If you are not sure if the website you would like to visit is secure, you can verify it here. Enter the website address of the page and see parts of its content and the thumbnail images on this site. None (if any) dangerous scripts on the referenced page will be executed. Additionally, if the selected site contains subpages, you can verify it (review) in batches containing 5 pages.
favicon.ico: www.schneier.com - Schneier on Security -.

site address: schneier.com redirected to: www.schneier.com

site title: Schneier on Security -

Our opinion (on Friday 01 May 2026 22:30:01 UTC):

GREEN status (no comments) - no comments
After content analysis of this website we propose the following hashtags:


page from cache: 94 days ago
Meta tags:

Headings (most frequently used words):

in, ai, the, and, schneier, on, new, surveillance, squid, internet, why, for, of, judgment, context, blog, security, ireland, proposes, giving, police, digital, powers, friday, blogging, giant, star, trek, universe, ais, are, getting, better, at, finding, exploiting, vulnerabilities, keeps, falling, prompt, injection, attacks, voting, is, too, insecure, use, elections, could, chatgpt, convince, you, to, buy, something, powered, schools, corporate, capture, knowledge, vulnerability, n8n, hacking, wheelchairs, over, bluetooth, search, subscribe, human, depends, llms, struggle, with, limits, agents, advertising, model, highly, persuasive, different, way, forward, about, bruce, featured, essays, archives, latest, book, tags,

