- Crypto-Gram June 15, 20212021/06/15
In this issue:
AIs and Fake Comments The Misaligned Incentives for Cloud Security Vulnerabilities in Weapons Systems
from the June 15, 2021 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram May 15, 20212021/05/15
In this issue:
When AIs Start Hacking Security Vulnerabilities in Cellebrite Ransomware Is Getting Ugly
from the May 15, 2021 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram April 15, 20212021/04/15
In this issue:
Illegal Content and the Blockchain Details of a Computer Banking Scam The FBI Is Now Securing Networks Without Their Owners’ Permission
from the April 15, 2021 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram March 15, 20212021/03/15
In this issue:
National Security Risks of Late-Stage Capitalism More on the Chinese Zero-Day Microsoft Exchange Hack
from the March 15, 2021 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram February 15, 20212021/02/15
In this issue:
Cell Phone Location Privacy Presidential Cybersecurity and Pelotons
from the February 15, 2021 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram January 15, 20212021/01/15
In this issue:
Mexican Drug Cartels with High-Tech Spyware US Schools Are Buying Cell Phone Unlocking Systems Eavesdropping on Phone Taps from Voice Assistants Russia’s SolarWinds Attack and Software Security
from the January 15, 2021 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram December 15, 20202020/12/15
In this issue:
Indistinguishability Obfuscation More on the Security of the 2020 US Election Undermining Democracy Should There Be Limits on Persuasive Technologies?
from the December 15, 2020 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram November 15, 20202020/11/15
In this issue:
The Security Failures of Online Exam Proctoring “Privacy Nutrition Labels” in Apple’s App Store Inrupt’s Solid Announcement
from the November 15, 2020 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram October 15, 20202020/10/15
In this issue:
Documented Death from a Ransomware Attack COVID-19 and Acedia Google Responds to Warrants for “About” Searches
from the October 15, 2020 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram September 15, 20202020/09/15
In this issue:
Copying a Key by Listening to It in Action Identifying People by Their Browsing Histories Cory Doctorow on The Age of Surveillance Capitalism US Postal Service Files Blockchain Voting Patent
from the September 15, 2020 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram August 15, 20202020/08/15
In this issue:
On the Twitter Hack Survey of Supply Chain Attacks
from the August 15, 2020 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram July 15, 20202020/07/15
In this issue:
Eavesdropping on Sound Using Variations in Light Bulbs Zoom Will Be End-to-End Encrypted for All Users COVID-19 Risks of Flying iPhone Apps Stealing Clipboard Data Securing the International IoT Supply Chain The Security Value of Inefficiency
from the July 15, 2020 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram June 15, 20202020/06/15
In this issue:
Bart Gellman on Snowden Zoom's Commitment to User Security Depends on Whether you Pay It or Not
from the June 15, 2020 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram May 15, 20202020/05/15
In this issue:
Automatic Instacart Bots Securing Internet Videoconferencing Apps: Zoom and Others Me on COVID-19 Contact Tracing Apps
from the May 15, 2020 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram April 15, 20202020/04/15
In this issue:
Work-from-Home Security Advice Emergency Surveillance During COVID-19 Crisis Security and Privacy Implications of Zoom Contact Tracing COVID-19 Infections via Smartphone Apps Ransomware Now Leaking Stolen Documents
from the April 15, 2020 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram March 15, 20202020/03/15
In this issue:
Policy vs. Technology Inrupt, Tim Berners-Lee's Solid, and Me Security of Health Information
from the March 15, 2020 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram February 15, 20202020/02/15
In this issue:
Critical Windows Vulnerability Discovered by NSA Modern Mass Surveillance: Identify, Correlate, Discriminate
from the February 15, 2020 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram January 15, 20202020/01/15
In this issue:
Artificial Personas and Public Discourse 5G Security
from the January 15, 2020 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram December 15, 20192019/12/15
In this issue:
Reforming CDA 230 Scaring People into Supporting Backdoors
from the December 15, 2019 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram November 15, 20192019/11/15
In this issue:
Calculating the Benefits of the Advanced Encryption Standard Former FBI General Counsel Jim Baker Chooses Encryption Over Backdoors Technology and Policymakers
from the November 15, 2019 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram October 15, 20192019/10/15
In this issue:
Russians Hack FBI Comms System On Chinese "Spy Trains" Supply-Chain Security and Trust
from the October 15, 2019 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram September 15, 20192019/09/15
