From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The New York Times tries to make sense of the TSA's policies on computers. Why do you have to take your tiny laptop out of your bag, but not your iPad? Their...schneier From Schneier on Security | April 9, 2012 at 12:45 PM
Happy Easter.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | April 6, 2012 at 09:14 PM
The National Academies Press has published Crisis Standards of Care: A Systems Framework for Catastrophic Disaster Response.
When a nation or region prepares...schneier From Schneier on Security | April 6, 2012 at 04:03 PM
Okay, so he doesn't use that term. But he explains how a magician's inherent ability to detect deception can be useful to science.
We can't make magicians out...schneier From Schneier on Security | April 6, 2012 at 10:35 AM
This is the most intelligent thing I've read about the JetBlue incident where a pilot had a mental breakdown in the cockpit:
For decades, public safety officials...schneier From Schneier on Security | April 5, 2012 at 11:19 AM
Good article on the current battle for Internet governance:
The War for the Internet was inevitable -- a time bomb built into its creation. The war grows out of...schneier From Schneier on Security | April 4, 2012 at 05:34 PM
Symantec deliberately "lost" a bunch of smart phones with tracking software on them, just to see what would happen:
Some 43 percent of finders clicked on an app...schneier From Schneier on Security | April 4, 2012 at 11:07 AM
Turns out the password can be easily bypassed:
XRY works by first jailbreaking the handset. According to Micro Systemation, no schneier From Schneier on Security | April 3, 2012 at 07:01 PM
Paul Ceglia's lawsuit against Facebook is fascinating, but that's not the point of this blog post. As part of the case, there are allegations that documents and...schneier From Schneier on Security | April 3, 2012 at 11:53 AM
This article talks about legitimate companies buying zero-day exploits, including the fact that "an undisclosed U.S. government contractor recently paid $250,000...schneier From Schneier on Security | April 2, 2012 at 12:56 PM
Interesting research:
The squid use two closely spaced organs called statocysts to sense sound.
"I think of a statocyst as an inside-out tennis ball," explains...schneier From Schneier on Security | March 30, 2012 at 09:28 PM
Normally I just delete these as spam, but this summer program for graduate students 1) looks interesting, and 2) has some scholarship money available. schneier From Schneier on Security | March 29, 2012 at 07:07 PM
As I posted previously, I have been debating former TSA Administrator Kip Hawley on the Economist website. I didn't bother reposting my opening statement and rebuttal...schneier From Schneier on Security | March 29, 2012 at 11:53 AM
Last weekend was the 2012 SHARCS (Special-Purpose Hardware for Attacking Cryptographic Systems) conference. The presentations are online.schneier From Schneier on Security | March 28, 2012 at 11:05 AM
"Empirical Analysis of Data Breach Litigation," Sasha Romanosky, David Hoffman, and Alessandro Acquisti:
Abstract: In recent years, a large number of data breaches...schneier From Schneier on Security | March 27, 2012 at 12:24 PM
I was supposed to testify today about the TSA in front of the House Committee on Oversight and Government Reform. I was informally invited a couple of weeks ago...schneier From Schneier on Security | March 26, 2012 at 06:02 PM
This is a neat story:
A pair of rare Enigma machines used in the Spanish Civil War have been given to the head of GCHQ, Britain's communications intelligence agency...schneier From Schneier on Security | March 26, 2012 at 11:38 AM
On The Economist website, I am currently debating Kip Hawley on airplane security. On Tuesday we posted our initial statements, and today (London time) we posted...schneier From Schneier on Security | March 23, 2012 at 11:33 AM