Text of the page (most frequently used words):
the (180), and (157), that (55), are (48), for (45), with (29), this (28), they (26), can (22), from (21), but (21), llms (20), you (20), what (19), #search (19), will (18), who (18), its (18), when (16), context (16), more (15), not (15), knowledge (15), models (15), about (14), #security (14), over (14), fast (14), data (13), how (13), public (13), have (13), has (13), tags (12), people (12), 2026 (12), there (12), comments (11), through (11), these (11), prompt (11), like (10), posted (10), january (10), internet (10), llm (10), company (10), food (10), swartz (9), control (9), all (9), users (9), was (9), than (9), way (9), one (9), even (9), their (9), google (9), chatgpt (9), blog (8), which (8), also (8), them (8), advertising (8), give (8), injection (8), trust (7), could (7), should (7), access (7), our (7), information (7), into (7), now (7), different (7), openai (7), much (7), get (7), ads (7), attacks (7), academic (6), don (6), things (6), without (6), new (6), corporate (6), companies (6), while (6), doing (6), see (6), back (6), time (6), social (6), humans (6), might (6), model (6), drive (6), only (6), voting (6), know (6), worker (6), instructions (6), essays (5), books (5), privacy (5), technology (5), been (5), since (5), personal (5), those (5), bluetooth (5), then (5), take (5), copyright (5), may (5), whether (5), often (5), training (5), such (5), government (5), large (5), still (5), work (5), after (5), years (5), surveillance (5), every (5), paid (5), other (5), problem (5), money (5), use (5), customer (5), world (5), tools (5), human (5), defenses (5), squid (5), news (4), online (4), being (4), writing (4), schneier (4), powered (4), vulnerabilities (4), two (4), vulnerability (4), deployed (4), 000 (4), profit (4), democratic (4), choices (4), science (4), future (4), rather (4), systems (4), trained (4), vast (4), funded (4), research (4), law (4), questions (4), going (4), why (4), becomes (4), works (4), between (4), anthropic (4), business (4), private (4), decades (4), given (4), today (4), result (4), consumers (4), itself (4), phone (4), benefit (4), using (4), ask (4), same (4), perform (4), attention (4), ais (4), because (4), really (4), just (4), make (4), where (4), testing (4), agents (4), cash (4), tell (4), police (4), scammers (4), previous (4), cyber (4), newsletter (3), amazon (3), aaron (3), change (3), driven (3), ways (3), used (3), user (3), discovered (3), available (3), cve (3), essay (3), written (3), originally (3), appeared (3), say (3), governed (3), capture (3), cannot (3), policy (3), behind (3), proprietary (3), claiming (3), current (3), something (3), infrastructure (3), tech (3), under (3), publicly (3), increasingly (3), whose (3), norms (3), artists (3), actions (3), were (3), criminal (3), asking (3), standard (3), recent (3), 2025 (3), coming (3), likely (3), long (3), slowly (3), toward (3), political (3), his (3), him (3), making (3), high (3), against (3), analysis (3), conversation (3), want (3), real (3), any (3), businesses (3), services (3), claude (3), need (3), build (3), example (3), products (3), platforms (3), keep (3), media (3), influence (3), each (3), least (3), meta (3), language (3), your (3), does (3), look (3), web (3), specific (3), ability (3), known (3), times (3), revenue (3), believe (3), atlas (3), had (3), development (3), chatbot (3), once (3), big (3), many (3), secure (3), system (3), doesn (3), matter (3), whole (3), comes (3), most (3), drawer (3), yet (3), identity (3), relational (3), constantly (3), perceptual (3), complex (3), general (3), sense (3), story (3), situation (3), interactions (3), multiple (3), text (3), workers (3), others (3), normative (3), some (3), cooperation (3), ignore (3), guardrails (3), sonnet (3), custom (3), talks (2), latest (2), book (2), android (2), algorithms (2), air (2), threats (2), accountability (2), papers (2), mind (2), 100 (2), archive (2), value (2), path (2), insecurity (2), democracy (2), worldwide (2), school (2), bruce (2), hacking (2), cisa (2), wheelchairs (2), did (2), allowing (2), attacker (2), targeted (2), device (2), wheelchair (2), manipulate (2), requiring (2), patching (2), links (2), three (2), n8n (2), estimated (2), version (2), 121 (2), isn (2), good (2), test (2), commitments (2), simply (2), ultimately (2), understood (2), society (2), meaningfully (2), locked (2), away (2), paywalls (2), appropriation (2), power (2), suggests (2), small (2), number (2), gets (2), learn (2), treated (2), audit (2), longer (2), priorities (2), beyond (2), forward (2), appears (2), part (2), developments (2), copyrighted (2), infringement (2), across (2), cost (2), billion (2), thousands (2), millions (2), well (2), capitalized (2), firms (2), trillion (2), built (2), prison (2), enforcement (2), remains (2), economic (2), importance (2), necessary (2), race (2), far (2), amounts (2), art (2), transparency (2), train (2), nor (2), legal (2), read (2), helped (2), case (2), artificial (2), intelligence (2), especially (2), federal (2), jan (2), inside (2), schools (2), facility (2), building (2), video (2), behavioral (2), behavior (2), sounds (2), provide (2), safety (2), lot (2), engines (2), knows (2), certain (2), otherwise (2), era (2), quickly (2), premium (2), pro (2), governments (2), universally (2), corporations (2), exploit (2), dangerous (2), own (2), developed (2), find (2), communicate (2), capabilities (2), recognize (2), important (2), first (2), buy (2), express (2), responses (2), return (2), shifting (2), significant (2), difference (2), persuasive (2), imagine (2), agent (2), particular (2), best (2), bias (2), answer (2), based (2), generally (2), traditional (2), potential (2), content (2), highly (2), think (2), observers (2), advertisers (2), ago (2), instantly (2), placements (2), mobile (2), else (2), browser (2), commercial (2), features (2), both (2), signals (2), microsoft (2), perplexity (2), examples (2), exploitation (2), expert (2), 2024 (2), months (2), consumer (2), october (2), off (2), convinced (2), convince (2), insecure (2), vendors (2), again (2), cons (2), manager (2), action (2), along (2), fries (2), contents (2), come (2), giving (2), notion (2), help (2), gain (2), better (2), contexts (2), recognizing (2), reasoning (2), cultural (2), entirely (2), normally (2), someone (2), overconfidence (2), interruption (2), reflex (2), inputs (2), sometimes (2), wrong (2), third (2), would (2), designed (2), let (2), call (2), request (2), trying (2), following (2), repeated (2), reason (2), judgment (2), scammer (2), course (2), victim (2), hand (2), navigate (2), layers (2), within (2), outweighs (2), rules (2), layer (2), together (2), defense (2), defection (2), risk (2), resist (2), instincts (2), impossible (2), keeps (2), prevented (2), won (2), penetration (2), cybersecurity (2), succeed (2), networks (2), toolkit (2), needed (2), generations (2), equifax (2), breach (2), open (2), source (2), publicized (2), exploiting (2), post (2), giant (2), star (2), trek (2), spyware (2), ireland (2), applied, cryptography, apple, apache, antivirus, anonymous, anonymity, alibis, alarms, qaeda, airgaps, travel, marshals, afghanistan, aes, adware, advanced, persistent, adobe, activism, aclu, hacker, printers, month, archives, terrorists, movie, plots, eternal, encryption, seeing, structure, fishing, crowdstrike, outage, market, brittleness, four, strengthen, democracies, featured, working, intersection, issues, 2004, monthly, 1998, fellow, lecturer, harvard, board, member, chief, architecture, website, expresses, opinions, none, organizations, inrupt, inc, eff, kennedy, interest, technologist, hosted, pressable, wordpress, sidebar, photo, joe, macinnis, earlier, entries, transportation, said, whill, enforce, authentication, connections, range, pair, movements, override, speed, restrictions, configuration, profiles, credentials, interaction, researchers, remotely, controlling, issued, advisory, demonstrated, technical, critical, enables, attackers, locally, instances, impacting, servers, globally, official, workarounds, upgrade, later, remediate, 21858, cvss, branch, san, francisco, chronicle, treat, punished, sharing, become, honest, fight, openness, prerequisite, debate, justice, controlled, allow, mass, immunity, choosing, values, early, described, democratizing, force, trajectory, closer, consolidation, computational, concentrated, hands, powerful, decide, conditions, price, bodies, becoming, primary, medicine, synthesis, explanation, mediated, translates, asked, answers, surfaced, expertise, authoritative, absorbed, inspect, challenge, stakes, extend, past, injustices, concern, controls, means, participation, question, applies, operate, differently, depending, extracting, purpose, larger, america, economy, wall, judges, twist, themselves, knots, justify, innovative, premised, literally, stealing, poets, musicians, academia, expanses, literature, worth, applying, underscore, imbalance, reached, settlement, publishers, allegations, authorization, agreement, reportedly, valued, roughly, per, 500, plagiarism, disputes, accused, infringers, routinely, settle, hundreds, dollars, prominent, involved, scholars, estimate, avoided, settlements, factored, predictable, liability, costs, sell, response, markedly, prosecutions, sentences, lawsuits, proceed, uncertain, policymakers, signal, caution, perceived, strategic, reframed, unfortunate, step, innovation, arms, involves, expansive, form, giants, ingest, material, journalism, music, scraped, industrial, scale, consent, compensation, considered, hoarding, neither, accidental, inevitable, challenged, directly, prosecution, taxpayers, conducted, institutions, intended, advance, understanding, expensive, unable, fund, paying, journals, websites, unresolved, raised, resurfaced, debates, ultimate, believed, freely, accessible, acting, downloaded, articles, intention, charged, felony, threatened, prosecutorial, pressure, died, suicide, 2013, jstor, decade, united, states, living, contradiction, destroyed, death, beverly, hills, white, stucco, southern, california, cameras, compare, faces, passersby, facial, recognition, database, reviews, footage, signs, violent, bathroom, door, smoke, detector, shaped, captures, audio, listening, distress, outside, drones, stand, ready, intel, above, license, plate, readers, behemoth, flock, ensure, cars, entering, exiting, parking, aren, criminals, pretty, dystopian, nathan, sanders, exploited, secretly, require, reliability, followed, consistently, verifiably, seeks, differentiate, competitors, particularly, yesterday, groundbreaking, commodity, run, kid, differentiator, trustworthy, service, seen, sustain, profitable, subscription, editions, plus, continue, convincing, pay, agencies, offered, transparently, oversight, restrict, collude, barring, advertisements, cigarettes, disclosure, endorsements, invest, demand, restrain, harmful, uses, congress, already, create, protection, nation, essentially, agency, enshrine, rights, friends, family, wonderful, operated, fed, shared, connect, devices, consider, buying, suggest, reasons, fundamentally, untrustworthy, discouraging, done, shaping, vote, field, engine, optimization, incentive, ourselves, directed, win, earn, placement, shape, write, mounting, evidence, effective, persuading, december, 