In this issue:
Influence Operations Kill Chain The Myth of Consumer-Grade Security Massive iPhone Hack Targets Uyghurs When Biology Becomes Software
from the September 15, 2019 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram August 15, 20192019/08/15
In this issue:
Palantir's Surveillance Service for Law Enforcement Zoom Vulnerability Attorney General William Barr on Encryption Policy How Privacy Laws Hurt Defendants Brazilian Cell Phone Hack
from the August 15, 2019 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram July 15, 20192019/07/15
In this issue:
Data, Surveillance, and the AI Arms Race Fake News and Pandemics
from the July 15, 2019 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram June 15, 20192019/06/15
In this issue:
First American Financial Corp. Data Records Leak Fraudulent Academic Papers Chinese Military Wants to Develop Custom OS Computers and Video Surveillance
from the June 15, 2019 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram May 15, 20192019/05/15
In this issue:
China Spying on Undersea Internet Cables G7 Comes Out in Favor of Encryption Backdoors Defending Democracies Against Information Attacks Protecting Yourself from Identity Theft First Physical Retaliation for a Cyberattack Leaked NSA Hacking Tools
from the May 15, 2019 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram April 15, 20192019/04/15
In this issue:
CAs Reissue Over One Million Weak Certificates Zipcar Disruption First Look Media Shutting Down Access to Snowden NSA Archives Mail Fishing TajMahal Spyware New Version of Flame Malware Discovered
from the April 15, 2019 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram March 15, 20192019/03/15
In this issue:
Judging Facebook's Privacy Shift
from the March 15, 2019 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram February 15, 20192019/02/15
In this issue:
Evaluating the GCHQ Exceptional Access Proposal Public-Interest Tech at the RSA Conference Blockchain and Trust
from the February 15, 2019 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram January 15, 20192019/01/15
In this issue:
New Attack Against Electrum Bitcoin Wallets Machine Learning to Detect Software Vulnerabilities Using a Fake Hand to Defeat Hand-Vein Biometrics
from the January 15, 2019 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 December 20182019/01/04
In this issue:
Information Attacks against Democracies How Surveillance Inhibits Freedom of Expression Propaganda and the Weakening of Trust in Government
from the December 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 November 20182018/11/15
In this issue:
Cell Phone Security and Heads of State New IoT Security Regulations Oracle and "Responsible Disclosure"
from the November 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 October 20182018/10/15
In this issue:
Security in a World of Physically Capable Computers
from the October 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 September 20182018/09/15
In this issue:
Five-Eyes Intelligence Services Choose Surveillance Over Security Security Risks of Government Hacking Quantum Computing and Cryptography
from the September 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 August 20182018/08/15
Info (Show/Hide)
In this issue:
New Book Announcement: Click Here to Kill Everybody Reasonably Clever Extortion E-mail Based on Password Theft Defeating the iPhone Restricted Mode 1Password's Travel Mode SpiderOak's Warrant Canary Died Don't Fear the TSA Cutting Airport Security. Be Glad That They're Talking about It. Google Tracks its Users Even if They Opt-Out of Tracking
from the August 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 July 20182018/07/15
Info (Show/Hide)
In this issue:
Ridiculously Insecure Smart Lock Are Free Societies at a Disadvantage in National Cybersecurity Perverse Vulnerability from Interaction between 2-Factor Authentication and iOS AutoFill The Effects of Iran's Telegram Ban Bypassing Passcodes in iOS Manipulative Social Media Practices Conservation of Threat California Passes New Privacy Law
from the July 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 June 20182018/06/15
In this issue:
Router Vulnerability and the VPNFilter Botnet E-Mail Vulnerabilities and Disclosure Russian Censorship of Telegram Another Spectre-Like CPU Vulnerability An Example of Deterrence in Cyberspace New Data Privacy Regulations
from the June 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 May 20182018/05/15
In this issue:
Securing Elections Details on a New PGP Vulnerability Two NSA Algorithms Rejected by the ISO Ray Ozzie's Encryption Backdoor Supply-Chain Security
from the May 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 April 20182018/04/15
In this issue:
Facebook and Cambridge Analytica Israeli Security Company Attacks AMD by Publishing Zero-Day Exploits Obscure E-Mail Vulnerability The Digital Security Exchange Is Live
from the April 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 March 20182018/04/03
In this issue:
Artificial Intelligence and the Attack/Defense Balance Can Consumers' Online Data Be Protected?
