From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A real-world one-way function:
Alice and Bob procure the same edition of the white pages book for a particular town, say Cambridge. For each letter Alice wants...schneier From Schneier on Security | April 9, 2013 at 06:49 PM
Interesting article from the New Yorker.
I'm often asked what I think about bitcoins. I haven't analyzed the security, but what I have seen looks good. The real...schneier From Schneier on Security | April 9, 2013 at 11:05 AM
I hadn't heard of this term before, but it's an interesting one. The excerpt below is from an interview with Rebecca Solnit, author of A Paradise Built in Hell...schneier From Schneier on Security | April 8, 2013 at 06:30 PM
Interesting article about the perception of hackers in popular culture, and how the government uses the general fear of them to push for more power:
But theseoverzealous...schneier From Schneier on Security | April 8, 2013 at 11:34 AM
Page 18 of this thesis explains that squid fishing is done at night, and the lighting is so bright shows up in the satellite surveys of planetary lighting. This...schneier From Schneier on Security | April 5, 2013 at 09:08 PM
The U.S. Drug Enforcement Agency has complained (in a classified report, not publicly) that Apple's iMessage end-to-end encryption scheme can't be broken. On the...schneier From Schneier on Security | April 5, 2013 at 06:05 PM
Xkcd had a Skein collision competition. The contest is over -- Carnegie Mellon University won, with 384 (out of 1024) mismatched bits -- but it's explained here...schneier From Schneier on Security | April 5, 2013 at 11:35 AM
Whether it's Syria using Facebook to help identify and arrest dissidents or China using its "Great Firewall" to limit access to international news throughout the...schneier From Schneier on Security | April 3, 2013 at 12:29 PM
It's back, after a two-year hiatus. Terrorism is boring; cyberwar is in. Cyberwar, and its kin: cyber Pearl Harbor, cyber 9/11, cyber Armageddon. (Or make up...schneier From Schneier on Security | April 1, 2013 at 05:38 PM
I'm starting to think about my next book, which will be about power and the Internet -- from the perspective of security. My objective will be to describe current...schneier From Schneier on Security | April 1, 2013 at 11:07 AM
Really:
An unexploded bomb was found inside a squid when the fish was slaughtered at a fish market in Guangdong province.
Oddly enough, this doesn't seem to be...schneier From Schneier on Security | March 29, 2013 at 09:19 PM
Interesting article, "The Dangers of Surveillance," by Neil M. Richards, Harvard Law Review, 2013. From the abstract:
....We need a better account of the dangers...schneier From Schneier on Security | March 29, 2013 at 05:25 PM
This is a really clever attack on the RC4 encryption algorithm as used in TLS.
We have found a new attack against TLS that allows an attacker to recover a limited...schneier From Schneier on Security | March 29, 2013 at 11:59 AM
This is a story about a physicist who got taken in by an imaginary Internet girlfriend and ended up being arrested in Argentina for drug smuggling. Readers of...schneier From Schneier on Security | March 28, 2013 at 01:36 PM
Should companies spend money on security awareness training for their employees? It's a contentious topic, with respected experts on both sides of the debate.right...schneier From Schneier on Security | March 27, 2013 at 11:47 AM
The NSA has published declassified versions of its Cryptolog newsletter. All the issues from Aug 1974 through Summer 1997 are on the web, although there are some...schneier From Schneier on Security | March 26, 2013 at 07:15 PM
Turns out that it's pretty easy:
Researchers at the Massachusetts Institute of Technology (MIT) and the Catholic University of Louvain studied 15 months' worth...schneier From Schneier on Security | March 26, 2013 at 02:29 PM
I'm going to start with three data points.
One: Some of the Chinese military hackers who were implicated in a broad set of attacks against the U.S. governmentaccessed...schneier From Schneier on Security | March 25, 2013 at 11:28 AM