From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Interesting interview with Viviane Reding, the vice president of the EU Justice Commission and head of privacy regulation:
The basic values in Europe are that...schneier From Schneier on Security | December 23, 2010 at 12:59 PM
He's more realistic than one normally hears:
So if they get through all those defenses, they get to Reagan [National Airport] over here, and they've got an underwear...schneier From Schneier on Security | December 22, 2010 at 06:27 PM
Good commentary:
I've said before and I'll say again, there are lots of possible approaches to threat modeling, and they all involve tradeoffs. I've commentedthe...schneier From Schneier on Security | December 22, 2010 at 01:15 PM
I've written a lot on the "War on Photography," where normal people are harassed as potential terrorists for taking pictures of things in public. This article...schneier From Schneier on Security | December 21, 2010 at 07:39 PM
Cyber War: The Next Threat to National Security and What to do About It by Richard Clarke and Robert Knake, HarperCollins, 2010.
Cyber War is a fast and enjoyable...schneier From Schneier on Security | December 21, 2010 at 01:23 PM
Interesting article from IEEE Spectrum:
During two years of deliberation by the National Academy's forensic science committee (of which I was a member), a troubling...schneier From Schneier on Security | December 20, 2010 at 05:48 PM
Impressive:
Designed for a class project while getting her degree at the Industrial Design Department at the University of Washington, Kaylene Kau has not only...schneier From Schneier on Security | December 17, 2010 at 10:48 PM
From the Journal of Transporation Security, "An evaluation of airport x-ray backscatter units based on image characteristics," by Leon Kaufman and Joseph W. Carlson...schneier From Schneier on Security | December 17, 2010 at 08:13 PM
It has been accused of it.
I doubt this is true. One, it's a very risky thing to do. And two, there are more than enough exploitable security vulnerabilities...schneier From Schneier on Security | December 17, 2010 at 04:49 PM
They can be used to scam Amazon Marketplace merchants:
What happens once our scammer is armed with his fake receipt? Well, many sellers on Amazon will ask you...schneier From Schneier on Security | December 17, 2010 at 12:28 PM
There’s really no such thing as security in the abstract. Security can only be defined in relation to something else. You’re secure from something or against something...Schneier From Schneier on Security | December 16, 2010 at 02:23 PM
They're causing problems:
A white bank robber in Ohio recently used a "hyper-realistic" mask manufactured by a small Van Nuys company to disguise himself as a...schneier From Schneier on Security | December 14, 2010 at 07:12 PM
Interesting profile of Evan Kohlmann:
Evan Kohlmann spends his days lurking in the darkest corners of the Internet, where jihadists recruit sympathizers from across...schneier From Schneier on Security | December 14, 2010 at 11:35 AM
This shouldn't be a surprise:
Karsten Nohl's assessment of dozens of car makes and models found weaknesses in the way immobilisers are integrated with the rest...schneier From Schneier on Security | December 13, 2010 at 08:02 PM
Sex attack caught on camera.
Hamilton police have arrested two men after a sex attack on a woman early today was caught on the city's closed circuit television...schneier From Schneier on Security | December 13, 2010 at 08:01 PM
Against stupid CRB checks:
Last January, Annabel Hayter, chairwoman of Gloucester Cathedral Flower Guild, received an email saying that she and her 60 fellow flower...schneier From Schneier on Security | December 13, 2010 at 12:42 PM