From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Jared Diamond has an op-ed in the New York Times where he talks about how we overestimate rare risks and underestimate common ones. Nothing new here -- I and others...schneier From Schneier on Security | February 1, 2013 at 12:08 PM
Dan Farmer has an interesting paper (long version here; short version here) discussing the Baseboard Management Controller on your computer's motherboard:
The ...schneier From Schneier on Security | January 31, 2013 at 07:28 PM
All disruptive technologies upset traditional power balances, and the Internet is no exception. The standard story is that it empowers the powerless, but that's...schneier From Schneier on Security | January 31, 2013 at 01:09 PM
Back in 1999 when I formed Counterpane Internet Security, Inc., I popularized the notion that security was a combination of people, process, and technology. Back...schneier From Schneier on Security | January 30, 2013 at 06:20 PM
Lately I've been thinking a lot about power and the Internet, and what I call the feudal model of IT security that is becoming more and more pervasive. Basically...schneier From Schneier on Security | January 30, 2013 at 12:51 PM
I have written about complexity and security for over a decade now (for example, this from 1999). Here's the results of a survey that confirms this:
Results showed...schneier From Schneier on Security | January 29, 2013 at 12:32 PM
This story exemplifies everything that's wrong with our see-something-say-something war on terror: a perfectly innocent person on an airplane, a random person identifying...schneier From Schneier on Security | January 28, 2013 at 07:25 PM
This is fascinating:
Intuitively we understand that people surrounded by violence are more likely to be violent themselves. This isn't just some nebulous phenomenon...schneier From Schneier on Security | January 28, 2013 at 12:07 PM
Just the thing. (Note that this is different than the previous squid USB drive I blogged about.)
As usual, you can also use this squid post to talk about the...schneier From Schneier on Security | January 25, 2013 at 10:15 PM
This interview was conducted last month, at an artificial intelligence conference at Oxford. schneier From Schneier on Security | January 25, 2013 at 08:47 PM
Janesville, Wisconsin, has published information about repeated drunk driving offenders since 2010. The idea is that the public shame will reduce future incidents...schneier From Schneier on Security | January 25, 2013 at 01:03 PM
It's called stylometry, and it's based on the analysis of things like word choice, sentence structure, syntax and punctuation. In one experiment, researchers were...schneier From Schneier on Security | January 24, 2013 at 07:33 PM
Interesting:
The genetic data posted online seemed perfectly anonymous - strings of billions of DNA letters from more than 1,000 people. But all it took was some...schneier From Schneier on Security | January 24, 2013 at 12:48 PM
Ever since the launch of Kim Dotcom's file-sharing service, I have been asked about the unorthodox encryption and security system.
I have not reviewed it, andthis...schneier From Schneier on Security | January 23, 2013 at 06:55 PM
There has been an enormous amount written about the suicide of Aaron Swartz. This is primarily a collection of links, starting with those that use his death to...schneier From Schneier on Security | January 23, 2013 at 12:14 PM
Google is working on non-password authentication techniques.
But for Google's password-liberation plan to really take off, they’re going to need other websites...schneier From Schneier on Security | January 22, 2013 at 06:04 PM
This essay is worth reading:
Obscurity is the idea that when information is hard to obtain or understand, it is, to some degree, safe. Safety, here, doesn't mean...schneier From Schneier on Security | January 22, 2013 at 11:23 AM
This is big news:
The U.S. Transportation Security Administration will remove airport body scanners that privacy advocates likened to strip searches after OSItwo...schneier From Schneier on Security | January 21, 2013 at 12:38 PM
Now that videographers have bagged a giant squid, the search turns to the colossal squid.
As usual, you can also use this squid post to talk about the security...schneier From Schneier on Security | January 18, 2013 at 09:31 PM