/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Matthew Green

@matthew_d_green
627 posts
2026-02-27
This seems bad for WiFi encryption: https://arstechnica.com/...
2026-02-27 View on X
Ars Technica

Security researchers detail AirSnitch, a series of attacks that bypass Wi-Fi client isolation, enabling machine-in-the-middle attacks in modern Wi-Fi networks

That guest network you set up for your neighbors may not be as secure as you think.  —  It's hard to overstate the role that Wi-Fi plays in virtually every facet of life.

2026-02-20
Here we go again with iCloud photo scanning. https://www.macrumors.com/...
2026-02-20 View on X
New York Times

West Virginia's AG sues Apple for allegedly violating consumer protection law by not implementing tools like PhotoDNA to detect CSAM stored and shared on iCloud

The state's attorney general said in a lawsuit filed on Thursday that the company declined to use tools that recognize the material stored on iCloud.

2026-01-26
But more broadly, this highlights a fundamental weakness. If MS can easily produce this data to law enforcement, then anyone who compromises their cloud infrastructure (or customer service infrastructure; or can forge a plausible LE request) can potentially access that data.
2026-01-26 View on X
Forbes

Microsoft confirms it does provide BitLocker recovery keys for encrypted data if it receives a valid legal order and the user has stored the keys on its servers

The tech giant said it receives around 20 requests for BitLocker keys a year and will provide them to governments in response to valid court orders.

Microsoft is handing over Bitlocker keys to law enforcement. https://www.forbes.com/...
2026-01-26 View on X
Forbes

Microsoft confirms it does provide BitLocker recovery keys for encrypted data if it receives a valid legal order and the user has stored the keys on its servers

The tech giant said it receives around 20 requests for BitLocker keys a year and will provide them to governments in response to valid court orders.

2026-01-25
Microsoft is handing over Bitlocker keys to law enforcement. https://www.forbes.com/...
2026-01-25 View on X
Forbes

Microsoft confirms it does provide BitLocker recovery keys for encrypted data if it receives a valid legal order and the user has stored the keys on its servers

The tech giant said it receives around 20 requests for BitLocker keys a year and will provide them to governments in response to valid court orders.

2026-01-24
Microsoft is handing over Bitlocker keys to law enforcement. https://www.forbes.com/...
2026-01-24 View on X
Forbes

Microsoft confirms it does provide BitLocker recovery keys for encrypted data if it receives a valid legal order and the user has stored the keys on its servers

The tech giant said it receives around 20 requests for BitLocker keys a year and will provide them to governments in response to valid court orders.

2025-10-14
This work really helps to illustrate the role of public and academic security research. Yesterday there were people at satcos who knew these unencrypted links were dangerous, but weren't empowered to do anything about it. Now they will be.
2025-10-14 View on X
Wired

Researchers used $800 of off-the-shelf hardware to collect data sent by satellites unencrypted, like T-Mobile users' calls and texts and some US military comms

With just $800 in basic equipment, researchers found a stunning variety of data—including thousands of T-Mobile users' calls …

Some genuinely weird corporate security speak here. These downlinks are broadcasting your WiFi data across the entire northern hemisphere. It is not equivalent to a coffee shop! [image]
2025-10-14 View on X
Wired

Researchers used $800 of off-the-shelf hardware to collect data sent by satellites unencrypted, like T-Mobile users' calls and texts and some US military comms

With just $800 in basic equipment, researchers found a stunning variety of data—including thousands of T-Mobile users' calls …

Rough summary: it turns out that many companies, ranging operators of in-flight WiFi to cellular towers to military data, are just sending plaintext to geostationary satellites. The downlinks are available to anyone with an inexpensive dish.
2025-10-14 View on X
Wired

Researchers used $800 of off-the-shelf hardware to collect data sent by satellites unencrypted, like T-Mobile users' calls and texts and some US military comms

With just $800 in basic equipment, researchers found a stunning variety of data—including thousands of T-Mobile users' calls …

2025-10-01
So here we are again. This time the UK is narrowly targeting their request at UK users only. But this is baffling for two reasons. First, Apple no longer offers the ADP encrypted backup feature to new UK users, and existing users are being migrated. So what is the UK asking for?
2025-10-01 View on X
Financial Times

Sources: the UK Home Office issued an order to Apple in early September to create a backdoor into its cloud storage service, this time targeting only UK users

Order issued in September comes after Trump administration said London had backed down in fight over encryption

