
2025-07-20 14:25:12
Ukraine to secure $6.9 billion in arbitration from Russian Gazprom, Zelensky says: https://benborges.xyz/2025/07/20/ukraine-to-secure-billion-in.html
Ukraine to secure $6.9 billion in arbitration from Russian Gazprom, Zelensky says: https://benborges.xyz/2025/07/20/ukraine-to-secure-billion-in.html
EVA-S2PMLP: Secure and Scalable Two-Party MLP via Spatial Transformation
Shizhao Peng, Shoumo Li, Tianle Tao
https://arxiv.org/abs/2506.15102 https://
When Secure Aggregation Falls Short: Achieving Long-Term Privacy in Asynchronous Federated Learning for LEO Satellite Networks
Mohamed Elmahallawy, Tie Luo
https://arxiv.org/abs/2508.13425
Q&A with Pavel Durov on his arrest in France, Macron, Russia, the FBI, the fight for Telegram, leaving his wealth to the 100 children he fathered, and more (Guillaume Grallet/Le Point)
https://www.
Så har jeg også skrevet under på opfordringen til at give Nobels fredspris til Francesca Albanese
https://secure.avaaz.org/campaign/en/stand_with_francesca_loc/?copy&u…
Secure Time-Modulated Intelligent Reflecting Surface via Generative Flow Networks
Zhihao Tao, Athina P. Petropulu
https://arxiv.org/abs/2506.14992 https://…
Password compromise is no joke;
it leads to account compromise and that leads to, well, the compromise of most everything you hold dear in this technological-centric world.
It’s why Google is telling billions of users to replace their passwords with more secure passkeys.
It’s why the FBI is warning people not to click on links in SMS messages.
It’s why stolen passwords are up for sale, in their millions, on the dark web to anyone with the very little amount of cas…
Watching the second to last season of SVU (wifey loves it) and the cops just got info from being in a Discord server. Realistic. The FBI are all over Discord too. Always keep that in mind. Say nothing sensitive there. Discord servers are NOT secure, the authorities can always easily get in, and they often do.
#Discord #privacy
Hmm. I got thinking. I know, I really shouldn’t…
HTTPS “creates a secure channel over an insecure network” - and this is pretty much the definition of a VPN.
So, now we look at the Ofcom website and it redirects all visitors to use https (a temporary vpn, essentially) instead of accessing the site directly.
Are they breaking the very rule they demand?
#osa
Interestingly, “having been briefed” does not entail “understood the matter presented”
https://journa.host/@w7voa/114710877076030406
Can we start a #ResignNOW #ThankYouForYourAttention campaign across platforms citing his misdeeds?
https://masto.ai/@Non…
Can we start a #ResignNOW #ThankYouForYourAttention campaign across platforms citing his misdeeds?
https://masto.ai/@Non…
Why do so many people completely ignore the fact that human error (and human “error”) and negligence exist when talking about how great and safe nuclear energy is?
Sure, you can make super secure nuclear power plants and super resistant containers for waste storage and take selfies hugging those containers all you want, but all it takes is one idiot to want to cut corners and boom you have nuclear waste hanging around in the nature without proper storage.
"Libxml2’s solo maintainer drops embargoed security fixes, highlighting the burden on unpaid volunteers who keep critical open source software secure."
https://socket.dev/blog/libxml2-maintainer-ends-embargoed-vulnerability-reports
Secure Pinching Antenna-aided ISAC
Elmehdi Illi, Marwa Qaraqe, Ali Ghrayeb
https://arxiv.org/abs/2507.13131 https://arxiv.org/pdf/250…
https://www.bleepingcomputer.com/news/security/operation-secure-disrupts-global-infostealer-malware-operations/
Operation Secure disrupts global infostealer malware operations
There's a scarily good fake Cloudflare page that asks you to run commands on your computer - I saw it myself earlier this week. Don't copy and run commands from strange sites! https://www.techradar.com/pro/security/…
Toward a Lightweight, Scalable, and Parallel Secure Encryption Engine
Rasha Karakchi, Rye Stahle-Smith, Nishant Chinnasami, Tiffany Yu
https://arxiv.org/abs/2506.15070
As long as error messages like this can happen, I refuse consider the possibility that matrix could be a secure messaging solution for the masses. I mean... you can't be serious?
