From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
BoingBoing is pretty snarky:
The TSA has published a "redacted" version of their s00per s33kr1t screening procedure guidelines (Want to know whether to frisk a...schneier From Schneier on Security | December 10, 2009 at 12:47 PM
Schmidt said:
I think judgment matters. If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place. If you really...schneier From Schneier on Security | December 9, 2009 at 06:22 PM
This, from The New England Journal of Medicine, sounds familiar:
This is the story line for most headline-grabbing illnesses schneier From Schneier on Security | December 9, 2009 at 12:43 PM
I missed this story:
Since 2007, the U.S. State Department has been issuing high-tech "e-passports," which contain computer chips carrying biometric data to prevent...schneier From Schneier on Security | December 8, 2009 at 12:05 PM
In an AP story on increased security at major football (the American variety) events, this sentence struck me:
"High-profile events are something that terrorist...schneier From Schneier on Security | December 7, 2009 at 01:53 PM
Wired summarizes research by Christopher Soghoian:
Sprint Nextel provided law enforcement agencies with customer location data more than 8 million times between...schneier From Schneier on Security | December 3, 2009 at 11:47 AM
It can be impossible to securely delete a file:
What are the security implications of Volume Shadow Copy?
Suppose you decide to protect one of your documents...schneier From Schneier on Security | December 2, 2009 at 09:49 AM
This research centers on looking at the radio characteristics of individual RFID chips and creating a "fingerprint." It makes sense; fingerprinting individual...schneier From Schneier on Security | December 1, 2009 at 04:15 PM
National Journal has an excellent article on cyberwar policy. I agree with the author's comments on The Atlantic blog:
Would the United States ever use a morereport...schneier From Schneier on Security | December 1, 2009 at 12:59 PM
This is a very interesting paper: "The Real Hustle, which does hidden camera demonstrations of con games. (There's no DVD of the show available, but there areprevious...schneier From Schneier on Security | November 30, 2009 at 10:20 AM
This 1996 interview with psychiatrist Robert DuPont was part of a Frontline program called "Nuclear Reaction."
He's talking about the role fear plays in the perception...schneier From Schneier on Security | November 27, 2009 at 02:25 PM
Wikileaks has published pager intercepts from New York on 9/11:
WikiLeaks released half a million US national text pager intercepts. The intercepts cover a 24nuggets...schneier From Schneier on Security | November 26, 2009 at 01:11 PM
Long, detailed, and very good story of the Mumbai terrorist attacks of last year.
My own short commentary in the aftermath of the attacks.
schneier From Schneier on Security | November 25, 2009 at 07:52 PM
If you allow players in an online world to penalize each other, you open the door to extortion:
One of the features that supported user socialization in the game...schneier From Schneier on Security | November 25, 2009 at 10:11 AM
This paper, by Cormac Herley at Microsoft Research, sounds like me:
Abstract: It is often suggested that users are hopelessly lazy and unmotivated on securityme...schneier From Schneier on Security | November 24, 2009 at 04:06 PM
Norbt (no robot) is a low-security web application to encrypt web pages. You can create and encrypt a webpage. The key is an answer to a question; anyone who...schneier From Schneier on Security | November 24, 2009 at 09:24 AM
This article reads like something written by the company's PR team.
When it comes to sleuthing these days, knowing your way within a database is as valued a skill...schneier From Schneier on Security | November 23, 2009 at 08:36 PM
I would sure like to know more about this:
Top code-breakers at the Government Communications Headquarters in the United Kingdom have succeeded in breaking the...schneier From Schneier on Security | November 23, 2009 at 09:53 AM