From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Long article.
With over a thousand cameras operating 24/7, the monitoring room creates tremendous amounts of data every day, most of which goes unseen. Six technicians...schneier From Schneier on Security | February 14, 2013 at 12:32 PM
This is a real story of a pair of identical twins who are suspected in a crime. There is there is CCTV and DNA evidence that could implicate either suspect. Detailed...schneier From Schneier on Security | February 13, 2013 at 07:39 PM
There's not a lot of information -- and quite a lot of hyperbole -- in this article:
With the release of the Asrar Al Dardashah plugin, GIMF promised "secure correspondence"...schneier From Schneier on Security | February 13, 2013 at 12:13 PM
This is an amazing story. I urge you to read the whole thing, but here's the basics:
A November car chase ended in a "full blown-out" firefight, with glass and...schneier From Schneier on Security | February 12, 2013 at 06:55 PM
Society runs on trust. Over the millennia, we've developed a variety of mechanisms to induce trustworthy behavior in society. These range from a sense of guiltThis...schneier From Schneier on Security | February 12, 2013 at 12:53 PM
This is an extremely clever man-in-the-middle timing attack against AES that exploits the interaction between how the protocol implements AES in CBC mode for encryption...schneier From Schneier on Security | February 11, 2013 at 07:25 PM
Interesting article about the difficulty Google has pushing security updates onto Android phones. The problem is that the phone manufacturer is in charge, and...schneier From Schneier on Security | February 11, 2013 at 12:49 PM
Chorizo-stuffed squid with potatoes, capers and sage.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't...schneier From Schneier on Security | February 9, 2013 at 12:28 AM
This seems so obviously written by someone who Googled me on the Internet, without any other knowledge of who I am or what i do.schneier From Schneier on Security | February 8, 2013 at 08:41 PM
This long report looks at risky online behavior among the Millennial generation, and finds that they respond positively to automatic reminders and prodding. No...schneier From Schneier on Security | February 8, 2013 at 05:20 PM
A first-person account of the security surrounding the second inauguration of President Obama.schneier From Schneier on Security | February 8, 2013 at 12:16 PM
Basically, Tide detergent is a popular product with a very small profit margin. So small non-chain grocery and convenience stores are happy to buy it cheaply,started...schneier From Schneier on Security | February 7, 2013 at 06:51 PM
Google's contest at the CanSecWest conference:
Today we’re announcing our third Pwnium competitionPwnium 3. Google Chrome is already featured in the Pwn2Own competition...schneier From Schneier on Security | February 7, 2013 at 12:35 PM
This was big news last week, and I spent a lot of time doing press interviews about it. But while it is an important story -- hacking a newspaper, looking forGhostNet...schneier From Schneier on Security | February 6, 2013 at 12:36 PM
I just printed this out: "Proactive Defense for Evolving Cyber Threats," a Sandia Report by Richard Colbaugh and Kristin Glass. It's a collection of academic...schneier From Schneier on Security | February 5, 2013 at 01:38 PM
I don't see a lot written about security seals, despite how common they are. This article is a very basic overview of the technologies.schneier From Schneier on Security | February 4, 2013 at 07:43 PM
Interesting:
"It's really hard for the government to censor things when they don't understand the made-up words or meaning behind the imagery," said Kevin Lee,...schneier From Schneier on Security | February 4, 2013 at 12:39 PM
Webpage says that it's "the most effective lightweight, portable anchor around."
As usual, you can also use this squid post to talk about the security stories...schneier From Schneier on Security | February 1, 2013 at 10:40 PM