Russian Censorship of Telegram

Continue reading


@schneier.com | 6 years ago

New iPhone OS May Include Device-Unlocking Security

Continue reading


@schneier.com | 6 years ago

New Data Privacy Regulations

Continue reading


@schneier.com | 6 years ago

Detecting Lies Through Mouse Movements

Continue reading


@schneier.com | 6 years ago

Maliciously Changing Someone's Address – Schneier on Security

Continue reading


@schneier.com | 6 years ago

Schneier: Details on a New PGP Vulnerability

Continue reading


@schneier.com | 6 years ago

Sending Inaudible Commands to Voice Assistants

Continue reading


@schneier.com | 6 years ago

The Solitaire Encryption Algorithm (1999)

Continue reading


@schneier.com | 6 years ago

NIST Issues Call for “Lightweight Cryptography” Algorithms

Continue reading


@schneier.com | 6 years ago

Two NSA Algorithms Rejected by the ISO

Continue reading


@schneier.com | 6 years ago

Security Vulnerabilities in VingCard Electronic Locks

Continue reading


@schneier.com | 6 years ago

The NSA is not made of magic

Continue reading


@schneier.com | 6 years ago