from the March 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 February 20182018/02/15
In this issue:
The Effects of the Spectre and Meltdown Vulnerabilities After Section 702 Reauthorization Cabinet of Secret Documents from Australia
from the February 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 January 20182018/01/15
In this issue:
Spectre and Meltdown Attacks Against Microprocessors Susan Landau's New Book: "Listening In" New Book Coming in September: "Click Here to Kill Everybody" Daniel Miessler on My Writings about IoT Security
from the January 15, 2018 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 December 20172017/12/15
In this issue:
Warrant Protections against Police Searches of Our Data Uber Data Hack NSA "Red Disk" Data Leak New White House Announcement on the Vulnerability Equities Process
from the December 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 November 20172017/11/15
In this issue:
Me on the Equifax Breach Daphne Caruana Galizia's Murder and the Security of WhatsApp New KRACK Attack Against Wi-Fi Encryption Fraud Detection in Pokemon Go IoT Cybersecurity: What's Plan B?
from the November 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 October 20172017/11/06
In this issue:
Yet Another Russian Hack of the NSA -- This Time with Kaspersky's Help Changes in Password Best Practices HP Shared ArcSight Source Code with Russians My Writing Department of Homeland Security to Collect Social Media of Immigrants and Citizens
from the October 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 September 20172017/10/10
In this issue:
On the Equifax Data Breach iPhone Changes to Frustrate the Police
from the September 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 August 20172017/08/15
In this issue:
Ethereum Hack Zero-Day Vulnerabilities against Windows in the NSA Tools Released by the Shadow Brokers Measuring Vulnerability Rediscovery
from the August 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 July 20172017/07/15
In this issue:
Book Review: "Twitter and Tear Gas," by Zeynep Tufekci Amazon Patents Measures to Prevent In-Store Comparison Shopping Separating the Paranoid from the Hacked
from the July 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 June 20172017/06/15
Info (Show/Hide)
In this issue:
The Future of Ransomware WannaCry and Vulnerabilities NSA Brute-Force Keysearch Machine NSA Abandons "About" Searches Extending the Airplane Laptop Ban Security and Human Behavior (SHB 2017) Passwords at the Border NSA Document Outlining Russian Attempts to Hack Voter Rolls Who Are the Shadow Brokers?
from the June 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 May 20172017/05/15
In this issue:
Who is Publishing NSA and CIA Secrets, and Why? The Quick vs. the Strong: Commentary on Cory Doctorow's "Walkaway" Securing Elections Surveillance and our Insecure Infrastructure
from the May 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 April 20172017/04/15
Info (Show/Hide)
In this issue:
The TSA's Selective Laptop Ban WikiLeaks Not Disclosing CIA-Hoarded Vulnerabilities to Companies Shadow Brokers Releases the Rest of Their NSA Hacking Tools Congress Removes FCC Privacy Protections on Your Internet Usage Incident Response as "Hand-to-Hand Combat" Fourth WikiLeaks CIA Attack Tool Dump Security Orchestration and Incident Response Commenting Policy for My Blog
from the April 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 March 20172017/03/15
In this issue:
WikiLeaks Releases CIA Hacking Tools Botnets Defense Against Doxing Buzzword Watch: Prosilience The CIA's "Development Tradecraft DOs and DON'Ts"
from the March 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 February 20172017/02/15
In this issue:
Security and the Internet of Things Security and Privacy Guidelines for the Internet of Things
from the February 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 January 20172017/01/15
In this issue:
Attributing the DNC Hacks to Russia Are We Becoming More Moral Faster Than We're Becoming More Dangerous? Security Risks of TSA PreCheck Law Enforcement Access to IoT Data Class Breaks A Comment on the Trump Dossier
from the January 15, 2017 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 December 20162016/12/15
In this issue:
My Priorities for the Next Four Years Hacking and the 2016 Presidential Election Dumb Security Survey Questions
from the December 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 November 20162016/11/15
In this issue:
Election Security Lessons From the Dyn DDoS Attack Regulation of the Internet of Things Virtual Kidnapping Intelligence Oversight and How It Can Fail Whistleblower Investigative Report on NSA Suite B Cryptography
from the November 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 October 20162016/10/15
In this issue:
Security Economics of the Internet of Things Cybersecurity Issues for the Next Administration Security Design: Stop Trying to Fix the User Recovering an iPhone 5c Passcode The Hacking of Yahoo
from the October 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 September 20162016/09/15
In this issue:
