From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
GCHQ, the UK government's communications headquarters, has released two new -- well, 70 years old, but new to us -- cryptanalysis documents by Alan Turing.
The...schneier From Schneier on Security | April 23, 2012 at 11:18 AM
How to extract squid ink.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | April 20, 2012 at 09:49 PM
Liars & Outliers has been available for about two months, and is selling well both in hardcover and e-book formats. More importantly, I'm very pleased with the...schneier From Schneier on Security | April 20, 2012 at 05:48 PM
Interesting data from the U.S. Government Accounting Office:
But congressional auditors have questions about other efficiencies as well, like having 3,000 "behavior...schneier From Schneier on Security | April 20, 2012 at 11:19 AM
A burglar was identified by his dance moves, captured on security cameras:
"The 16-year-old juvenile suspect is known for his 'swag,' or signature dance move,"...schneier From Schneier on Security | April 19, 2012 at 06:03 PM
Brian Krebs writes about smart meter hacks:
But it appears that some of these meters are smarter than others in their ability to deter hackers and block unauthorized...schneier From Schneier on Security | April 19, 2012 at 10:52 AM
Here's something good:
We have implemented sophisticated brute force protection for Linode Manager user accounts that combines a time delay on failed attempts,...schneier From Schneier on Security | April 18, 2012 at 06:30 PM
This article talks about a database of stolen cell phone IDs that will be used to deny service. While I think this is a good idea, I don't know how much it would...schneier From Schneier on Security | April 18, 2012 at 11:49 AM
That's a nice turn of phrase:
Forever day is a play on "zero day," a phrase used to classify vulnerabilities that come under attack before the responsible manufacturer...schneier From Schneier on Security | April 17, 2012 at 06:22 PM
From the CIA journal Studies in Intelligence: "Capturing the Potential of Outlier Ideas in the Intelligence Community."
In war you will generally find that the...schneier From Schneier on Security | April 17, 2012 at 11:15 AM
Kip Hawley wrote an essay for the Wall Street Journal on airport security. In it, he says so many sensible things that people have been forwarding it to me with...schneier From Schneier on Security | April 16, 2012 at 05:29 PM
Really interesting paper on the moral and ethical implications of cyberwar, and the use of information technology in war (drones, for example):
"Information Warfare...schneier From Schneier on Security | April 16, 2012 at 10:55 AM
Great short story in Nature.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | April 13, 2012 at 09:48 PM
This is not a video of my talk at the RSA Conference earlier this year. This is a 16-minute version of that talk -- TED-like -- that the conference filmed the...schneier From Schneier on Security | April 13, 2012 at 07:11 PM
One of the problems with Tor traffic is that it can de detected and blocked. Here's SkypeMorph, a clever system that disguises Tor traffic as Skype video traffic...schneier From Schneier on Security | April 13, 2012 at 12:08 PM
The University of Pittsburgh has been the recipient of 50 bomb threats in the past two months (over 30 during the last week). Each time, the university evacuates...schneier From Schneier on Security | April 12, 2012 at 06:34 PM
Interesting video of Brian Snow speaking from last November. (Brian used to be the Technical Director of NSA's Information Assurance Directorate.) About a year...schneier From Schneier on Security | April 12, 2012 at 11:38 AM
I read this a couple of months ago, and I'm still not sure what I think about it. It's definitely of the most thought-provoking essays I've read this year.
According...schneier From Schneier on Security | April 11, 2012 at 06:25 PM
Usually I don't bother posting random stories about dumb or inconsistent airport security measures. But this one is particularly interesting:
"Sir, your trousers...schneier From Schneier on Security | April 11, 2012 at 02:57 PM
Good article debunking the myth that young people don't care about privacy on the Intenet.
Most kids are well aware of risks, and make "fairly sophisticated" decisions...schneier From Schneier on Security | April 10, 2012 at 03:21 PM