How Solid Protocol Restores Digital Agency
The current state of digital identity is a mess. Your personal information is scattered across hundreds of locations: social media companies, IoT companies, government agencies, websites you have accounts on, and data brokers you’ve never he... https://www.schneier.com/blog/archives/2025/07/how-solid-protocol-restores-digital-agency.html
Google Sues the Badbox Botnet Operators
It will be interesting to watch what will come of this private lawsuit:
Google on Thursday announced filing a lawsuit again... https://www.schneier.com/blog/archives/2025/07/google-sues-the-badbox-botnet-operators.html
“Encryption Backdoors and the Fourth Amendment”
Law journal article that looks at the Dual_EC_PRNG backdoor from a US constitutional perspect... https://www.schneier.com/blog/archives/2025/07/encryption-backdoors-and-the-fourth-amendment.html
Another Supply Chain Vulnerability
ProPublica is reporting:
Microsoft is using engineers in China to help maintain the Defense Department’s ... https://www.schneier.com/blog/archives/2025/07/another-supply-chain-vulnerability.html
Friday Squid Blogging: The Giant Squid Nebula
Beautiful photo.
Difficult to capture, this mysterious, squid-shaped interstellar cloud spans nearly three full moons in plan... https://www.schneier.com/blog/archives/2025/07/friday-squid-blogging-the-giant-squid-nebula.html
Cahier d’été : la Dordogne, ou la douceur d’une France rêvée
---
Bienvenue dans ce deuxième cahier d’été. Après Majorque et son empreinte purement méditerranéenne, mettons le cap sur la Dordogne. Une destination qui se dessine au fil des kilomètres d'eau et des rêveries estivales.
Premier "Cahier d'été" déjà publié : un lieu magique appelé Sóller
Douce France
L'appel de la « remontée vers le nord :
https://cahierdecoco.com/cahier-ete-dordogne/
---
#Uncategorized
New Mobile Phone Forensics Tool
The Chinese have a new tool called Massistant.
Massistant is the presumed successor to Chinese forensics tool, “M... https://www.schneier.com/blog/archives/2025/07/new-mobile-phone-forensics-tool.html
Security Vulnerabilities in ICEBlock
The ICEBlock tool has vulnerabilities:
The developer of ICEBlock, an iOS app for anonymously reporting sightings of US I... https://www.schneier.com/blog/archives/2025/07/security-vulnerabilities-in-iceblock.html
Hacking Trains
Seems like an old system system that predates any care about security:
The flaw has to do with the protocol used in a... https://www.schneier.com/blog/archives/2025/07/hacking-trains.html