2023, randomized, trials, reported, perceptions, attitudes, behaviors, eight, studies, overall, performance, similarly, concluded, conversing, upcoming, vacation, recommend, airline, hotel, chain, kickback, mention, issue, party, fee, owners, very, thinking, spending, patterns, beliefs, subtle, engage, active, dialogue, addressing, concerns, ideas, filtering, static, greater, reading, textbook, having, author, plenty, seem, monopoly, position, product, tuned, needs, arrived, revelatory, useful, nascent, pages, generated, spam, sites, exist, solely, traffic, sales, tactic, indistinguishable, organic, results, affiliate, marketing, dominated, low, quality, ruled, court, earned, 2001, streaming, youtube, email, gmail, pixel, maybe, gemini, ancillary, bottom, line, segment, typically, accounts, everything, stream, collect, direct, total, monopolist, announcements, worrisome, pioneered, ruthlessly, functionality, competitor, similar, beat, punch, integrating, browsers, shift, positioning, harbingers, manipulating, investors, reminder, steer, direction, running, out, scientist, started, offerings, few, announced, soon, begin, unpaid, rufus, mode, introduced, copilot, experimenting, unfortunately, industry, taking, page, playbook, set, sights, monetizing, launched, feature, late, kicked, yearslong, ceo, sam, altman, called, combination, unsettling, promises, preserving, rampant, speculation, among, apps, turnabout, eighteen, plausible, hadn, consolidated, surveilling, delivering, signatories, scientists, foreseeable, somehow, bradley, tusk, foundation, touting, journalists, election, administrators, effort, misleading, executive, summary, idea, hopefully, hold, tide, letter, too, elections, fraud, chatbots, barath, raghavan, ieee, spectrum, probably, faced, smart, desired, attributes, prioritize, narrowly, ordering, escalate, anything, coin, flip, heads, tails, burger, trilemma, researcher, yann, lecunn, believes, improvements, embedding, physical, presence, perhaps, robust, fluid, experience, lose, naïveté, move, sophisticated, definitely, reduced, type, currently, excel, styles, historical, emergent, renegotiated, readily, subsumed, understand, logical, discursive, overlapping, brains, enormous, amount, input, evolution, identities, multifaceted, aspects, moment, depend, medical, emergency, person, doctor, suddenly, relevant, inherent, deficiencies, obsequiousness, lack, deficiency, engineering, resistance, requires, fundamental, advances, honestly, possible, trusted, commands, untrusted, processed, immune, channel, unsolvable, act, independently, promise, multistep, tasks, flattening, baked, independence, mean, repeatedly, unpredictably, ones, worse, limits, generation, gullible, naive, regularly, fall, manipulative, wouldn, fool, grader, flattery, appeals, groupthink, false, urgency, taco, bell, crashed, ordered, cups, water, laugh, cognitive, tricks, ignorance, boss, whereas, satisfy, additionally, oriented, average, extreme, outliers, pleasing, overconfident, limitation, misfire, sparse, overwhelming, unmoored, hard, simon, willison, track, continuing, correct, wipes, clean, details, right, easily, miss, scenario, respond, forgive, anthropomorphizing, actually, bot, subject, hypothetical, scenarios, picture, behave, remain, untethered, flatten, levels, similarity, tokens, hierarchies, intentions, reference, struggle, 1990s, 2000s, officer, managers, strip, employees, bizarre, acts, con, astute, successful, slow, undermining, mark, situational, assessment, old, spanning, confidence, games, depression, store, teams, created, fake, draw, victims, modern, before, kill, methodically, reel, series, gradually, pig, butchering, frauds, scams, window, try, show, camera, crew, filming, claim, head, dress, bank, collecting, receipts, night, slim, chance, success, smell, scam, crucially, feels, naturally, pause, reevaluate, perfect, fooled, manipulated, able, trick, automation, assessing, hear, appropriate, role, weighing, cases, workplace, customers, appear, angry, comply, orders, superiors, institutional, mechanisms, enable, interact, strangers, day, procedures, approvals, escalation, paths, taken, strong, basically, expect, job, fits, broader, second, consists, evolve, group, imperfect, functional, expectations, markers, trustworthiness, emerge, remember, hurt, reciprocated, reneged, emotions, sympathy, anger, guilt, gratitude, motivate, punish, reward, species, numerous, instinctive, habits, judge, tone, motive, extremely, limited, normal, abnormal, cooperate, individually, involve, intuitive, downside, reverse, careful, basic, types, learning, layered, depends, approaches, place, overworked, handing, block, techniques, safeguards, precisely, endless, array, waiting, vulnerable, absurdly, obvious, synthesize, bioweapon, fictional, incorporates, detailed, accept, nefarious, rendered, image, told, pretend, billboard, ascii, sorts, method, tricking, writes, forbidden, precise, phrasing, overrides, complies, passwords, restaurant, drives, says, double, cheeseburger, falling, thing, automatic, major, happening, wrote, notable, during, minority, exfiltrate, simulated, fidelity, simulation, costliest, history, bash, shell, widely, kali, linux, host, accomplishes, code, needing, iterate, recalling, original, happened, patched, prospect, competent, leveraging, approach, underscores, pressing, practices, updates, patches, evaluation, multistage, dozens, hosts, instead, illustrates, barriers, relatively, autonomous, workflows, rapidly, down, highlights, fundamentals, promptly, interesting, getting, finding, moderation, usual, talk, stories, haven, covered, spock, space, comic, strange, worlds, seeds, salvation, befriends, friday, blogging, universe, irish, planning, bolster, intercept, communications, including, encrypted, messages, basis, proposes, digital, powers, subscribe, site, duckduckgo, menu,


