Crypto-Gram: 2024 Archives
November 15, 2024
In this issue:
- More Details on Israel Sabotaging Hezbollah Pagers and Walkie-Talkies
- Cheating at Conkers
- Justice Department Indicts Tech CEO for Falsifying Security Certifications
- AI and the SEC Whistleblower Program
- No, the Chinese Have Not Broken Modern Encryption Systems with a Quantum Computer
- Are Automatic License Plate Scanners Constitutional?
- Watermark for LLM-Generated Text
- Criminals Are Blowing up ATMs in Germany
- Law Enforcement Deanonymizes Tor Users
- Simson Garfinkel on Spooky Cryptographic Action at a Distance
- Tracking World Leaders Using Strava
- Roger Grimes on Prioritizing Cybersecurity Advice
- Sophos Versus the Chinese Hackers
- AIs Discovering Vulnerabilities
- IoT Devices in Password-Spraying Botnet
- Subverting LLM Coders
- Prompt Injection Defenses Against LLM Cyberattacks
- AI Industry is Trying to Subvert the Definition of “Open Source AI”
- Criminals Exploiting FBI Emergency Data Requests
- Mapping License Plate Scanners in the US
- New iOS Security Feature Makes It Harder for Police to Unlock Seized Phones
October 15, 2024
In this issue:
- Legacy Ivanti Cloud Service Appliance Being Exploited
- Python Developers Targeted with Malware During Fake Job Interviews
- Remotely Exploding Pagers
- FBI Shuts Down Chinese Botnet
- Clever Social Engineering Attack Using Captchas
- Hacking the “Bike Angels” System for Moving Bikeshares
- Israel’s Pager Attacks and Supply Chain Vulnerabilities
- New Windows Malware Locks Computer in Kiosk Mode
- An Analysis of the EU’s Cyber Resilience Act
- NIST Recommends Some Common-Sense Password Rules
- AI and the 2024 US Elections
- Hacking ChatGPT by Planting False Memories into Its Data
- California AI Safety Bill Vetoed
- Weird Zimbra Vulnerability
- Largest Recorded DDoS Attack is 3.8 Tbps
- China Possibly Hacking US “Lawful Access” Backdoor
- Auto-Identification Smart Glasses
- Deebot Robot Vacuums Are Using Photos and Audio to Train Their AI
- IronNet Has Shut Down
- More on My AI and Democracy Book
- Perfectl Malware
- Upcoming Speaking Engagements
September 15, 2024
In this issue:
- NIST Releases First Post-Quantum Encryption Algorithms
- New Windows IPv6 Zero-Click Vulnerability
- The State of Ransomware
- Hacking Wireless Bicycle Shifters
- Story of an Undercover CIA Officer who Penetrated Al Qaeda
- Surveillance Watch
- Take a Selfie Using a NY Surveillance Camera
- US Federal Court Rules Against Geofence Warrants
- The Present and Future of TV Surveillance
- Matthew Green on Telegram’s Encryption
- Adm. Grace Hopper’s 1982 NSA Lecture Has Been Published
- SQL Injection Attack on Airport Security
- List of Old NSA Training Videos
- Security Researcher Sued for Disproving Government Statements
- Long Analysis of the M-209
- YubiKey Side-Channel Attack
- Australia Threatens to Force Companies to Break Encryption
- New Chrome Zero-Day
- Evaluating the Effectiveness of Reward Modeling of Generative AI Systems
- Microsoft Is Adding New Cryptography Algorithms
- My TedXBillings Talk
- Upcoming Speaking Engagements
August 15, 2024
In this issue:
- Hacking Scientific Citations
- Cloudflare Reports that Almost 7% of All Internet Traffic Is Malicious
- Criminal Gang Physically Assaulting People for Their Cryptocurrency
- Brett Solomon on Digital Rights
- Snake Mimics a Spider
- 2017 ODNI Memo on Kaspersky Labs
- Robot Dog Internet Jammer
- Data Wallets Using the Solid Protocol
- The CrowdStrike Outage and Market-Driven Brittleness
- Compromising the Secure Boot Process
- New Research in Detecting AI-Generated Videos
