From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
There's a serious random-number generation flaw in the cryptographic systems used to protect the Taiwanese digital ID. Article and paper.schneier From Schneier on Security | October 10, 2013 at 07:03 AM
The idea is basically to use indirection to hide physical addresses. You would get a random number to give to your correspondents, and the post office would use...schneier From Schneier on Security | October 9, 2013 at 02:08 PM
As I recently reported in the Guardian, the NSA has secret servers on the Internet that hack into other computers, codename FOXACID. These servers provide an excellent...schneier From Schneier on Security | October 9, 2013 at 07:28 AM
This is a video of me talking about surveillance and privacy, both relating to the NSA and more generally.schneier From Schneier on Security | October 8, 2013 at 02:05 PM
The Guardian recently reported on how the NSA targets Tor users, along with details of how it uses centrally placed servers on the Internet to attack individual...schneier From Schneier on Security | October 8, 2013 at 07:44 AM
Details of how the FBI found the administrator of Silk Road, a popular black market e-commerce site.
Despite the elaborate technical underpinnings, however, the...schneier From Schneier on Security | October 7, 2013 at 02:35 PM
The online anonymity network Tor is a high-priority target for the National Security Agency. The work of attacking Tor is done by the NSA's application vulnerabilities...schneier From Schneier on Security | October 7, 2013 at 07:24 AM
Opens spring 2014.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | October 4, 2013 at 05:17 PM
What's interesting is that this matchstick-sized microphone can be attached to drones.
Conventional microphones work when sound waves make a diaphragm move, creating...schneier From Schneier on Security | October 4, 2013 at 07:59 AM
A National Academy of Sciences panel says no:
Sticking to the quality control aspect of the report, professionalization, it says, has the potential to attractreport...schneier From Schneier on Security | October 3, 2013 at 01:55 PM
Gabriella Coleman has published an interesting analysis of the hacker group Anonymous:
Abstract: Since 2010, digital direct action, including leaks, hacking and...schneier From Schneier on Security | October 3, 2013 at 07:43 AM
"When everything is classified, then nothing is classified."
I should suppose that moral, political, and practical considerations would dictate that a very first...schneier From Schneier on Security | October 2, 2013 at 02:28 PM
Two new stories based on the Snowden documents.
This is getting silly. General Alexander just lied about this to Congress last week. The old NSA tactic of hiding...schneier From Schneier on Security | October 1, 2013 at 02:08 PM
Last year, NIST selected Keccak as the winner of the SHA-3 hash function competition. Yes, I would have rather my own Skein had won, but it was a good choice.
...schneier From Schneier on Security | October 1, 2013 at 11:50 AM
ICANN has a draft study that looks at abuse of the Whois database.
This study, conducted by the National Physical Laboratory (NPL) in the United Kingdom, analyzes...schneier From Schneier on Security | October 1, 2013 at 10:09 AM
We know from the Snowden documents (and other sources) that the NSA taps Internet backbone through secret-agreements with major U.S. telcos., but the U.S. government...schneier From Schneier on Security | September 28, 2013 at 07:10 AM
The Grimalditeuthis bonplandi is the only known squid to use its tenticles to fish:
Its tentacles are thin and fragile, and almost always break off when it's captured...schneier From Schneier on Security | September 27, 2013 at 05:53 PM