From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Wow. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | April 3, 2015 at 05:16 PM
The security audit of the TrueCrypt code has been completed (see here for the first phase of the audit), and the results are good. Some issues were found, but nothing...Bruce Schneier From Schneier on Security | April 3, 2015 at 02:14 PM
Nice idea, but I would like it to work for other browsers and other e-mail programs....Bruce Schneier From Schneier on Security | April 1, 2015 at 02:13 PM
It's April 1, and time for another Movie-Plot Threat Contest. This year, the theme is Crypto Wars II. Strong encryption is evil, because it prevents the police...Bruce Schneier From Schneier on Security | April 1, 2015 at 07:33 AM
Pew Research has a new survey on Americans' privacy habits in a post-Snowden world. The 87% of those who had heard at least something about the programs were asked...Bruce Schneier From Schneier on Security | March 31, 2015 at 03:54 PM
There's a Chinese CA that's issuing fraudulent Google certificates. Yet another example of why the CA model is so broken....Bruce Schneier From Schneier on Security | March 31, 2015 at 01:42 PM
In the US, certain types of warrants can come with gag orders preventing the recipient from disclosing the existence of warrant to anyone else. A warrant canary...Bruce Schneier From Schneier on Security | March 31, 2015 at 08:19 AM
This is a clever attack, using a black box that attaches to the iPhone via USB: As you know, an iPhone keeps a count of how many wrong PINs have been entered, in...Bruce Schneier From Schneier on Security | March 30, 2015 at 07:47 AM
More research. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | March 27, 2015 at 05:03 PM
Researchers have managed to get two computers to communicate using heat and thermal sensors. It's not really viable communication -- the bit rate is eight per hour...Bruce Schneier From Schneier on Security | March 27, 2015 at 08:01 AM
The Intercept and the New Zealand Herald have reported that New Zealand spied on communications about the World Trade Organization director-general candidates....Bruce Schneier From Schneier on Security | March 26, 2015 at 10:59 AM
There's a new story about the hacking capabilities of Canada's Communications Security Establishment (CSE), based on the Snowden documents....Bruce Schneier From Schneier on Security | March 25, 2015 at 07:55 AM
The Brennan Center has a long report on what's wrong with the FISA Court and how to fix it. At the time of its creation, many lawmakers saw constitutional problems...Bruce Schneier From Schneier on Security | March 24, 2015 at 10:09 AM
We've learned a lot about the NSA's abilities to hack a computer's BIOS so that the hack survives reinstalling the OS. Now we have a research presentation about...Bruce Schneier From Schneier on Security | March 23, 2015 at 08:07 AM
Neat. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | March 20, 2015 at 05:57 PM
David Omand -- GCHQ director from 1996-1997, and the UK's security and intelligence coordinator from 2000-2005 -- has just published a new paper: "Understanding...Bruce Schneier From Schneier on Security | March 20, 2015 at 02:51 PM
Last May, we learned that the NSA intercepts equipment being shipped around the world and installs eavesdropping implants. There were photos of NSA employees opening...Bruce Schneier From Schneier on Security | March 20, 2015 at 07:56 AM
Right now, the book is #6 on the New York Times best-seller list in hardcover nonfiction, and #13 in combined print and e-book nonfiction. This is the March 22...Bruce Schneier From Schneier on Security | March 19, 2015 at 03:49 PM
New research: Max Abrahms and Philip B.K. Potter, "Explaining Terrorism: Leadership Deficits and Militant Group Tactics," International Organizations. Abstract:...Bruce Schneier From Schneier on Security | March 19, 2015 at 10:41 AM