- Providing Security Updates to Automobile Software
- Education in Secure Software Development
- Leaked GitHub Python Token
- New Patent Application for Car-to-Car Surveillance
- On the Cyber Safety Review Board
- Problems with Georgia’s Voter Registration Portal
- People-Search Site Removal Services Largely Ineffective
- Taxonomy of Generative AI Misuse
- On the Voynich Manuscript
- Texas Sues GM for Collecting Driving Data without Consent
- Upcoming Speaking Engagements
July 15, 2024
In this issue:
- Using LLMs to Exploit Vulnerabilities
- Rethinking Democracy for the Age of AI
- The Hacking of Culture and the Creation of Socio-Technical Debt
- New Blog Moderation Policy
- Recovering Public Keys from Signatures
- Ross Anderson’s Memorial Service
- Paul Nakasone Joins OpenAI’s Board of Directors
- Breaking the M-209
- The US Is Banning Kaspersky
- Security Analysis of the EU’s Digital Wallet
- James Bamford on Section 702 Extension
- Model Extraction from Neural Networks
- Public Surveillance of Bars
- Upcoming Book on AI and Democracy
- New Open SSH Vulnerability
- On the CSRB’s Non-Investigation of the SolarWinds Attack
- Reverse-Engineering Ticketmaster’s Barcode System
- RADIUS Vulnerability
- Apple Is Alerting iPhone Users of Spyware Attacks
- The NSA Has a Long-Lost Lecture by Adm. Grace Hopper
- Upcoming Speaking Engagements
June 15, 2024
In this issue:
- Zero-Trust DNS
- FBI Seizes BreachForums Website
- IBM Sells Cybersecurity Group
- Detecting Malicious Trackers
- Unredacting Pixelated Text
- Personal AI Assistants and Privacy
- On the Zero-Day Market
- Lattice-Based Cryptosystems and Quantum Cryptanalysis
- Privacy Implications of Tracking Wireless Access Points
- Supply Chain Attack against Courtroom Software
- How AI Will Change Democracy
- AI Will Increase the Quantity—and Quality—of Phishing Scams
- Seeing Like a Data Structure
- Breaking a Password Manager
- Online Privacy and Overfishing
- Espionage with a Drone
- The Justice Department Took Down the 911 S5 Botnet
- Security and Human Behavior (SHB) 2024
- Exploiting Mistyped URLs
- LLMs Acting Deceptively
- Using AI for Political Polling
- AI and the Indian Election
- Demo of AES GCM Misuse Problems
- Upcoming Speaking Engagements
May 15, 2024
In this issue:
- New Lattice Cryptanalytic Technique
- X.com Automatically Changing Link Text but Not URLs
- Using AI-Generated Legislative Amendments as a Delaying Technique
- Other Attempts to Take Over Open Source Projects
- Using Legitimate GitHub URLs for Malware
- Microsoft and Security Incentives
- Dan Solove on Privacy Regulation
- The Rise of Large-Language-Model Optimization
- Long Article on GM Spying on Its Cars’ Drivers
- Whale Song Code
- WhatsApp in India
- AI Voice Scam
- The UK Bans Default Passwords
- Rare Interviews with Enigma Cryptanalyst Marian Rejewski
- My TED Talks
- New Lawsuit Attempting to Make Adversarial Interoperability Legal
- New Attack on VPNs
- How Criminals Are Using Generative AI
- New Attack Against Self-Driving Car AI
- LLMs’ Data-Control Path Insecurity
- Another Chrome Vulnerability
- Upcoming Speaking Engagements
April 15, 2024
In this issue:
- Improving C++
- Drones and the US Air Force
- AI and the Evolution of Social Media
- Cheating Automatic Toll Booths by Obscuring License Plates
- Public AI as an Alternative to Corporate AI
- Google Pays $10M in Bug Bounties in 2023
- Licensing AI Engineers
- On Secure Voting Systems
- Security Vulnerability in Saflok’s RFID-Based Keycard Locks
- Hardware Vulnerability in Apple’s M-Series Chips
- Lessons from a Ransomware Attack against the British Library
