From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Last week, former NSA Director Michael Hayden made a very strong argument against deliberately weakening security products by adding backdoors: Americans' safety...Bruce Schneier From Schneier on Security | January 12, 2016 at 02:22 PM
Interesting analysis: Which software had the most publicly disclosed vulnerabilities this year? The winner is none other than Apple's Mac OS X, with 384 vulnerabilities...Bruce Schneier From Schneier on Security | January 11, 2016 at 03:33 PM
Professional pilot Ron Rapp has written a fascinating article on a 2014 Gulfstream plane that crashed on takeoff. The accident was 100% human error and entirely...Bruce Schneier From Schneier on Security | January 11, 2016 at 07:45 AM
Squid ink pasta is not hard to make, and is a really good side for a wide variety of fish recipes. As usual, you can also use this squid post to talk about the...Bruce Schneier From Schneier on Security | January 8, 2016 at 05:05 PM
The Technoskeptic has posted a good interview with me on its website. Normally it charges for its content, but this interview is available for free....Bruce Schneier From Schneier on Security | January 8, 2016 at 03:15 PM
Fascinating New Yorker article about Samantha Azzopardi, serial con artist and deceiver. The article is really about how our brains allow stories to deceive us:...Bruce Schneier From Schneier on Security | January 8, 2016 at 01:54 PM
China is considering a new "social credit" system, designed to rate everyone's trustworthiness. Many fear that it will become a tool of social control -- but in...Bruce Schneier From Schneier on Security | January 8, 2016 at 06:21 AM
Nice essay that lists ten "truths" about terrorism: We can't keep the bad guys out. Besides, the threat is already inside. More surveillance won't get rid of terrorism...Bruce Schneier From Schneier on Security | January 7, 2016 at 08:00 AM
There's an excellent article in Foreign Affairs on how the European insistence on data privacy -- most recently illustrated by their invalidation of the "safe harbor"...Bruce Schneier From Schneier on Security | January 6, 2016 at 07:14 AM
Recently declassified: Deception Maxims: Fact and Folklore, Office of Research and Development, Central Intelligence Agency, June 1981. Research on deception and...Bruce Schneier From Schneier on Security | January 5, 2016 at 01:44 PM
The Wall Street Journal has a story that the NSA spied on Israeli Prime Minister Benjamin Netanyahu and other Israeli government officials, and incidentally collected...Bruce Schneier From Schneier on Security | January 5, 2016 at 07:36 AM
On the Intercept, Micah Lee has a good article that talks about how Microsoft is collecting the hard-drive encryption keys of Windows 10 users, and how to disable...Bruce Schneier From Schneier on Security | January 4, 2016 at 02:14 PM
Interesting blog post: We are able to de-anonymize executable binaries of 20 programmers with 96% correct classification accuracy. In the de-anonymization process...Bruce Schneier From Schneier on Security | January 4, 2016 at 08:41 AM
Giant squid filmed swimming through a harbor in Japan: Reports in Japanese say that the creature was filmed on December 24, seen by an underwater camera swimming...Bruce Schneier From Schneier on Security | January 1, 2016 at 01:29 PM
Cory Doctorow has a good essay on software integrity and control problems and the Internet of Things. He's writing about self-driving cars, but the issue is much...Bruce Schneier From Schneier on Security | December 31, 2015 at 07:12 AM
A lot of Pennsylvania government officials are being hurt as a result of e-mails being made public. This is all the result of a political pressure to release the...Bruce Schneier From Schneier on Security | December 30, 2015 at 07:29 AM
Brian Krebs has the story. Bottom line: PayPal has no excuse for this kind of stuff. I hope the public shaming incents them to offer better authentication for its...Bruce Schneier From Schneier on Security | December 29, 2015 at 01:25 PM
In theory, the Internet of Things -- the connected network of tiny computers inside home appliances, household objects, even clothing -- promises to make your life...Bruce Schneier From Schneier on Security | December 29, 2015 at 06:58 AM
The Intercept just published a 2011 GCHQ document outlining their exploit capabilities against Juniper networking equipment, including routers and NetScreen firewalls...Bruce Schneier From Schneier on Security | December 28, 2015 at 07:54 AM
Squid sighting in this Christmas cartoon. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. And...Bruce Schneier From Schneier on Security | December 25, 2015 at 04:00 PM