From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Despite looking very different from each other and being distributed across the world's oceans, all giant squid are the same species. There's also not a lot of...schneier From Schneier on Security | March 22, 2013 at 09:12 PM
I have made a few changes to my blog that I'd like to talk about.
The first is the various buttons associated with each post: a Facebook Like button, a Retweet...schneier From Schneier on Security | March 22, 2013 at 08:46 PM
Both Google and recently ruled National Security Letters unconstitutional. Not that this changes anything yet.schneier From Schneier on Security | March 22, 2013 at 12:10 PM
The FBI wants cell phone carriers to store SMS messages for a long time, enabling them to conduct surveillance backwards in time. Nothing new there -- data retention...schneier From Schneier on Security | March 21, 2013 at 06:17 PM
A core, not side, effect of technology is its ability to magnify power and multiply force -- for both attackers and defenders. One side creates ceramic handguns...schneier From Schneier on Security | March 21, 2013 at 12:02 PM
This article is worth reading. One bit:
For a time the FBI put its back into coming up with predictive analytics to help predict insider behavior prior to malicious...schneier From Schneier on Security | March 20, 2013 at 04:51 PM
Twenty five countries are using the FinSpy surveillance software package (also called FinFisher) to spy on their own citizens:
The list of countries with servers...schneier From Schneier on Security | March 19, 2013 at 06:34 PM
From the CIA archives: Orrin Clotworthy, "Some Far-out Thoughts on Computers," Studies in Intelligence v. 6 (1962).schneier From Schneier on Security | March 18, 2013 at 06:00 PM
Symantec has found evidence of Stuxnet variants from way back in 2005. That's much older than the 2009 creation date we originally thought it had. More here and...schneier From Schneier on Security | March 15, 2013 at 10:46 AM
Interesting law paper: "The Implausibility of Secrecy," by Mark Fenster.
Abstract: Government secrecy frequently fails. Despite the executive branch’s obsessive...schneier From Schneier on Security | March 14, 2013 at 05:19 PM
For technology that was supposed to ignore borders, bring the world closer together, and sidestep the influence of national governments the Internet is fostering...schneier From Schneier on Security | March 14, 2013 at 11:11 AM
Click on the "Establishing secure connection" link at the top of this page. It's a Wells Fargo page that displays a progress bar with a bunch of security phrases...schneier From Schneier on Security | March 13, 2013 at 06:30 PM
Nice work:
All current Cisco IP phones, including the ones seen on desks in the White House and aboard Air Force One, have a vulnerability that allows hackers...schneier From Schneier on Security | March 12, 2013 at 06:43 PM
Interesting essay:
Surveillance is part of the system of control. "The more surveillance, the more control" is the majority belief amongst the ruling elites....schneier From Schneier on Security | March 12, 2013 at 11:45 AM
Hats:
De Blowitz was staying at the Kaiserhof. Each day his confederate went there for lunch and dinner. The two never acknowledged one another, but they hung...schneier From Schneier on Security | March 11, 2013 at 05:58 PM