From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Last week, a story broke about how Nokia mounts man-in-the-middle attacks against secure browser sessions.
The Finnish phone giant has since admitted that it decrypts...schneier From Schneier on Security | January 17, 2013 at 03:50 PM
There's a fascinating story about a probable tournament chess cheat. No one knows how he does it; there's only the facts that 1) historically he's not nearly as...schneier From Schneier on Security | January 16, 2013 at 12:25 PM
This essay, which uses the suicide of Aaron Swartz as a jumping off point for how the term "hactivist" has been manipulated by various powers, has this to say about...schneier From Schneier on Security | January 15, 2013 at 12:10 PM
It's both an art project and a practical clothing line.
...Harvey's line of "Stealth Wear" clothing includes an "anti-drone hoodie" that uses metalized material...schneier From Schneier on Security | January 14, 2013 at 07:27 PM
Last week, I blogged about an upcoming Discovery Channel program with actual video footage of a live giant squid. ABC News has a tantalizingly short sneak peak...schneier From Schneier on Security | January 11, 2013 at 09:59 PM
Last August, I offered to sell Liars and Outliers for $11 in exchange for a book review. This was much less than the $30 list price; less even than the $16 Amazon...schneier From Schneier on Security | January 11, 2013 at 02:10 PM
This essay explains why we're all living in failed Hobbesian states:
What do these three implications -- states have a great deal of freedom to determine what...schneier From Schneier on Security | January 10, 2013 at 12:49 PM
Not a cat burglar, a cat smuggler.
Guards thought there was something suspicious about a little white cat slipping through a prison gate in northeastern Brazil...schneier From Schneier on Security | January 8, 2013 at 07:36 PM
This Wall Street Journal investigative piece is a month old, but well worth reading. Basically, the Total Information Awareness program is back with a different...schneier From Schneier on Security | January 8, 2013 at 12:28 PM
Interesting details of an Amazon Marketplace scam. Worth reading.
Most scams use a hook to cause a reaction. The idea being that if you are reacting, they get...schneier From Schneier on Security | January 7, 2013 at 12:31 PM
We'll see it later this month.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | January 4, 2013 at 09:36 PM
This is what Facebook gives the police in response to a subpoena. (Note that this isn't in response to a warrant; it's in response to a subpoena.) This might...schneier From Schneier on Security | January 4, 2013 at 01:48 PM
This is a great essay:
Spheres are special shapes for nuclear weapons designers. Most nuclear weapons have, somewhere in them, that spheres-within-spheres arrangement...schneier From Schneier on Security | January 3, 2013 at 12:03 PM
Fascianting story:
"Come on," Jillette said. "Steal something from me."
Again, Robbins begged off, but he offered to do a trick instead. He instructed Jillette...schneier From Schneier on Security | January 2, 2013 at 02:44 PM
After the Instagram debacle, where it changed its terms of service to give itself greater rights over user photos and reversed itself after a user backlash, it's...schneier From Schneier on Security | December 31, 2012 at 12:44 PM
Good article.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | December 28, 2012 at 09:16 PM
From "The Insider's TSA Dictionary":
Bruce Schneiered: (V, ints) When a passenger uses logic in order to confound and perplex an officer into submission. Ex: "A...schneier From Schneier on Security | December 28, 2012 at 06:34 PM