From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The error rate for hand-counted ballots is about two percent.
All voting systems have nonzero error rates. This doesn't surprise technologists, but does surprise...schneier From Schneier on Security | February 7, 2012 at 11:53 AM
In 2005, I wrote an essay called "The Failure of Two-Factor Authentication," where I predicted that attackers would get around multi-factor authentication systems...schneier From Schneier on Security | February 6, 2012 at 07:23 PM
It's called Squid.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | February 3, 2012 at 10:18 PM
Reuters discovered the information:
The VeriSign attacks were revealed in a quarterly U.S. Securities and Exchange Commission filing in October that followed new...schneier From Schneier on Security | February 3, 2012 at 04:49 PM
Really good article on the huge incarceration rate in the U.S., its causes, its effects, and its value:
Over all, there are now more people under "correctional...schneier From Schneier on Security | February 2, 2012 at 03:04 PM
Brian C. Kalt (2012), "The Idaho Loophole," Georgetown Law Journal, Vol. 93, No. 2.
Abstract: This article argues that there is a 50-square-mile swath of Idaho...schneier From Schneier on Security | February 1, 2012 at 12:05 PM
The storyline:
TSA screener finds two pipes in passenger's bags.
Screener determines that they're not a threat.
Screener confiscates them anyway, because of...schneier From Schneier on Security | January 31, 2012 at 11:03 PM
Some errors in forensic science may be the result of the biases of the medical examiners:
Though they cannot prove it, Dr Dror and Dr Hampikian suspect the difference...schneier From Schneier on Security | January 31, 2012 at 05:13 PM
According to my publisher, the book was printed last week and the warehouse is shipping orders to booksellers today. Amazon is likely to start shipping books on...schneier From Schneier on Security | January 30, 2012 at 07:59 PM
Does this story make sense to anyone?
The Department of Homeland Security flagged him as a potential threat when he posted an excited tweet to his pals about his...schneier From Schneier on Security | January 30, 2012 at 04:52 PM
This was pretty good, I thought:
However, it may be difficult to write military doctrine for many aspects of cyberconflict that are truly revolutionary. Here are...schneier From Schneier on Security | January 30, 2012 at 12:02 PM
Interesting article from the New York Times on password sharing as a show of affection.
"It's a sign of trust," Tiffany Carandang, a high school senior in Sandiscusses...schneier From Schneier on Security | January 27, 2012 at 12:39 PM
Readers of this blog will know that I like the works of Max Abrams, and regularly blog them. He has a new paper (full paper behind paywall) in Defence and Peace...schneier From Schneier on Security | January 26, 2012 at 04:36 PM
The U.S Supreme Court has ruled that the police cannot attach a GPS tracking device to a car without a warrant.schneier From Schneier on Security | January 25, 2012 at 06:54 PM
The NSF is funding research on giving organizations information-security risk ratings, similar to credit ratings for individuals:
Existing risk management techniques...schneier From Schneier on Security | January 25, 2012 at 12:44 PM
Turns out you can create unique signatures from plant DNA. The idea is to spray this stuff on military components in order to verify authentic items and detect...schneier From Schneier on Security | January 24, 2012 at 12:46 PM
DARPA is funding research into new forms of biometrics that authenticate people as they use their computer: things like keystroke patterns, eye movements, mouse...schneier From Schneier on Security | January 23, 2012 at 05:49 PM
The state of Texas gets an armed PT boat.
I guess armed drones weren't enough for them. schneier From Schneier on Security | January 20, 2012 at 12:39 PM