If your goal is average users, your No 1 design principle must be that you never bother users with the details of your technical design, which they don't understand anyway. That's a main reason why PGP failed, and people still don't get it. (I mean... I don't understand what that means, and …
May 2025 recap | The latest edition of the GÉANT School of Software Engineering, hosted by PCSS, brought together developers and experts from across Europe to explore generative #AI tools, risks, secure coding practices.
Highlights:
🔹#GenAI Buzz-Free Programming with LLMs – training by Maciej Łabędzki…
The Domination and Secure Domination Numbers of Direct Product of Cliques with Paths and Cycles
Deepak M. Bakal, S. A. Mane
https://arxiv.org/abs/2506.11865
SHIELD: A Secure and Highly Enhanced Integrated Learning for Robust Deepfake Detection against Adversarial Attacks
Kutub Uddin, Awais Khan, Muhammad Umar Farooq, Khalid Malik
https://arxiv.org/abs/2507.13170
A Fast, Reliable, and Secure Programming Language for LLM Agents with Code Actions
Stephen Mell, Botong Zhang, David Mell, Shuo Li, Ramya Ramalingam, Nathan Yu, Steve Zdancewic, Osbert Bastani
https://arxiv.org/abs/2506.12202
Skriv ubder för att stödja att israel släpper in mjölk till spädbarn https://secure.avaaz.org/campaign/en/let_milk_into_gaza_loc/?copy&utm_source=copy&utm_medium=social_s…
Secure API-Driven Research Automation to Accelerate Scientific Discovery
Tyler J. Skluzacek, Paul Bryant, A. J. Ruckman, Daniel Rosendo, Suzanne Prentice, Michael J. Brim, Ryan Adamson, Sarp Oral, Mallikarjun Shankar, Rafael Ferreira da Silva
https://arxiv.org/abs/2506.11950
This is what I always say: "It doesn't actually matter how cryptographically secure your end-to-end encryption is when 1 entity controls all ends and can instantly update them whenever they want." https://www.moparisthebest.com/against-silos-signal/
so.... did Trump leave early so he could get onto a secure/safe space - ie. Air Force One - before Israel did something brash?
this is pure speculation on my part. All I have seen is what most others have, that he is leaving because of #IsraelIranWat
Robust Beamforming Design for Secure Near-Field ISAC Systems
Ziqiang CHen, Feng Wang, Guojun Han, Xin Wang, Vincent K. N. Lau
https://arxiv.org/abs/2507.12881
I would like to see an initiative that evaluates messaging services that promise encryption and document the findings. For example, a service may claim that emails are encrypted and secure. However, if the secret keys are managed on infrastructure controlled by the service without further protection, there are limitations, and I wouldn't call it end-to-end encryption. I think it would be useful to have a neutral web page where users could lookup the security levels of services (or apps).…
Google’s insists data it holds is secure and it won’t create lock-in for the UK government, but do the answers match the ambition?
https://www.computing.co.uk/interview/2025/exclusive-google-defends-uk-deal-data-sovereignty-concerns
De hŸjreradikale partier i Europaparlamentet er ved at fjerne EU’s tiltag på klimaområdet. Avaaz kŸrer en kampagne for at vise dem hvor upopulær en beslutning det er. Overvej at skrive under her: https://secure.avaaz.org/campaign/en/eu_save_the_green_deal_1_1/
Protect your privacy – Start now with Signal
Autocracies always implement broad surveillance methods in order to identify and punish resistance. Surveillance can take many forms including the capture of your social media posts and email, monitoring your connections to web sites, and preventing the use of private communications through encryption back-doors and other means.
Take action now to create ways to communicate privately with your family, friends and colleague…
Secure quantum key distribution against correlated leakage source
Jia-Xuan Li, Yang-Guang Shan, Rong Wang, Feng-Yu Lu, Zhen-Qiang Yin, Shuang Wang, Wei Chen, De-Yong He, Guang-Can Guo, Zheng-Fu Han
https://arxiv.org/abs/2507.11251
Marco Rubio Repeatedly Put on the Spot for Trump's Failure to Secure Ukraine Cease-Fire Deal | Common Dreams
https://www.commondreams.org/news/marco-rubio-trump-russia
President Trump signs the GENIUS Act, and says the first federal bill to regulate stablecoins will "secure the dollar's status as the world's reserve currency" (Bloomberg)
https://www.bloomberg.com/news/articles/20
Auch der #owncloud Hosting Service https://owncloud.online wurde nun auch weggegeben. Gab wohl noch Kunden, die nicht auf die proprietäre
SecFSM: Knowledge Graph-Guided Verilog Code Generation for Secure Finite State Machines in Systems-on-Chip
Ziteng Hu, Yingjie Xia, Xiyuan Chen, Li Kuang
https://arxiv.org/abs/2508.12910
Watched the remake of The Amateur, wherein a team of people analyse devices, cctv, etc in order to determine how someone might have snuck a couple of sensitive pdf files out of a secure building.