The NSA Is Hoarding Vulnerabilities Someone Is Learning How to Take Down the Internet Organizational Doxing and Disinformation iPhone Zero-Day Used by UAE Government Apple's Cloud Key Vault
from the September 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 August 20162016/08/15
In this issue:
The Security of Our Election Systems Hacking the Vote Real-World Security and the Internet of Things Hacking Your Computer Monitor More on the Vulnerabilities Equities Process
from the August 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 July 20162016/07/15
In this issue:
CIA Director John Brennan Pretends Foreign Cryptography Doesn't Exist Report on the Vulnerabilities Equities Process Apple's Differential Privacy Google's Post-Quantum Cryptography
from the July 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 June 20162016/06/15
In this issue:
The Unfalsifiability of Security Claims Arresting People for Walking Away from Airport Security Suckfly Google Moving Forward on Automatic Logins Security and Human Behavior (SHB 2016)
from the June 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 May 20162016/05/15
In this issue:
Credential Stealing as an Attack Vector Helen Nissenbaum on Regulating Data Collection and Use Amazon Unlimited Fraud I'm Writing a Book on Security
from the May 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 April 20162016/04/15
Info (Show/Hide)
In this issue:
Lawful Hacking and Continuing Vulnerabilities
More Links on the San Bernardino iPhone Case
Cryptography Is Harder Than It Looks
Memphis Airport Inadvertently Gets Security Right
New NIST Encryption Guidelines
Hacking Lottery Machines
IRS Security
from the April
15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 March 20162016/03/15
Info (Show/Hide)
In this issue:
Data Is a Toxic Asset
The FBI vs. Apple: Decrypting an iPhone
The Importance of Strong Encryption to Security
Security Implications of Cash
WikiLeaks Publishes NSA Target List
Cheating at Professional Bridge
Simultaneous Discovery of Vulnerabilities
from the March 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 February 20162016/02/15
Info (Show/Hide)
In this issue:
The Internet of Things Will Be the World's Biggest Robot
Integrity and Availability Threats
Security vs. Surveillance
Paper on the Going Dark Debate
The 2016 National Threat Assessment
AT&T Does Not Care about Your Privacy
"Data and Goliath" Published in Paperback
NSA's TAO Head on Internet Offense and Defense
Worldwide Encryption Products Survey
from the February 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 January 20162016/01/15
In this issue:
The Internet of Things that Talk About You Behind Your Back
Using Law against Technology
DMCA and the Internet of Things
NSA Spies on Israeli Prime Minister
Replacing Judgment with Algorithms
IT Security and the Normalization of Deviance
from the January 15, 2016 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 December 20152015/12/15
Info (Show/Hide)
In this issue:
Policy Repercussions of the Paris Terrorist Attacks
NSA Collected Americans' E-mails Even After it Stopped Collecting Americans' E-mails
Reputation in the Information Age
On CISA
Voter Surveillance
Worldwide Cryptographic Products Survey: Edits and Additions Wanted
Security vs. Business Flexibility
from the December 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 November 20152015/11/15
In this issue:
The Doxing Trend
The Rise of Political Doxing
Breaking Diffie-Hellman with Massive Precomputation (Again)
Australia Is Testing Virtual Passports
The Effects of Surveillance on the Victims
from the November 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 October 20152015/10/15
Info (Show/Hide)
In this issue:
Volkswagen and Cheating Software
Living in a Code Yellow World
Obama Administration Not Pursuing a Backdoor to Commercial Encryption
Stealing Fingerprints
Automatic Face Recognition and Surveillance
Bringing Frozen Liquids through Airport Security
SHA-1 Freestart Collision
from the October 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 September 20152015/09/15
Info (Show/Hide)
In this issue:
The Security Risks of Third-Party Data
NSA Plans for a Post-Quantum World
Drone Self-Defense and the Law
Hacking Team, Computer Vulnerabilities, and the NSA
TSA Master Keys
Oracle CSO Rant Against Security Experts
FBI and Apple's Encryption
Animals vs. Drones
Glenn Greenwald Debates Keith Alexander
Wanted: Cryptography Products for Worldwide Survey
from the September 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 August 20152015/08/15
Info (Show/Hide)
In this issue:
Backdoors Won't Solve Comey's Going Dark Problem
Another Salvo in the Second Crypto War (of Words)
Cosa Nostra Dead Drops
Bizarre High-Tech Kidnapping
Fugitive Located by Spotify
Intimidating Military Personnel by Targeting Their Families
Stagefright Vulnerability in Android Phones
from the August 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 July 20152015/07/15
Info (Show/Hide)
In this issue:
Organizational Doxing
Why We Encrypt
The Secrecy of the Snowden Documents
The Risks of Mandating Backdoors in Encryption Products
What is the DoD's Position on Backdoors in Security Systems?
