New research. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Blog moderation policy.
Read moreSurveillance Used by a Drug Cartel
July 3 2025Once you build a surveillance system, you can’t control who will use it:
A hacker working for the Sinaloa drug cartel was able to obtain an FBI official’s phone...
Read more
Ubuntu Disables Spectre/Meltdown Protections
July 2 2025A whole class of speculative execution attacks against CPUs were published in 2018. They seemed pretty catastrophic at the time. But the fixes were as well. Speculative execution...
Read moreDozens of accounts on X that promoted Scottish independence went dark during an internet blackout in Iran. Well, that’s one way to identify fake accounts and misinformation campaigns.
Read moreAmerican democracy runs on trust, and that trust is cracking.
Nearly half of Americans, both Democrats and Republicans, question whether elections are conducted fairly. Some voters accept election results...
Read moreTips on what to do if you find a mop of squid eggs. As usual, you can also use this squid post to talk about the security stories in the...
Read moreThe Age of Integrity
June 27 2025We need to talk about data integrity.
Narrowly, the term refers to ensuring that data isn’t tampered with, either in transit or in storage. Manipulating account balances in bank databases,...
Read moreWhite House Bans WhatsApp
June 26 2025Reuters is reporting that the White House has banned WhatsApp on all employee devices: The notice said the “Office of Cybersecurity has deemed WhatsApp a high risk to users due...
Read moreWhat LLMs Know About Their Users
June 25 2025Simon Willison talks about ChatGPT’s new memory dossier feature. In his explanation, he illustrates how much the LLM—and the company—knows about its users. It’s a big quote, but...
Read moreScientists can manipulate air bubbles trapped in ice to encode messages.
Read more
Recent Comments