Retrieval-augmented reasoning with lean language models
Ryan Sze-Yin Chan, Federico Nanni, Tomas Lazauskas, Rosie Wood, Penelope Yong, Lionel Tarassenko, Mark Girolami, James Geddes, Andrew Duncan
https://arxiv.org/abs/2508.11386
Haptic-Based User Authentication for Tele-robotic System
Rongyu Yu, Kan Chen, Zeyu Deng, Chen Wang, Burak Kizilkaya, Liying Emma Li
https://arxiv.org/abs/2506.14116
Cowboys Urged to Fill QB2 Role With Former No. 2 Overall Pick https://heavy.com/sports/nfl/dallas-cowboys/sign-free-agent-quarterback-carson-wentz/?adt_ei=[email]
Help Bulls Tormented in Spain’s Seaside Festivals #AnimalRights
Thanks to @… for showing me how it's possible to add CA certs to tvOS which got the Infuse client working with custom certs. Everything looks great, put Jellyfin's `8096` port on localhost, and `nginx` is doing what it's supposed to: service secure content. Both Apple TVs have the certs installed and both are able to pull content from Jellyfin …
Ethereum Crypto Wallets under Address Poisoning: How Usable and Secure Are They?
Shixuan Guan, Kai Li
https://arxiv.org/abs/2508.12107 https://arxiv.org/pd…
Israel is counting on Trump to join the operation against Iran, now that the risks of failure and downed planes have been minimised.
“The whole operation is premised on the fact that the US will join at some point,” an Israeli official told CNN.
“We are waiting for the decision of the president,” another senior official told the network.
Israel has yet to attack Iran’s most secure enrichment facility, at Fordow, which is built into a mountain with up to 100 metres of rock abo…
Interference-Asymmetric UAV Remote Control Links: Measurements and Performance Evaluation
Donggu Lee, Sung Joon Maeng, Ozgur Ozdemir, Mani Bharathi Pandian, Ismail Guvenc
https://arxiv.org/abs/2508.12941
A Framework of Distributed Source Encryption using Mutual Information Security Criterion and the Strong Converse Theorem
Yasutada Oohama, Bagus Santoso
https://arxiv.org/abs/2507.13294
Check out today's Metacurity to stay on top of the never-ending overload of infosec developments, including
--Operation Secure disrupts infostealer malware groups worldwide
--Microsoft 365 Copilot harbored critical 'EchoLeak' security flaw,
--FIN6 targets LinkedIn recruiters,
--Smart watches can steal data from air-gapped systems,
--Cybercrims stole NHS Active Directory database,
--Two journalists hacked using Paragon spyware,
--Ransomware…
Civil Servants as Builders: Enabling Non-IT Staff to Develop Secure Python and R Tools
Prashant Sharma
https://arxiv.org/abs/2508.07203 https://arxiv.org/p…
Model Predictive Black Start for Dynamic Formation of DER-Led Microgrids with Inrush Current Impacts
Cong Bai, Salish Maharjan, Zhaoyu Wang
https://arxiv.org/abs/2507.12569
Curious how many folks here are running secureblue and GrapheneOS?
