From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Can anyone make heads or tails of this story? (More links.)
For my part, I'd like a little -- you know -- evidence. Remember that Ohio was not the deciding state...schneier From Schneier on Security | November 20, 2012 at 06:53 PM
I've been reading lots of articles articles discussing how little e-mail and Internet privacy we actually have in the U.S. This is a good one to start with:
The...schneier From Schneier on Security | November 19, 2012 at 06:40 PM
I noticed this in an article about how increased security and a general risk aversion is harming US diplomatic missions:
"Barbara Bodine, who was the U.S. ambassador...schneier From Schneier on Security | November 19, 2012 at 11:41 AM
Vampire squid eats marine wastes (paper and video).
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...schneier From Schneier on Security | November 16, 2012 at 10:30 PM
Research into one VM stealing crypto keys from another VM running on the same hardware.
ABSTRACT: This paper details the construction of an access-driven side...schneier From Schneier on Security | November 16, 2012 at 12:13 PM
This is idiotic:
Public Intelligence recently posted a Powerpoint presentation from the NYC fire department (FDNY) discussing the unique safety issues mobile food...schneier From Schneier on Security | November 15, 2012 at 12:45 PM
I noticed this amongst the details of the Petraeus scandal:
Petraeus and Broadwell apparently used a trick, known to terrorists and teenagers alike, to conceal...schneier From Schneier on Security | November 14, 2012 at 06:28 PM
At least, that's the story:
The locks at the Tower of London, home to the Crown Jewels, had to be
changed after a burglar broke in and stole keys.
The intruder...schneier From Schneier on Security | November 14, 2012 at 11:57 AM
Dan Boneh of Stanford University is offering a free online cryptography course. The course runs for six weeks, and has five to seven hours of coursework per week...schneier From Schneier on Security | November 13, 2012 at 12:15 PM
Mother fairy wrens teach their children passwords while they're still in their eggs to tell them from cuckoo impostors:
She kept 15 nests under constant audiotheir...schneier From Schneier on Security | November 12, 2012 at 07:03 PM
This article makes the important argument that encryption -- where the user and not the cloud provider holds the keys -- is critical to protect cloud data. The...schneier From Schneier on Security | November 12, 2012 at 11:47 AM
Burger King introduces a black burger with ketchup that includes squid ink. Only in Japan, of course.schneier From Schneier on Security | November 9, 2012 at 10:16 PM
From the Department of Homeland Security, a handy list of 19 suspicious behaviors that could indicate that a hotel guest is actually a terrorist.
I myself have...schneier From Schneier on Security | November 9, 2012 at 07:32 PM
Interesting research from RAND:
Abstract: How do terrorist groups end? The evidence since 1968 indicates that terrorist groups rarely cease to exist as a result...schneier From Schneier on Security | November 9, 2012 at 12:41 PM
Good essay, making the point that cyberattack and counterattack aren't very useful -- actual cyberdefense is what's wanted.
Creating a cyber-rock is cheap. Buying...schneier From Schneier on Security | November 8, 2012 at 07:24 PM
Here's a great concept: a micromort:
Shopping for coffee you would not ask for 0.00025 tons (unless you were naturally irritating), you would ask for 250 grams...schneier From Schneier on Security | November 8, 2012 at 12:57 PM
It's hard for me to get too worked up about this vulnerability:
Many popular applications, HTTP(S) and WebSocket transport libraries, and SOAP and REST Web-services...schneier From Schneier on Security | November 7, 2012 at 07:39 PM