn’t possible, Gaasedelen thought some voltage glitching…
The population needs better conservation. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covere…
404 Media has a story about Proton Mail giving subscriber data to the Swiss government, who passed the information to the FBI. It’s metadata—paymen…
Surprising no one, Meta’s new AI glasses are a privacy disaster. I’m not sure what can be done here. This is a technology that will exist, whether…
An expensive mistake: Someone jumped at the opportunity to steal $4. 4 million in crypto assets after South Korea’s National Tax Service exposed publicl…
I’m skeptical about—and not qualified to review—this new result in factorization with a quantum computer, but if it’s true it’s a…
This is a current list of where and when I am scheduled to speak: I’m giving the Ross Anderson Lecture at the University of Cambridge’s Churchill College at 5…
Some good news: squid stocks seem to be recovering in the waters off the Falkland Islands. As usual, you can also use this squid post to talk about the securit…
Apple announcement: …iPhone and iPad are the first and only consumer devices in compliance with the information assurance requirements of NATO nations. T…
Canada has a choice to make about its artificial intelligence future. The Carney administration is investing $2-billion over five years in its Sovereign AI Com…
Countries around the world are becoming increasingly concerned about their dependencies on the US. If you’ve purchase US-made F-35 fighter jets, you are…
It’s called AirSnitch: Unlike previous Wi-Fi attacks, AirSnitch exploits core features in Layers 1 and 2 and the failure to bind and synchronize a client…
This is a very weird story about how squid stayed on the menu of Byzantine monks by falling between the cracks of dietary rules. At Constantinople’s Mona…
An unknown hacker used Anthropic’s LLM to hack the Mexican government: The unknown Claude user wrote Spanish-language prompts for the chatbot to act as a…
Multiple news outlets are reporting on Israel’s hacking of Iranian traffic cameras and how they assisted with the killing of that country’s leaders…
Wired has the story: Shortly after the first set of explosions, Iranians received bursts of notifications on their phones. They came not from the government ad…
Microsoft is reporting: Companies are embedding hidden instructions in “Summarize with AI” buttons that, when clicked, attempt to inject persistenc…
The MIT Technology Review has a good article on Moltbook, the supposed AI-only social network: Many people have pointed out that a lot of the viral comments we…
Turns out that LLMs are good at de-anonymization: We show that LLM agents can figure out who you are from your anonymous online posts. Across Hacker News, Redd…
Peru has increased its squid catch limit. The article says “giant squid, ” but they can’t possibly mean that. As usual, you can also use this…
Iran is slowly emerging from the most severe communications blackout in its history and one of the longest in the world. Triggered as part of January’s g…
Politicians fixate on the global race for technological supremacy between US and China. They debate geopolitical implications of chip exports, latest model rel…
Good article on password managers that secretly have a backdoor. New research shows that these claims aren’t true in all cases, particularly when account recov…
I like this one. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy.
Paste a URL to share with the community