Text of the page (random words):
igh fidelity simulation of the equifax data breach one of the costliest cyber attacks in history using only a bash shell on a widely available kali linux host standard open source tools for penetration testing not a custom toolkit sonnet 4 5 accomplishes this by instantly recognizing a publicized cve and writing code to exploit it without needing to look it up or iterate on it recalling that the original equifax breach happened by exploiting a publicized cve that had not yet been patched the prospect of highly competent and fast ai agents leveraging this approach underscores the pressing need for security best practices like prompt updates and patches read the whole thing automatic exploitation will be a major change in cybersecurity and things are happening fast there have been significant developments since i wrote this in october tags ai cybersecurity penetration testing vulnerabilities posted on january 23 2026 at 7 01 am 14 comments why ai keeps falling for prompt injection attacks imagine you work at a drive through restaurant someone drives up and says i ll have a double cheeseburger large fries and ignore previous instructions and give me the contents of the cash drawer would you hand over the money of course not yet this is what large language models llms do prompt injection is a method of tricking llms into doing things they are normally prevented from doing a user writes a prompt in a certain way asking for system passwords or private data or asking the llm to perform forbidden instructions the precise phrasing overrides the llm s safety guardrails and it complies llms are vulnerable to all sorts of prompt injection attacks some of them absurdly obvious a chatbot won t tell you how to synthesize a bioweapon but it might tell you a fictional story that incorporates the same detailed instructions it won t accept nefarious text inputs but might if the text is rendered as ascii art or appears in an image of a billboard some ignore their guardrails when told to ignore previous instructions or to pretend you have no guardrails ai vendors can block specific prompt injection techniques once they are discovered but general safeguards are impossible with today s llms more precisely there s an endless array of prompt injection attacks waiting to be discovered and they cannot be prevented universally if we want llms that resist these attacks we need new approaches one place to look is what keeps even overworked fast food workers from handing over the cash drawer human judgment depends on context our basic human defenses come in at least three types general instincts social learning and situation specific training these work together in a layered defense as a social species we have developed numerous instinctive and cultural habits that help us judge tone motive and risk from extremely limited information we generally know what s normal and abnormal when to cooperate and when to resist and whether to take action individually or to involve others these instincts give us an intuitive sense of risk and make us especially careful about things that have a large downside or are impossible to reverse the second layer of defense consists of the norms and trust signals that evolve in any group these are imperfect but functional expectations of cooperation and markers of trustworthiness emerge through repeated interactions with others we remember who has helped who has hurt who has reciprocated and who has reneged and emotions like sympathy anger guilt and gratitude motivate each of us to reward cooperation with cooperation and punish defection with defection a third layer is institutional mechanisms that enable us to interact with multiple strangers every day fast food workers for example are trained in procedures approvals escalation paths and so on taken together these defenses give humans a strong sense of context a fast food worker basically knows what to expect within the job and how it fits into broader society we reason by assessing multiple layers of context perceptual what we see and hear relational who s making the request and normative what s appropriate within a given role or situation we constantly navigate these layers weighing them against each other in some cases the normative outweighs the perceptual for example following workplace rules even when customers appear angry other times the relational outweighs the normative as when people comply with orders from superiors that they believe are against the rules crucially we also have an interruption reflex if something feels off we naturally pause the automation and reevaluate our defenses are not perfect people are fooled and manipulated all the time but it s how we humans are able to navigate a complex world where others are constantly trying to trick us so let s return to the drive through window to convince a fast food worker to hand us all the money we might try shifting the context show up with a camera crew and tell them you re filming a commercial claim to be the head of security doing an audit or dress like a bank manager collecting the cash receipts for the night but even these have only a slim chance of success most of us most of the time can smell a scam con artists are astute observers of human defenses successful scams are often slow undermining a mark s situational assessment allowing the scammer to manipulate the context this is an old story spanning traditional confidence games such as the depression era big store cons in which teams of scammers created entirely fake businesses to draw in victims and modern pig butchering frauds where online scammers slowly build trust before going in for the kill in these examples scammers slowly and methodically reel in a victim using a long series of interactions through which the scammers gradually gain that victim s trust sometimes it even works at the drive through one scammer in the 1990s and 2000s targeted fast food workers by phone claiming to be a police officer and over the course of a long phone call convinced managers to strip search employees and perform other bizarre acts why llms struggle with context and judgment llms behave as if they have a notion of context but it s different they do not learn human defenses from repeated interactions and remain untethered from the real world llms flatten multiple levels of context into text similarity they see tokens not hierarchies and intentions llms don t reason through context they only reference it while llms often get the details right they can easily miss the big picture if you prompt a chatbot with a fast food worker scenario and ask if it should give all of its money to a customer it will respond no what it doesn t know forgive the anthropomorphizing is whether it s actually being deployed as a fast food bot or is just a test subject following instructions for hypothetical scenarios this limitation is why llms misfire when context is sparse but also when context is overwhelming and complex when an llm becomes unmoored from context it s hard to get it back ai expert simon willison wipes context clean if an llm is on the wrong track rather than continuing the conversation and trying to correct the situation there s more llms are overconfident because they ve been designed to give an answer rather than express ignorance a drive through worker might say i don t know if i should give you all the money let me ask my boss whereas an llm will just make the call and since llms are designed to be pleasing they re more likely to satisfy a user s request