━═━═━═━═━═━═━═━═━═━
secureblue is a security-focused desktop and server Linux operating system, developed as an open-source project.
https://secureblue.dev
━═━═━═━═━═━═━═━═━═━
The private and secure mobile operating system …
Silentflow: Leveraging Trusted Execution for Resource-Limited MPC via Hardware-Algorithm Co-design
Zhuoran Li, Hanieh Totonchi Asl, Ebrahim Nouri, Yifei Cai, Danella Zhao
https://arxiv.org/abs/2508.13357
Finite-correlation-secure quantum key distribution
Yang-Guang Shan, Jia-Xuan Li, Zhen-Qiang Yin, Shuang Wang, Wei Chen, De-Yong He, Guang-Can Guo, Zheng-Fu Han
https://arxiv.org/abs/2507.11243
A look at OpenAI's campaign over the past year to secure its transition from a nonprofit, led by a team of Democratic insiders in California (Politico)
https://www.politico.com/news/2025/08/17/sam-altman-chatgpt-california-00449492
Cowboys, second-round pick finally agree to terms on eve of training camp https://cowboyswire.usatoday.com/story/sports/nfl/cowboys/2025/07/18/cowboys-reach-agreement-with-2025-second-round-pick/85267479007/
I don't get it. Don't these fools realize that San Francisco Bay lacks sharks and killer whales, and there are even swimming competitions from Alcatraz. It's just not secure.
Now on the other hand, building a jail on the Farallons, 26 miles into the Pacific, great white shark territory, killer whales now and then. Much more challenging to escape from than Alcatraz...
I don't get it. Don't these fools realize that San Francisco Bay lacks sharks and killer whales, and there are even swimming competitions from Alcatraz. It's just not secure.
Now on the other hand, building a jail on the Farallons, 26 miles into the Pacific, great white shark territory, killer whales now and then. Much more challenging to escape from than Alcatraz...
On secure UAV-aided ISCC systems
Hongjiang Lei, Congke Jiang, Ki-Hong Park, Mohamed A. Aboulhassan, Sen Zhou, Gaofeng Pan
https://arxiv.org/abs/2506.13137 …
In case you have a few extra bucks:
Donate to help flip the Senate to Democrats in 2026 — Donate via ActBlue
https://secure.actblue.com/donate/bnmsenate20261?refcode=20250619substack&amount=20
😆
Microsofts Secure Future Initiative: "Bullshit!"
https://www.heise.de/en/opinion/Microsofts-Secure-Future-Initiative-Bullshit-10506153.html
Fairness-Aware Secure Integrated Sensing and Communications with Fractional Programming
Ali Khandan Boroujeni, Kuranage Roche Rayan Ranasinghe, Giuseppe Thadeu Freitas de Abreu, Stefan K\"opsell, Ghazal Bagheri, Rafael F. Schaefer
https://arxiv.org/abs/2507.11224
Privacy-Preserving Fusion for Multi-Sensor Systems Under Multiple Packet Dropouts
Jie Huang, Jason J. R. Liu
https://arxiv.org/abs/2507.13286 https://
Certified randomness from quantum speed limits
Caroline L. Jones, Albert Aloy, Gerard Higgins, Markus P. Mueller
https://arxiv.org/abs/2506.14526 https://
‘I do not have confidence’ that US infrastructure is cyber-secure, former NSC official says
https://www.nextgov.com/cybersecurity/2025/06/i-do-not-have-confidence-us-infrastructure-cyber-secure-former-nsc-o…
Linear and Numerical SDoF Bounds of Active RIS-Assisted MIMO Wiretap Interference Channel
Su Linfan, Miao Yuhang, Song Yuxuan, Zheng Shuo, Zhang Tong, Xu Yinfei, Wang Shuai, Li Na
https://arxiv.org/abs/2506.15073
EBS-CFL: Efficient and Byzantine-robust Secure Clustered Federated Learning
Zhiqiang Li, Haiyong Bao, Menghong Guan, Hao Pan, Cheng Huang, Hong-Ning Dai
https://arxiv.org/abs/2506.13612
Intel's former CEO backs President Trump's proposed sovereign wealth fund to secure US leadership in quantum, AI, and chips and combat China's tech advances (Pat Gelsinger/Wall Street Journal)
https://www.…
SecONNds: Secure Outsourced Neural Network Inference on ImageNet
Shashank Balla
https://arxiv.org/abs/2506.11586 https://arxiv.org/pd…
Know Me by My Pulse: Toward Practical Continuous Authentication on Wearable Devices via Wrist-Worn PPG