Second, how is Apple supposed to make a single encryption system that's secure for US users but not for UK users? This would require that they partition their software globally and have many versions, which seems like a disaster. Are you sure you're running the “secure” OS?
2025-10-01 View on X
Financial Times

Sources: the UK Home Office issued an order to Apple in early September to create a backdoor into its cloud storage service, this time targeting only UK users

Order issued in September comes after Trump administration said London had backed down in fight over encryption

As to question (1), the article isn't super clear. But it's worth pointing out that Apple doesn't just provide end-to-end encryption for backups through their ADP feature. They also provide end-to-end encrypted backup for health data, web history and passwords, even without ADP.
2025-10-01 View on X
Financial Times

Sources: the UK Home Office issued an order to Apple in early September to create a backdoor into its cloud storage service, this time targeting only UK users

Order issued in September comes after Trump administration said London had backed down in fight over encryption

So “we want a backdoor to access iCloud encryption” could mean access to those password vaults and secure health data. This means Apple would have to disable those features in the UK as well, or deploy new insecure encryption code that could affect users globally.
2025-10-01 View on X
Financial Times

Sources: the UK Home Office issued an order to Apple in early September to create a backdoor into its cloud storage service, this time targeting only UK users

Order issued in September comes after Trump administration said London had backed down in fight over encryption

2025-09-24
The secret service has allegedly dismantled something very bizarre near the UN. [image]
2025-09-24 View on X
Bloomberg

The US Secret Service says it has dismantled 300+ SIM card servers in the NYC area that could have disrupted communications ahead of the UN General Assembly

NYTimes https://www.nytimes.com/... Anthony Guglielmi / @ajguglielmi : While investigating threats against senior officials, the @SecretService uncovered & dismantled a telecom net...

2025-09-23
The secret service has allegedly dismantled something very bizarre near the UN. [image]
2025-09-23 View on X
Bloomberg

The US Secret Service says it has dismantled 300+ SIM card servers in the NYC area that could have disrupted communications ahead of the UN General Assembly

Federal agents dismantled a network of devices in the New York area that was used to threaten senior US government officials …

2025-08-23
So the US government is going to grab a 10% stake in Intel and we're going to have discussions about “the left” and communism. Ok folks.
2025-08-23 View on X
Intel

Intel says the US will make an $8.9B investment by purchasing 433.3M primary shares of Intel common stock for $20.47/share; INTC closed on August 22 at $24.80

U.S. Government to make $8.9 billion investment in Intel common stock as company builds upon its more than $100 billion expansion of resilient semiconductor supply chain

2025-06-28
Look, I have a lot of problems with age verification. I think it's a camel's nose designed to Balkanize the Internet by claiming everything is obscenity. But even in its best case, it is going to end up attaching identity to every website visit. This is a government dream.
2025-06-28 View on X
Politico

SCOTUS upholds a Texas law that requires porn websites to verify that their visitors are 18 or older, rejecting a First Amendment challenge to the law

[This distinction is illusory.  Today's AV technology is similarly prohibitive.  No adult wants to provide their face just to watch porn.] … Evan Greer / @evangreer : this is bad i...

2025-06-08
So Trump cancelled the PQC transition? 😂
2025-06-08 View on X
Cybersecurity Dive

President Trump signs an EO scrapping or revising several Biden- and Obama-era cybersecurity programs, including for AI security and post-quantum cryptography

www.whitehouse.gov/presidential...  [image] @gigastacey : Keeping the cyber label program intact while destroying so many others is like burning your house down but saving your mai...

2025-05-05
Micah Lee is spending his weekend poking through the TeleMessage Signal app source code. So far it looks like they use hard-coded credentials. I'm sure it's going to produce exciting results in the future. https://micahflee.com/...
2025-05-05 View on X
micahflee

A hacker breaches TeleMessage, which makes modified versions of apps like Signal used by US officials including JD Vance, leaking some chats, contacts, and more

TeleMessage, a company that makes a modified version of Signal that archives messages for government agencies, was hacked.  —  💡

2025-04-30
Good article about the new AI processing features being added to WhatsApp soon. https://www.wired.com/...
2025-04-30 View on X
TechCrunch

At LlamaCon, Satya Nadella says 20% to 30% of code in Microsoft's repositories was AI-written, and Microsoft was seeing more progress in Python and less in C++

Microsoft CEO Satya Nadella said that 20%-30% of code inside the company's repositories was “written by software” — meaning AI …