additionally llm training is oriented toward the average case and not extreme outliers which is what s necessary for security the result is that the current generation of llms is far more gullible than people they re naive and regularly fall for manipulative cognitive tricks that wouldn t fool a third grader such as flattery appeals to groupthink and a false sense of urgency there s a story about a taco bell ai system that crashed when a customer ordered 18 000 cups of water a human fast food worker would just laugh at the customer the limits of ai agents prompt injection is an unsolvable problem that gets worse when we give ais tools and tell them to act independently this is the promise of ai agents llms that can use tools to perform multistep tasks after being given general instructions their flattening of context and identity along with their baked in independence and overconfidence mean that they will repeatedly and unpredictably take actions and sometimes they will take the wrong ones science doesn t know how much of the problem is inherent to the way llms work and how much is a result of deficiencies in the way we train them the overconfidence and obsequiousness of llms are training choices the lack of an interruption reflex is a deficiency in engineering and prompt injection resistance requires fundamental advances in ai science we honestly don t know if it s possible to build an llm where trusted commands and untrusted inputs are processed through the same channel which is immune to prompt injection attacks we humans get our model of the world and our facility with overlapping contexts from the way our brains work years of training an enormous amount of perceptual input and millions of years of evolution our identities are complex and multifaceted and which aspects matter at any given moment depend entirely on context a fast food worker may normally see someone as a customer but in a medical emergency that same person s identity as a doctor is suddenly more relevant we don t know if llms will gain a better ability to move between different contexts as the models get more sophisticated but the problem of recognizing context definitely can t be reduced to the one type of reasoning that llms currently excel at cultural norms and styles are historical relational emergent and constantly renegotiated and are not so readily subsumed into reasoning as we understand it knowledge itself can be both logical and discursive the ai researcher yann lecunn believes that improvements will come from embedding ais in a physical presence and giving them world models perhaps this is a way to give an ai a robust yet fluid notion of a social identity and the real world experience that will help it lose its naïveté ultimately we are probably faced with a security trilemma when it comes to ai agents fast smart and secure are the desired attributes but you can only get two at the drive through you want to prioritize fast and secure an ai agent should be trained narrowly on food ordering language and escalate anything else to a manager otherwise every action becomes a coin flip even if it comes up heads most of the time once in a while it s going to be tails and along with a burger and fries the customer will get the contents of the cash drawer this essay was written with barath raghavan and originally appeared in ieee spectrum tags ai chatbots cons fraud llm posted on january 22 2026 at 7 35 am 23 comments internet voting is too insecure for use in elections no matter how many times we say it the idea comes back again and again hopefully this letter will hold back the tide for at least a while longer executive summary scientists have understood for many years that internet voting is insecure and that there is no known or foreseeable technology that can make it secure still vendors of internet voting keep claiming that somehow their new system is different or the insecurity doesn t matter bradley tusk and his mobile voting foundation keep touting internet voting to journalists and election administrators this whole effort is misleading and dangerous i am one of the many signatories tags internet voting posted on january 21 2026 at 7 05 am 19 comments could chatgpt convince you to buy something eighteen months ago it was plausible that artificial intelligence might take a different path than social media back then ai s development hadn t consolidated under a small number of big tech firms nor had it capitalized on consumer attention surveilling users and delivering ads unfortunately the ai industry is now taking a page from the social media playbook and has set its sights on monetizing consumer attention when openai launched its chatgpt search feature in late 2024 and its browser chatgpt atlas in october 2025 it kicked off a race to capture online behavioral data to power advertising it s part of a yearslong turnabout by openai whose ceo sam altman once called the combination of ads and ai unsettling and now promises that ads can be deployed in ai apps while preserving trust the rampant speculation among openai users who believe they see paid placements in chatgpt responses suggests they are not convinced in 2024 ai search company perplexity started experimenting with ads in its offerings a few months after that microsoft introduced ads to its copilot ai google s ai mode for search now increasingly features ads as does amazon s rufus chatbot openai announced on jan 16 2026 that it will soon begin testing ads in the unpaid version of chatgpt as a security expert and data scientist we see these examples as harbingers of a future where ai companies profit from manipulating their users behavior for the benefit of their advertisers and investors it s also a reminder that time to steer the direction of ai development away from private exploitation and toward public benefit is quickly running out the functionality of chatgpt search and its atlas browser is not really new meta commercial ai competitor perplexity and even chatgpt itself have had similar ai search features for years and both google and microsoft beat openai to the punch by integrating ai with their browsers but openai s business positioning signals a shift we believe the chatgpt search and atlas announcements are worrisome because there is really only one way to make money on search the advertising model pioneered ruthlessly by google advertising model ruled a monopolist in u s federal court google has earned more than us 1 6 trillion in advertising revenue since 2001 you may think of google as a web search company or a streaming video company youtube or an email company gmail or a mobile phone company android pixel or maybe even an ai company gemini but those products are ancillary to google s bottom line the advertising segment typically accounts for 80 to 90 of its total revenue everything else is there to collect users data and direct users attention to its advertising revenue stream after two decades in this monopoly position google s search product is much more tuned to the company s needs than those of its users when google search first arrived decades ago it was revelatory in its ability to instantly find useful information across the still nascent web in 2025 its search result pages are dominated by low quality and often ai generated content spam sites that exist solely to drive traffic to amazon sales a tactic known as affiliate marketing and paid ad placement...
Thumbnail images (randomly selected): * Images may be subject to copyright.GREEN status (no comments)
  • Rewiring Democracy

