From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In Japan:
These balls full of orange paint are anti-theft devices. When someone robs a store, the clerk can throw the ball at the perp (or at the perp's feet)...schneier From Schneier on Security | September 9, 2010 at 06:32 PM
From NPR:
Based on surveys Barnes collected, the top five worries of parents are, in order:
Kidnapping
School snipers
Terroristsknows,...schneier From Schneier on Security | September 8, 2010 at 11:06 AM
If you're a typical wired American, you've got a bunch of tech tools you like and a bunch more you covet. You have a cell phone that can easily text. You've got...schneier From Schneier on Security | September 7, 2010 at 12:25 PM
Back in 2007, I wrote an essay, "Portrait of the Modern Terrorist as an Idiot," where I said:
The JFK Airport plotters seem to have been egged on by an informant...schneier From Schneier on Security | September 6, 2010 at 12:24 PM
Interesting:
Who are these certificate authorities? At the beginning of Web history, there were only a handful of companies, like Verisign, Equifax, and Thawte...schneier From Schneier on Security | September 3, 2010 at 11:27 AM
Clever:
Quantum cryptography is often touted as being perfectly secure. It is based on the principle that you cannot make measurements of a quantum system without...schneier From Schneier on Security | September 2, 2010 at 06:46 PM
This is beyond stupid:
The Pentagon is contemplating an aggressive approach to defending its computer systems that includes preemptive actions such as knocking...schneier From Schneier on Security | September 2, 2010 at 12:33 PM
As part of NIST's SHA-3 selection process, people have been implementing the candidate hash functions on a variety of hardware and software platforms. Our team...schneier From Schneier on Security | September 1, 2010 at 06:17 PM
Skein is my new hash function. Well, "my" is an overstatement; I'm one of the eight designers. It was submitted to NIST for their SHA-3 competition, and oneselected...schneier From Schneier on Security | September 1, 2010 at 11:01 AM
"Protecting your daily in-home activity information from a wireless snooping attack," by Vijay Srinivasan, John Stankovic, and Kamin Whitehouse:
Abstract: In...schneier From Schneier on Security | August 31, 2010 at 05:39 PM
In Australia:
A high school teacher who assigned her class to plan a terrorist attack that would kill as many innocent people as possible had no intent to promote...schneier From Schneier on Security | August 31, 2010 at 11:42 AM
Chilling:
How do most wrongful convictions come about?
The primary cause is mistaken identification. Actually, I wouldn't call it mistaken identification; I'd...schneier From Schneier on Security | August 30, 2010 at 05:05 PM
Since a fatal crash a few years ago, Boston T (their subway) operators have been forbidden from using -- or even having -- cell phones while on the job. Passengers...schneier From Schneier on Security | August 30, 2010 at 10:31 AM
Back in May, I attended the EastWest Institute's First Worldwide Cybersecurity Summit in Dallas. I only had eight minutes to speak, and tried to turn the dialog...schneier From Schneier on Security | August 27, 2010 at 05:47 PM