From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The wings of the Goniurellia tridens fruit fly have images of an ant on them, to deceive predators: "When threatened, the fly flashes its wings to give the appearance...schneier From Schneier on Security | November 6, 2013 at 02:53 PM
This is interesting reading, but I'm left wanting more. What are the lessons here? How can we do this better next time? Clearly we won't be able to anticipate...schneier From Schneier on Security | November 5, 2013 at 07:53 AM
This New York Times story on the NSA is very good, and contains lots of little tidbits of new information gleaned from the Snowden documents.
The agency’s Dishfire...schneier From Schneier on Security | November 4, 2013 at 02:39 PM
Good story of badBIOS, a really nasty piece of malware. The weirdest part is how it uses ultrasonic sound to jump air gaps.
Ruiu said he arrived at the theory...schneier From Schneier on Security | November 4, 2013 at 07:15 AM
Make your own 8-foot giant squid pillow.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
schneier From Schneier on Security | November 1, 2013 at 05:40 PM
This is from 2006 -- I blogged it here -- but it's even more true today.
Under a top secret program initiated by the Bush Administration after the Sept. 11 attacks...schneier From Schneier on Security | November 1, 2013 at 03:26 PM
In Spring Semester, I'm running a reading group -- which seems to be a formal variant of a study group -- at Harvard Law School on "Security, Power, and the Internet...schneier From Schneier on Security | November 1, 2013 at 03:03 PM
This article talks about applications in retail, but the possibilities are endless.
Every smartphone these days comes equipped with a WiFi card. When the cardpick...schneier From Schneier on Security | November 1, 2013 at 07:32 AM
The Washington Post reported that the NSA is eavesdropping on the Google and Yahoo private networks -- the code name for the program is MUSCULAR. I may write more...schneier From Schneier on Security | October 31, 2013 at 11:29 AM
We're in the middle of an epic battle for power in cyberspace. On one side are the traditional, organized, institutional powers such as governments and large multinational...schneier From Schneier on Security | October 30, 2013 at 07:50 AM
Jack Goldsmith argues that we need the NSA to surveil the Internet not for terrorism reasons, but for cyberespionage and cybercrime reasons. Daniel Gallington ...schneier From Schneier on Security | October 29, 2013 at 06:54 AM
The primary difficulty of cyber security isn't technology -- it's policy. The Internet mirrors real-world society, which makes security policy online as complicated...schneier From Schneier on Security | October 28, 2013 at 07:39 AM
Here's a demonstration of the US government's capabilities to monitor the public Internet. Former CIA and NSA Director Michael Hayden was on the Acela train between...schneier From Schneier on Security | October 26, 2013 at 06:43 PM
Female squid exhibit sexually dimorphic tunable leucophores and iridocytes. Just so you know.
Here's the story in more accessible language.
As usual, you can...schneier From Schneier on Security | October 25, 2013 at 10:08 PM
Thomas Rid, Cyber War Will Not Take Place, Oxford University Press, 2013.
Cyber war is possibly the most dangerous buzzword of the Internet era. The fear-inducing...schneier From Schneier on Security | October 25, 2013 at 10:26 AM
Interesting paper: Max Abrahms, "The Credibility Paradox: Violence as a Double-Edged Sword in International Politics," International Studies Quarterly, 2013:
...schneier From Schneier on Security | October 25, 2013 at 07:30 AM
DARPA is looking for a fully-automated network defense system:
What if computers had a "check engine" light that could indicate new, novel security problems? What...schneier From Schneier on Security | October 24, 2013 at 09:45 AM
This is from a Snowden document released by Le Monde:
General Term Descriptions:
HIGHLANDS: Collection from Implants
VAGRANT: Collection of Computer Screens
MAGNETIC...schneier From Schneier on Security | October 23, 2013 at 11:03 AM