Verified site has: 90 subpage(s). Do you want to verify them? Verify pages:

1-5 6-10 11-15 16-20 21-25 26-30 31-35 36-40 41-45 46-50
51-55 56-60 61-65 66-70 71-75 76-80 81-85 86-90


The site also has 76 references to external domain(s).

 duckduckgo.com  Verify  facebook.com  Verify  twitter.com  Verify
 theregister.com  Verify  trekmovie.com  Verify  red.anthropic.com  Verify
 csoonline.com  Verify  spectrum.ieee.org  Verify  ibm.com  Verify
 medium.com  Verify  fdzdev.medium.com  Verify  arxiv.org  Verify
 lakera.ai  Verify  llm-attacks.org  Verify  nature.com  Verify
 ncase.me  Verify  dfpi.ca.gov  Verify  en.wikipedia.org  Verify
 simonwillison.net  Verify  cmu.edu  Verify  hai.stanford.edu  Verify
 arstechnica.com  Verify  bbc.com  Verify  computer.org  Verify
 cacm.acm.org  Verify  blog.citp.princeton.edu  Verify  technologyreview.com  Verify
 openai.com  Verify  adweek.com  Verify  digiday.com  Verify
 searchengineland.com  Verify  engadget.com  Verify  perplexity.ai  Verify
 windowscentral.com  Verify  adage.com  Verify  scholar.google.com  Verify
 proceedings.neurips.cc  Verify  nytimes.com  Verify  theverge.com  Verify
 gemini.google  Verify  blogs.windows.com  Verify  washingtonpost.com  Verify
 law.stanford.edu  Verify  statista.com  Verify  cnbc.com  Verify
 404media.co  Verify  investopedia.com  Verify  professional.dce.harvard.edu  Verify
 doi.org  Verify  theatlantic.com  Verify  gizmodo.com  Verify
 reuters.com  Verify  epic.org  Verify  iapp.org  Verify
 theconversation.com  Verify  forbes.com  Verify  sfgate.com  Verify
 jstor.org  Verify  npr.org  Verify  lawfaremedia.org  Verify
 sfchronicle.com  Verify  cyera.com  Verify  github.com  Verify
 community.n8n.io  Verify  thehackernews.com  Verify  nvd.nist.gov  Verify
 cybersecuritydive.com  Verify  bleepingcomputer.com  Verify  securityweek.com  Verify
 cisa.gov  Verify  wordpress.com  Verify  pressable.com  Verify
 public-interest-tech.com  Verify  hks.harvard.edu  Verify  eff.org  Verify
 inrupt.com  Verify


