From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This proposal is worth thinking about.
Clause 1. If you deliver software with complete and buildable source code and a license that allows disabling any functionality...schneier From Schneier on Security | September 23, 2011 at 10:22 AM
The long-standing ANZUS military treaty now includes cyberspace attacks:
According to Reuters, the decision was made in discussions between the two countries this...schneier From Schneier on Security | September 22, 2011 at 12:09 PM
Risks of teen driving:
For more than a decade, California and other states have kept their newest teen drivers on a tight leash, restricting the hours when they...schneier From Schneier on Security | September 21, 2011 at 11:58 AM
The interesting thing about this attack is how it abuses a variety of different security systems.
Investigations revealed that the syndicate members had managed...schneier From Schneier on Security | September 20, 2011 at 11:36 AM
As you'd expect, it's not very good:
But this measure [Turnitin] captures only the most flagrant form of plagiarism, where passages are copied from one document...schneier From Schneier on Security | September 19, 2011 at 11:35 AM
I've already written how it is possible to detect words and phrases in encrypted VoIP calls. Turns out it's possible to detect speakers as well:
Abstract: Most...schneier From Schneier on Security | September 16, 2011 at 05:31 PM
It's an easy attack. Register a domain that's like your target except for a typo. So it would be countrpane.com instead of counterpane.com, or mailcounterpane...schneier From Schneier on Security | September 16, 2011 at 10:22 AM
New paper: Dengpan Liu, Yonghua Ji, and Vijay Mookerjee (2011), "Knowledge Sharing and Investment Decisions in Information Security," Decision Support Systems,...schneier From Schneier on Security | September 15, 2011 at 05:45 PM
It's been a long hard year, but the book is almost finished. It's certainly the most difficult book I've ever written, mostly because I've had to learn academic...schneier From Schneier on Security | September 15, 2011 at 11:52 AM
This is an interesting study on cultural differences in risk tolerance.
The Cultures of Risk Tolerance
Abstract: This study explores the links between culture...schneier From Schneier on Security | September 14, 2011 at 07:02 PM
There's a lot here that's worth watching. He talks about expanding behavioral detection. He talks about less screening for "trusted travelers."
So, what do the...schneier From Schneier on Security | September 14, 2011 at 11:55 AM
I've written about this before: the human brain just isn't suited to finding rare anomalies in a screening situation.
The Role of the Human Operator in Image-Based...schneier From Schneier on Security | September 13, 2011 at 06:46 PM
I've been posting about a lot of academic articles of late, because that's what I'm reading. Here's another.
Clinton M. Jenkin (2006), Risk Perception and Terrorism...schneier From Schneier on Security | September 13, 2011 at 11:38 AM
Joseph Stiglitz on the price of 9/11.
How 9/11 changed surveillance.
New scientific research as a result of 9/11.
A good controversial piece.
The day we lost...schneier From Schneier on Security | September 12, 2011 at 06:27 PM
This report is really good: "A Call to Courage: Reclaiming Our Liberties Ten Years After 9/11."schneier From Schneier on Security | September 12, 2011 at 02:20 PM
From Italy.
As before, use the comments to this post to write about and discuss security stories that don't have their own post.schneier From Schneier on Security | September 9, 2011 at 09:30 PM
I've already written about secret questions, the easier-to-guess low-security backup password that sites want you to have in case you forget your harder-to-remember...schneier From Schneier on Security | September 8, 2011 at 11:14 AM
Mason Rice, Robert Miller, and Sujeet Shenoi (2011), "May the US Government Monitor Private Critical Infrastructure Assets to Combat Foreign Cyberspace Threats?...schneier From Schneier on Security | September 7, 2011 at 07:32 PM