Office of Personnel Management Data Hack
More about the NSA's XKEYSCORE
Hayden Mocks NSA Reforms
NSA French and German Intercepts
Hacking Team Is Hacked
from the July 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 June 20152015/06/15
Info (Show/Hide)
In this issue:
The Logjam (and Another) Vulnerability against Diffie-Hellman Key Exchange
NSA Running a Massive IDS on the Internet Backbone
Duqu 2.0
Why the Recent Section 215 Reform Debate Doesn't Matter Much
TSA Not Detecting Weapons at Security Checkpoints
Chris Roberts and Avionics Security
Encrypting Windows Hard Drives
Should Companies Do Most of Their Computing in the Cloud? (Part 1)
Should Companies Do Most of Their Computing in the Cloud? (Part 2)
Should Companies Do Most of Their Computing in the Cloud? (Part 3)
Eighth Movie-Plot Threat Contest Winner
from the June 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 May 20152015/05/15
Info (Show/Hide)
In this issue:
Admiral Rogers Speaking at the Joint Service Academy Cyber Security Summit
The Further Democratization of QUANTUM
The Further Democratization of Stingray
Eighth Movie-Plot Threat Contest Semifinalists
Hacking Airplanes
Counting the US Intelligence Community Leakers
"Hinky" in Action
from the May 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 April 20152015/04/15
In this issue:
More "Data and Goliath" News
The Eighth Movie-Plot Threat Contest
Metal Detectors at Sports Stadiums
Cisco Shipping Equipment to Fake Addresses to Foil NSA Interception
New Zealand's XKEYSCORE Use
Australia Outlaws Warrant Canaries
from the April 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 March 20152015/03/15
Info (Show/Hide)
In this issue:
"Data and Goliath"'s Big Idea
"Data and Goliath" News
Everyone Wants You To Have Security, But Not from Them
The Democratization of Cyberattack
The Equation Group's Sophisticated Hacking and Exploitation Tools
Ford Proud that "Mustang" Is a Common Password
Attack Attribution and Cyber Conflict
Co3 Systems Changes Its Name to Resilient Systems
FREAK: Security Rollback Attack Against SSL
Can the NSA Break Microsoft's BitLocker?
Hardware Bit-Flipping Attack
from the March 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 February 20152015/02/15
Info (Show/Hide)
In this issue:
Samsung Television Spies on Viewers
Accountability as a Security System
When Thinking Machines Break the Law
Obama Says Terrorism Is Not an Existential Threat
National Academies Report on Bulk Intelligence Collection
My Superpower
New Book: "Data and Goliath"
DEA Also Conducting Mass Telephone Surveillance
from the February 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 January 20152015/01/15
Info (Show/Hide)
In this issue:
Lessons from the Sony Hack
Reacting to the Sony Hack
Did North Korea Really Attack Sony?
Attributing the Sony Attack
The Limits of Police Subterfuge
Leaked CIA Documents
Doxing as an Attack
Attack Attribution in Cyberspace
The Security of Data Deletion
from the January 15, 2015 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 December 20142014/12/15
In this issue:
Regin
FBI Agents Pose as Repairmen to Bypass Warrant Process
NSA Hacking of Cell Phone Networks
Comments on the Sony Hack
Over 700 Million People Taking Steps to Avoid NSA Surveillance
Corporations Misusing Our Data
from the December 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 November 20142014/11/15
In this issue:
Crypto Wars II
Hacking Team Documentation
The Future of Incident Response
How Did the Feds Identity Dread Pirate Roberts?
