From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In Liars and Outliers, I talk a lot about social norms and when people follow them. This research uses survival data from shipwrecks to measure it.
The authors...schneier From Schneier on Security | August 14, 2012 at 06:16 PM
I'm late writing about this one. Cryptocat is a web-based encrypted chat application. After Wired published a pretty fluffy profile on the program and its author...schneier From Schneier on Security | August 14, 2012 at 11:00 AM
This is kind of a rambling essay on the need to spend more on infrastructure, but I was struck by this paragraph:
Here's a news flash: There are some events that...schneier From Schneier on Security | August 13, 2012 at 05:41 PM
Stuart Baker calls them "proxy talks" because they're not government to government, but it's a start.schneier From Schneier on Security | August 13, 2012 at 11:57 AM
The sex life of the dumpling squid.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | August 10, 2012 at 09:02 PM
Sure, stories like this are great fun, but I don't think it's much of a security concern. Terrorists can't build a plot around random occasional security failures...schneier From Schneier on Security | August 10, 2012 at 10:51 AM
This is the latest in the arms race between spoofing GPS signals and detecting spoofed GPS signals.
Unfortunately, the countermeasures all seem to be patent pending...schneier From Schneier on Security | August 9, 2012 at 11:32 AM
They were able to hack into government websites:
The gang’s USP, and the reason it could charge up to 10,000 yuan (£1,000) per certificate, was that it could hack...schneier From Schneier on Security | August 8, 2012 at 06:04 PM
A hacker can social-engineer his way into your cloud storageand delete everything you have.
It turns out, a billing address and the last four digits of a credit...schneier From Schneier on Security | August 8, 2012 at 11:31 AM
Ohio State University Law Professor Peter Swire testifies before Congress on the inadequacy of industry self-regulation to protect privacy.schneier From Schneier on Security | August 7, 2012 at 06:45 PM
Interesting article on using risk-limiting auditing in determining if an election's results are likely to be valid. The risk, in this case, is in the chance of...schneier From Schneier on Security | August 7, 2012 at 12:14 PM
Some things never change. Thirteen years ago, Mudge and I published a paper breaking Microsoft's PPTP protocol and the MS-CHAP authentication system. I haven't...schneier From Schneier on Security | August 6, 2012 at 04:22 PM
The Verified Voting Foundation has released a comprehensive state-by-state report on electronic voting machines (report, executive summary, and news coverage)....schneier From Schneier on Security | August 6, 2012 at 11:43 AM
It seems that quantum computers might use superconducting quantum interference devices (SQUIDs).
As usual, you can also use this squid post to talk about the security...schneier From Schneier on Security | August 3, 2012 at 09:08 PM
In a long article about insecurities in gun safes, there's this great paragraph:
Unfortunately, manufacturers and consumers are deceived and misled into a false...schneier From Schneier on Security | August 3, 2012 at 05:57 PM
Horrific events, such as the massacre in Aurora, can be catalysts for social and political change. Sometimes it seems that they're the only catalyst; recall how...schneier From Schneier on Security | August 3, 2012 at 11:03 AM
Year ago, EPIC sued the TSA over full body scanners (I was one of the plantiffs), demanding that they follow their own rules and ask for public comment. The court...schneier From Schneier on Security | August 2, 2012 at 07:19 PM