Wei Shao, Zequan Liang, Ruoyu Zhang, Ruijie Fang, Ning Miao, Ehsan Kourkchi, Setareh Rafatirad, Houman Homayoun, Chongzhou Fang
https://arxiv.org/abs/2508.13690
System design and realisation towards optimising secure key bits in free space QKD
Pooja Chandravanshi, Jayanth Ramakrishnan, Tanya Sharma, Ayan Biswas, Ravindra P. Singh
https://arxiv.org/abs/2508.10458
Multi-service messaging app Beeper relaunches, introducing premium offerings and the option to switch to an on-device model; Automattic acquired Beeper in 2024 (Sarah Perez/TechCrunch)
https://techcrunch.com/2025/07/16/beep
Optimizing Scalar Selection in Elliptic Curve Cryptography Using Differential Evolution for Enhanced Security
Takreem Haider
https://arxiv.org/abs/2508.13520 https://
A Compact Dynamic Omnidirectional Antenna
Sheng Huang, Jacob R. Randall, Cory Hilton, Jeffrey A. Nanzer
https://arxiv.org/abs/2506.11351 https://
Evaluation Pipeline for systematically searching for Anomaly Detection Systems
Florian Rokohl, Alexander Lehnert, Marc Reichenbach
https://arxiv.org/abs/2506.15388
Cyber Risks to Next-Gen Brain-Computer Interfaces: Analysis and Recommendations
Tyler Schroder, Renee Sirbu, Sohee Park, Jessica Morley, Sam Street, Luciano Floridi
https://arxiv.org/abs/2508.12571
Pactum, which helps companies automate supplier negotiations with AI and secure more favorable contractual terms, raised a $54M Series C led by Insight Partners (Maria Deutscher/SiliconANGLE)
https://siliconangle.com/2025/06/09/pactum-raises-…
Tell Urban Outfitters to Drop Wool Now! #AnimalRights
Design and analysis of a set of discrete variable protocols for secure quantum communication
Arindam Dutta
https://arxiv.org/abs/2508.06380 https://arxiv.o…
CAN Networks Security in Smart Grids Communication Technologies
Ayman W. Baharia, Khaled T. Naga, Hesham S. Abdelfattah, Shady A. Maged, Sherif A. Hammad
https://arxiv.org/abs/2508.12181
Secure Cooperative Gradient Coding: Optimality, Reliability, and Global Privacy
Shudi Weng
https://arxiv.org/abs/2507.07565 https://a…
Secure and practical Quantum Digital Signatures
Federico Grasselli, Gaetano Russo, Massimiliano Proietti
https://arxiv.org/abs/2508.05355 https://arxiv.org…
The Guardian partners with Cambridge University to launch Secure Messaging in its app, protecting sources by making messages indistinguishable from other data (Katharine Viner/The Guardian)
https://www.theguardian.com/membership/20…
Access Control for Information-Theoretically Secure Key-Document Stores
Yin Li, Sharad Mehrota, Shantanu Sharma, Komal Kumari
https://arxiv.org/abs/2507.10730
Demo: Secure Edge Server for Network Slicing and Resource Allocation in Open RAN
Adhwaa Alchaab, Ayman Younis, Dario Pompili
https://arxiv.org/abs/2507.11499
Ducks Stabbed and Legs Hacked Off – Urge These Companies to Ditch Down #AnimalRights
IDFace: Face Template Protection for Efficient and Secure Identification
Sunpill Kim, Seunghun Paik, Chanwoo Hwang, Dongsoo Kim, Junbum Shin, Jae Hong Seo
https://arxiv.org/abs/2507.12050
EBS-CFL: Efficient and Byzantine-robust Secure Clustered Federated Learning
Zhiqiang Li, Haiyong Bao, Menghong Guan, Hao Pan, Cheng Huang, Hong-Ning Dai
https://arxiv.org/abs/2506.13612
Secure Data Access in Cloud Environments Using Quantum Cryptography
S. Vasavi Venkata Lakshmi, Ziaul Haque Choudhury
https://arxiv.org/abs/2506.10028 https…
Cut Tracing with E-Graphs for Boolean FHE Circuit Synthesis
Julien de Castelnau, Mingfei Yu, Giovanni De Micheli
https://arxiv.org/abs/2506.12883 https://
Bidirectional Biometric Authentication Using Transciphering and (T)FHE
Joon Soo Yoo, Tae Min Ahn, Ji Won Yoon
https://arxiv.org/abs/2506.12802 https://
Succinct Oblivious Tensor Evaluation and Applications: Adaptively-Secure Laconic Function Evaluation and Trapdoor Hashing for All Circuits
Damiano Abram, Giulio Malavolta, Lawrence Roy
https://arxiv.org/abs/2508.09673