Spritz: A New RC4-Like Stream Cipher
NSA Classification ECI = Exceptionally Controlled Information
from the November 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 October 20142014/10/15
In this issue:
Data and Goliath Is Finished
iPhone Encryption and the Return of the Crypto Wars
Fake Cell Phone Towers Across the US
FOXACID Operations Manual
NSA Has Undercover Operatives in Foreign Companies
DEA Creates Fake Facebook Page in Woman's Name
from the October 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 September 20142014/09/15
Info (Show/Hide)
In this issue:
NSA/GCHQ/CSEC Infecting Innocent Computers Worldwide
The Security of al Qaeda Encryption Software
QUANTUM Technology Sold by Cyberweapons Arms Manufacturers
The Concerted Effort to Remove Data Collection Restrictions
Cell Phone Kill Switches Mandatory in California
Security of Password Managers
from the September 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 August 20142014/08/15
In this issue:
New Snowden Interview in Wired
The US Intelligence Community has a Third Leaker
Over a Billion Passwords Stolen?
Irrational Fear of Risks Against Our Children
from the August 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 July 20142014/07/15
Info (Show/Hide)
In this issue:
GCHQ Catalog of Exploit Tools
NSA Spied on Prominent Muslim Americans
Web Activity Used in Court to Portray State of Mind
NSA Targets the Privacy-Conscious for Surveillance
Co3 Systems Is Hiring
Could Keith Alexander's Advice Possibly Be Worth $600K a Month?
from the July 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 Jun 20142014/06/16
Info (Show/Hide)
In this issue:
Disclosing vs. Hoarding Vulnerabilities
The NSA is Not Made of Magic
GCHQ Intercept Sites in Oman
Chinese Hacking of the US
The Human Side of Heartbleed
TrueCrypt
Security and Human Behavior (SHB 2014)
Seventh Movie-Plot Threat Contest Winner
from the June 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 May 20142014/05/15
In this issue:
Internet Subversion
New Al Qaeda Encryption Software
Seventh Movie-Plot Threat Contest Semifinalists
Espionage vs. Surveillance
from the May 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 Apr 20142014/04/15
Info (Show/Hide)
In this issue:
Heartbleed
Seventh Movie-Plot Threat Contest
MYSTIC: The NSA's Telephone Call Collection Program
The Continuing Public/Private Surveillance Partnership
New Book on Data and Power
An Open Letter to IBM's Open Letter
Ephemeral Apps
Details of the Target Credit Card Breach
from the April 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 Mar 20142014/03/15
Info (Show/Hide)
In this issue:
Breaking Up the NSA
Computer Network Exploitation vs. Computer Network Attack
Metadata = Surveillance
Surveillance by Algorithm
Who Should Store NSA Surveillance Data
The Security of the Fortuna PRNG
RCS Spyware and Citizen Lab
Choosing Secure Passwords
from the March 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 Feb 20142014/02/15
Info (Show/Hide)
In this issue:
Finding People's Locations Based on Their Activities in Cyberspace
The Insecurity of Secret IT Systems
Last Month I Briefed Congress on the NSA
US Privacy and Civil Liberties Oversight Board (PCLOB) Condemns NSA Mass Surveillance
NSA/GCHQ Accused of Hacking Belgian Cryptographer
CSEC Surveillance Analysis of IP and User Data
from the February 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 Jan 20142014/01/15
In this issue:
How the NSA Threatens National Security
NSA Exploit of the Day
Tor User Identified by FBI
Security Risks of Embedded Systems
Schneier News: I've Joined Co3[“Co-Three”] Systems
Twitter Users: Please Make Sure You're Following the Right Feed
from the January 15, 2014 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 Dec 20132013/12/15
In this issue:
NSA Spying on Online Gaming Worlds
NSA Tracks People Using Google Cookies
How Antivirus Companies Handle State-Sponsored Malware
Surveillance as a Business Model
Evading Airport Security
The TQP Patent
from the December 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 Nov 20132013/11/15
Info (Show/Hide)
In this issue:
NSA Harvesting Contact Lists
NSA Eavesdropping on Google and Yahoo Networks
Code Names for NSA Exploit Tools
Defending Against Crypto Backdoors
Why the Government Should Help Leakers
The Trajectories of Government and Corporate Surveillance
A Fraying of the Public/Private Surveillance Partnership
Book Review: "Cyber War Will Not Take Place"
Understanding the Threats in Cyberspace
SecureDrop
Dry Ice Bombs at LAX
The Battle for Power on the Internet
from the November 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 Oct 20132013/10/15
Info (Show/Hide)
In this issue:
How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID
Why It's Important to Publish the NSA Programs
The NSA's New Risk Analysis
Reforming the NSA
The Limitations of Intelligence
Metadata Equals Surveillance
Senator Feinstein Admits the NSA Taps the Internet Backbone
NSA Storing Internet Data, Social Networking Data, on Pretty Much Everybody
Air Gaps
Will Keccak = SHA-3?
