From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Long, but interesting, profile of WikiLeaks's Julian Assange from The New Yorker.
Assange is an international trafficker, of sorts. He and his colleagues collect...schneier From Schneier on Security | June 24, 2010 at 06:13 PM
Chicago chef Rick Bayless photographed this security sign, posted before airport security as people were returning home from the Aspen Food & Wine Festival:
No...schneier From Schneier on Security | June 23, 2010 at 06:16 PM
In an article on using terahertz rays (is that different from terahertz radar?) to detect biological agents, we find this quote:
"High-tech, low-tech, we can't...schneier From Schneier on Security | June 23, 2010 at 11:00 AM
The New York Times Room for Debate blog did the topic: "Do We Tolerate Too Many Traffic Deaths?"
schneier From Schneier on Security | June 22, 2010 at 04:50 PM
Interesting:
TM skimmers -- or fraud devices that criminals attach to cash machines in a bid to steal and ultimately clone customer bank card data -- are marketed...schneier From Schneier on Security | June 22, 2010 at 11:49 AM
If you give people enough incentive to cheat, people will cheat:
Of all the forms of academic cheating, none may be as startling as educators tampering with children's...schneier From Schneier on Security | June 21, 2010 at 05:01 PM
I didn't write about the recent security breach that disclosed tens of thousands of e-mail addresses and ICC-IDs of iPad users because, well, there was nothingwere...schneier From Schneier on Security | June 21, 2010 at 10:27 AM
This is cool technology from HP:
Each printer with the ePrint capability will be assigned its own e-mail address. If someone wants to print a document from an...schneier From Schneier on Security | June 18, 2010 at 06:37 PM
The Atlantic on stupid terrorists:
Nowhere is the gap between sinister stereotype and ridiculous reality more apparent than in Afghanistan, where it's fair toPortrait...schneier From Schneier on Security | June 18, 2010 at 10:49 AM
A nice dose of risk reality:
Last week, the American Academy of Pediatrics issued a statement calling for large-type warning labels on the foods that kids most...schneier From Schneier on Security | June 17, 2010 at 07:28 PM
Doesn't the DHS have anything else to do?
As someone who believes that our nation has a right to enforce its borders, I should have been gratified when the Immigrations...schneier From Schneier on Security | June 17, 2010 at 11:57 AM
In at least three U.S. states, it is illegal to film an active duty policeman:
The legal justification for arresting the "shooter" rests on existing wiretapping...schneier From Schneier on Security | June 16, 2010 at 06:36 PM
Interesting:
The capability, called "electrical network frequency analysis" (ENF), is now attracting interest from the FBI and is considered the exciting new frontier...schneier From Schneier on Security | June 16, 2010 at 12:00 PM
The number of different ways to read my essays, commentaries, and links has grown recently. Here's the rundown:
You can read my writings daily on my blog.
These...schneier From Schneier on Security | June 15, 2010 at 06:05 PM
On April 1, I announced the Fifth Annual Movie Plot Threat Contest:
Your task, ye Weavers of Tales, is to create a fable of fairytale suitable for instilling the...schneier From Schneier on Security | June 15, 2010 at 11:02 AM
From the Freakonomics blog:
At some point, the Club was mentioned. The professional thieves laughed and exchanged knowing glances. What we knew was that the Club...schneier From Schneier on Security | June 14, 2010 at 06:46 PM
There's a long article in Nature on the practice:
It remains unclear what the officers found anomalous about George's behaviour, and why he was detained. The TSA's...schneier From Schneier on Security | June 14, 2010 at 11:23 AM