From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This paper (full paper behind paywall) -- from Environment International (2009) -- does a good job of separating fact from fiction:
Abstract: In recent yearsThis...schneier From Schneier on Security | June 14, 2013 at 12:15 PM
Ray Wang makes an important point about trust and our data:
This is the paradox. The companies contending to win our trust to manage our digital identities all...schneier From Schneier on Security | June 13, 2013 at 09:06 PM
Facebook regularly abuses the privacy of its users. Google has stopped supporting its popular RSS feeder. Apple prohibits all iPhone apps that are political orGame...schneier From Schneier on Security | June 13, 2013 at 04:34 PM
Here's a quick list of some of my older writings that are related to the current NSA spying documents:
"The Internet Is a Surveillance State ," 2013.
The importance...schneier From Schneier on Security | June 13, 2013 at 11:09 AM
Edward Snowden broke the law by releasing classified information. This isn't under debate; it's something everyone with a security clearance knows. It's written...schneier From Schneier on Security | June 12, 2013 at 11:16 AM
Interesting.
Crazy as these theories are, those propagating them are not -- they’re quite normal, in fact. But recent scientific research tells us this much: if...schneier From Schneier on Security | June 11, 2013 at 05:30 PM
Ignore the sensationalist headline. This article is a good summary of the need for trust in IT, and provides some ideas for how to enable more of it.
Virtually...schneier From Schneier on Security | June 11, 2013 at 11:21 AM
Yesterday, we learned that the NSA received all calling records from Verizon customers for a three-month period starting in April. That's everything except themetadata...schneier From Schneier on Security | June 10, 2013 at 11:12 AM
A squid comic about the importance of precise language in security warnings.
As usual, you can also use this squid post to talk about the security stories in the...schneier From Schneier on Security | June 7, 2013 at 09:35 PM
In this podcast interview, I talk about security, power, and the various things I have been thinking about recently.schneier From Schneier on Security | June 7, 2013 at 07:22 PM
Ars Technica gave three experts a 16,000-entry encrypted password file, and asked them to break them. The winner got 90% of them, the loser 62% -- in a few hours...schneier From Schneier on Security | June 7, 2013 at 11:41 AM
This study claims "terrorism has cost Pakistan around 33.02% of its real national income" between the years 1973 and 2008, or about 1% per year.
The St. Louis$100...schneier From Schneier on Security | June 6, 2013 at 10:58 AM
I'm at the Sixth Interdisciplinary Workshop on Security and Human Behavior (SHB 2013). This year we're in Los Angeles, at USC -- hosted by CREATE.
My description...schneier From Schneier on Security | June 5, 2013 at 12:20 PM
The FBI wants a new law that will make it easier to wiretap the Internet. Although its claim is that the new law will only maintain the status quo, it's reallyeverything...schneier From Schneier on Security | June 4, 2013 at 05:44 PM
Someday I need to write an essay on the security risks of secret algorithms that become part of our infrastructure. This paper gives one example of that. Could...schneier From Schneier on Security | June 4, 2013 at 11:19 AM
New paper from the Harvard Law Review by Daniel Solove: "Privacy Self-Management and the Consent Dilemma":
Privacy self-management takes refuge in consent. It...schneier From Schneier on Security | June 3, 2013 at 11:15 AM
The translated version of a Spanish menu contains the entry "squids in his (her, your) ink."
As usual, you can also use this squid post to talk about the security...schneier From Schneier on Security | May 31, 2013 at 09:39 PM
Interesting article on a greatly increased aspect of surveillance: "the ordinary citizen who by chance finds himself in a position to record events of great public...schneier From Schneier on Security | May 31, 2013 at 11:07 AM