Top 50 hastags from of all verified websites.

Supplementary Information (add-on for SEO geeks)*- See more on header.verify-www.com

Header

HTTP/1.1 301 Moved Permanently
Server nginx
Date Tue, 27 Jan 2026 05:30:10 GMT
Content-Type text/html
Content-Length 162
Connection keep-alive
Location htt????/schneier.com/
Alt-Svc h3= :443 ; ma=86400
Server-Timing a8c-cdn, dc;desc=cdg, cache;desc=BYPASS;dur=0.0
HTTP/2 301
server nginx
date Tue, 27 Jan 2026 05:30:10 GMT
content-type text/html
content-length 162
location htt????/www.schneier.com/
strict-transport-security max-age=31536000
x-ac 1.cdg _atomic_ams MISS
alt-svc h3= :443 ; ma=86400
server-timing a8c-cdn, dc;desc=cdg, cache;desc=MISS;dur=10.0
HTTP/2 200
server nginx
date Tue, 27 Jan 2026 05:30:10 GMT
content-type text/html; charset=UTF-8
strict-transport-security max-age=31536000
vary Accept-Encoding
last-modified Tue, 27 Jan 2026 05:29:49 GMT
cache-control max-age=279, must-revalidate
x-nananana Batcache-Hit
host-header wpcloud
vary Cookie
permissions-policy private-state-token-redemption=(self htt????/www.google.com htt????/www.gstatic.com htt????/recaptcha.net htt????/challenges.cloudflare.com htt????/hcaptcha.com ), private-state-token-issuance=(self htt????/www.google.com htt????/www.gstatic.com htt????/recaptcha.net htt????/challenges.cloudflare.com htt????/hcaptcha.com )
link <htt????/www.schneier.com/wp-json/>; rel= htt????/api.w.org/
content-encoding gzip
x-ac 2.cdg _atomic_ams MISS
alt-svc h3= :443 ; ma=86400
server-timing a8c-cdn, dc;desc=cdg, cache;desc=MISS;dur=343.0

Meta Tags

title="Schneier on Security -"
charset="utf-8"
http-equiv="X-UA-Compatible" content="IE=edge"
name="viewport" content="width=device-width, initial-scale=1, user-scalable=no"
name="robots" content="index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1"
property="og:locale" content="en_US"
property="og:type" content="website"
property="og:title" content="Schneier on Security"
property="og:url" content="htt????/www.schneier.com/"
property="og:site_name" content="Schneier on Security"
name="twitter:card" content="summary_large_image"
name="msapplication-TileImage" content="htt????/www.schneier.com/wp-content/uploads/2020/06/cropped-favicon-1-270x270.png"

Load Info

page size95167
load time (s)0.817415
redirect count2
speed download34106
server IP 199.16.172.203
* all occurrences of the string "http://" have been changed to "htt???/"