Google Knows Every Wi-Fi Password in the World
Surreptitiously Tampering with Computer Chips
from the October 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 Sep 20132013/09/15
Info (Show/Hide)
In this issue:
Take Back the Internet
More on the NSA Commandeering the Internet
Detaining David Miranda
Government Secrecy and the Generation Gap
Conspiracy Theories and the NSA
The NSA's Cryptographic Capabilities
How to Remain Secure Against the NSA
Protecting Against Leakers
Our Newfound Fear of Risk
Human-Machine Trust Failures
Excess Automobile Deaths as a Result of 9/11
iPhone Fingerprint Authentication
Hacking Consumer Devices
Syrian Electronic Army Cyberattacks
The Cryptopocalypse
Measuring Entropy and its Applications to Encryption
from the September 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 Aug 20132013/08/15
Info (Show/Hide)
In this issue:
The Public/Private Surveillance Partnership
The NSA is Commandeering the Internet
Restoring Trust in Government and the Internet
Book Review: "Rise of the Warrior Cop"
Michael Hayden on the Effects of Snowden's Whistleblowing
Counterterrorism Mission Creep
from the August 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 Jul 20132013/07/15
Info (Show/Hide)
In this issue:
Blowback from the NSA Surveillance
Evidence that the NSA Is Storing Voice Content, Not Just Metadata
NSA Secrecy and Personal Privacy
Petition the NSA to Subject its Surveillance Program to Public Comment
New Details on Skype Eavesdropping
Pre-9/11 NSA Thinking
How the NSA Eavesdrops on Americans
NSA E-Mail Eavesdropping
US Offensive Cyberwar Policy
Finding Sociopaths on Facebook
My Fellowship at the Berkman Center
Protecting E-Mail from Eavesdropping
Is Cryptography Engineering or Science?
Sixth Movie-Plot Threat Contest Winner
from the July 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 Jun 20132013/06/15
Info (Show/Hide)
In this issue:
Government Secrets and the Need for Whistleblowers
Prosecuting Snowden
Trading Privacy for Convenience
Essays Related to NSA Spying Documents
The Politics of Security in a Democracy
More on Feudal Security
Surveillance and the Internet of Things
The Problems with CALEA-II
Sixth Annual Movie-Plot Threat Semifinalists
A Really Good Article on How Easy it Is to Crack Passwords
Bluetooth-Controlled Door Lock
Security and Human Behavior (SHB 2013)
The Cost of Terrorism in Pakistan
from the June 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 May 20132013/05/15
In this issue:
Refuse to be Terrorized
Intelligence Analysis and the Connect-the-Dots Metaphor
Transparency and Accountability
The Boston Marathon Bomber Manhunt
The Public/Private Surveillance Partnership
Michael Chertoff on Google Glass
from the May 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 Apr 20132013/04/15
In this issue:
Our Internet Surveillance State
Sixth Movie-Plot Threat Contest
IT for Oppression
When Technology Overtakes Security
Security Awareness Training
What I've Been Thinking About
Changes to My Blog
from the April 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage
- Crypto-Gram 15 Mar 20132013/03/15
Info (Show/Hide)
In this issue:
Nationalism on the Internet
Automobile Data Surveillance and the Future of Black Boxes
The Court of Public Opinion
More on Chinese Cyberattacks
Technologies of Surveillance
Phishing Has Gotten *Very* Good
Hacking the Papal Election
Getting Security Incentives Right
All Those Companies that Can't Afford Dedicated Security
from the March 15, 2013 Crypto-Gram Newsletter
by Bruce Schneier
read by Dan Henage