- Ross Anderson
- Magic Security Dust
- Declassified NSA Newsletters
- XZ Utils Backdoor
- Class-Action Lawsuit against Google’s Incognito Mode
- Surveillance by the New Microsoft Outlook App
- Maybe the Phone System Surveillance Vulnerabilities Will Be Fixed
- Security Vulnerability of HTML Emails
- US Cyber Safety Review Board on the 2023 Microsoft Exchange Hack
- In Memoriam: Ross Anderson, 1956-2024
- Backdoor in XZ Utils That Almost Happened
- Smuggling Gold by Disguising it as Machine Parts
- Upcoming Speaking Engagements
March 15, 2024
In this issue:
- On the Insecurity of Software Bloat
- European Court of Human Rights Rejects Encryption Backdoors
- Microsoft Is Spying on Users of Its AI Tools
- Details of a Phone Scam
- New Image/Video Prompt Injection Attacks
- AIs Hacking Websites
- Apple Announces Post-Quantum Encryption Algorithms for iMessage
- China Surveillance Company Hacked
- A Cyber Insurance Backstop
- How the “Frontier” Became the Slogan of Uncontrolled AI
- NIST Cybersecurity Framework 2.0
- LLM Prompt Injection Worm
- The Insecurity of Video Doorbells
- Surveillance through Push Notifications
- How Public AI Can Strengthen Democracy
- A Taxonomy of Prompt Injection Attacks
- Essays from the Second IWORD
- Using LLMs to Unredact Text
- Jailbreaking LLMs with ASCII Art
- Burglars Using Wi-Fi Jammers to Disable Security Cameras
- Automakers Are Sharing Driver Data with Insurers without Consent
February 15, 2024
In this issue:
- Voice Cloning with Very Short Samples
- The Story of the Mirai Botnet
- Code Written with AI Assistants Is Less Secure
- Canadian Citizen Gets Phone Back from Police
- Speaking to the CIA’s Creative Writing Group
- Zelle Is Using My Name and Voice without My Consent
- AI Bots on X (Twitter)
- Side Channels Are Common
- Poisoning AI Models
- Quantum Computing Skeptics
- Chatbots and Human Conversation
- Microsoft Executives Hacked
- NSA Buying Bulk Surveillance Data on Americans without a Warrant
- New Images of Colossus Released
- CFPB’s Proposed Data Rules
- Facebook’s Extensive Surveillance Network
- A Self-Enforcing Protocol to Solve Gerrymandering
- David Kahn
- Deepfake Fraud
- Documents about the NSA’s Banning of Furby Toys in the 1990s
- Teaching LLMs to Be Deceptive
- On Software Liabilities
- No, Toothbrushes Were Not Used in a Massive DDoS Attack
- On Passkey Usability
- Molly White Reviews Blockchain Book
- A Hacker’s Mind is Out in Paperback
- Improving the Cryptanalysis of Lattice-Based Public-Key Algorithms
- Upcoming Speaking Engagements
January 15, 2024
In this issue:
- A Robot the Size of the World
- Police Get Medical Records without a Warrant
- OpenAI Is Not Training on Your Dropbox Documents — Today
- GCHQ Christmas Codebreaking Challenge
- Cyberattack on Ukraine’s Kyivstar Seems to Be Russian Hacktivists
- Data Exfiltration Using Indirect Prompt Injection
- Ben Rothke’s Review of A Hacker’s Mind
- Google Stops Collecting Location Data from Maps
- New iPhone Security Features to Protect Stolen Devices
- AI and Lossy Bottlenecks
- AI Is Scarily Good at Guessing the Location of Random Photos
- TikTok Editorial Analysis
- Facial Recognition Systems in the US
- New iPhone Exploit Uses Four Zero-Days
- Improving Shor’s Algorithm
- Second Interdisciplinary Workshop on Reimagining Democracy
- PIN-Stealing Android Malware
- Facial Scanning by Burger King in Brazil
- Pharmacies Giving Patient Records to Police without Warrants
- On IoT Devices and Software Liability
- Upcoming Speaking Engagements
Sidebar photo of Bruce Schneier by Joe MacInnis.