From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Tom's Guide writes about home brew TEMPEST receivers: Today, dirt-cheap technology and free software make it possible for ordinary citizens to run their own Tempest...Bruce Schneier From Schneier on Security | November 4, 2019 at 07:06 AM
Research paper: "Triassic Kraken: The Berlin Ichthyosaur Death Assemblage Interpreted as a Giant Cephalopod Midden": Abstract: The Luning Formation at Berlin Ichthyosaur...Bruce Schneier From Schneier on Security | November 1, 2019 at 05:12 PM
Kathryn Waldron at R Street has collected all of the different resources and methodologies for measuring cybersecurity....Bruce Schneier From Schneier on Security | November 1, 2019 at 07:27 AM
Interesting story. I always recommend using a random number generator like Fortuna, even if you're using a hardware random source. It's just safer....Bruce Schneier From Schneier on Security | October 31, 2019 at 07:24 AM
WhatsApp is suing the Israeli cyberweapons arms manufacturer NSO Group in California court: WhatsApp's lawsuit, filed in a California court on Tuesday, has demanded...Bruce Schneier From Schneier on Security | October 30, 2019 at 10:36 AM
The Carnegie Endowment for Peace published a comprehensive report on ICT (information and communication technologies) supply-chain security and integrity. It's...Bruce Schneier From Schneier on Security | October 29, 2019 at 07:09 AM
In an extraordinary essay, the former FBI general counsel Jim Baker makes the case for strong encryption over government-mandated backdoors: In the face of congressional...Bruce Schneier From Schneier on Security | October 28, 2019 at 07:22 AM
Interesting article and paper. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...Bruce Schneier From Schneier on Security | October 25, 2019 at 05:04 PM
The US Department of Justice unraveled a dark web child-porn website, leading to the arrest of 337 people in at least 18 countries. This was all accomplished not...Bruce Schneier From Schneier on Security | October 25, 2019 at 07:14 AM
This is really interesting: "A Data-Driven Reflection on 36 Years of Security and Privacy Research," by Aniqua Baset and Tamara Denning: Abstract: Meta-research...Bruce Schneier From Schneier on Security | October 24, 2019 at 07:21 AM
There was a successful attack against NordVPN: Based on the command log, another of the leaked secret keys appeared to secure a private certificate authority that...Bruce Schneier From Schneier on Security | October 23, 2019 at 07:15 AM
Coming out of the Privacy Commissioners' Conference in Albania, Public Voice is launching a petition for an international moratorium on using facial recognition...Bruce Schneier From Schneier on Security | October 22, 2019 at 11:12 AM
NIST has completed a study -- it was published last year, but I just saw it recently -- calculating the costs and benefits of the Advanced Encryption Standard....Bruce Schneier From Schneier on Security | October 22, 2019 at 06:56 AM
Interesting details on Olympic Destroyer, the nation-state cyberattack against the 2018 Winter Olympic Games in South Korea. Wired's Andy Greenberg presents evidence...Bruce Schneier From Schneier on Security | October 21, 2019 at 07:23 AM
It's likely the diamondback squid. There's a video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...Bruce Schneier From Schneier on Security | October 18, 2019 at 05:11 PM
Last month, I gave a 15-minute talk in London titled: "Why technologists need to get involved in public policy." In it, I try to make the case for public-interest...Bruce Schneier From Schneier on Security | October 18, 2019 at 03:38 PM
Interesting proof of concept: At the CS3sthlm security conference later this month, security researcher Monta Elkins will show how he created a proof-of-concept...Bruce Schneier From Schneier on Security | October 18, 2019 at 06:54 AM
This is interesting research: In a BGP hijack, a malicious actor convinces nearby networks that the best path to reach a specific IP address is through their network...Bruce Schneier From Schneier on Security | October 17, 2019 at 07:08 AM
Lots of them weren't very good: BSD co-inventor Dennis Ritchie, for instance, used "dmac" (his middle name was MacAlistair); Stephen R. Bourne, creator of the Bourne...Bruce Schneier From Schneier on Security | October 15, 2019 at 11:38 AM
This theoretical paper shows how to factor 2048-bit RSA moduli with a 20-million qubit quantum computer in eight hours. It's interesting work, but I don't want...Bruce Schneier From Schneier on Security | October 14, 2019 at 07:58 AM