article thumbnail

Report from the Cambridge Cybercrime Conference

Schneier on Security

Schneier on Security Menu Blog Newsletter Books Essays News Talks Academic About Me Search Powered by DuckDuckGo Blog Essays Whole site Subscribe Home Blog Report from the Cambridge Cybercrime Conference The Cambridge Cybercrime Conference was held on 23 June. Summaries of the presentations are here.

article thumbnail

Using Signal Groups for Activism

Schneier on Security

Schneier on Security Menu Blog Newsletter Books Essays News Talks Academic About Me Search Powered by DuckDuckGo Blog Essays Whole site Subscribe Home Blog Using Signal Groups for Activism Good tutorial by Micah Lee. It includes some nonobvious use cases. This personal website expresses the opinions of none of those organizations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Solid Protocol Restores Digital Agency

Schneier on Security

When journalist Julia Angwin attempted to correct her information across major data brokers for her book Dragnet Nation , she found that even after submitting corrections through official channels, a significant number of errors reappeared within six months. This architecture inverts the current data ownership model. Unlike Web 2.0

article thumbnail

Friday Squid Blogging: New Vulnerability in Squid HTTP Proxy Server

Schneier on Security

Schneier on Security Menu Blog Newsletter Books Essays News Talks Academic About Me Search Powered by DuckDuckGo Blog Essays Whole site Subscribe Home Blog Friday Squid Blogging: New Vulnerability in Squid HTTP Proxy Server In a rare squid/security combined post, a new vulnerability was discovered in the Squid HTTP proxy server.

article thumbnail

Hoarding, Debt and Threat Modeling

Adam Shostack

Maybe one person thinks a good dusting is enough; another that things need to be in containers (books on shelves, desk clutter in baskets, papers in files) and yet another thinks that without bleach, its a waste. On the other side is a whiteboard with a software architecture diagram Some thoughts: Define clean. No new problems.

article thumbnail

News alert: Seraphic launches BrowserTotal™ — a free AI-powered tool to stress test browser security

The Last Watchdog

Users can book a demo time in advance here. Seraphic delivers SWG, CASB, and ZTNA to simplify existing security architectures and significantly reduce SSE cost. .” Attendees of the Gartner Security & Risk Management Summit 2025 can experience Browser Total firsthand at booth #1257.

article thumbnail

My Take: Is Amazon’s Alexa+ a Gutenberg moment — or a corporate rerun of history’s greatest co-opt?

The Last Watchdog

Bezos launching Amazon with a single book, and Googles Brain Team engineering the transformer architecture that underpins todays GenAIthese are milestones on the same arc. Jeff Bezos sells his first book on a novelty called Amazon.com in 1999. Fast-forward 560 years.