From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This seems like a really bad idea:
...the Transportation Security Administration began a program Tuesday allowing pilots to skirt the security-screening process...schneier From Schneier on Security | August 12, 2011 at 02:46 PM
Just announced:
Nohl's group found a number of problems with GPRS. First, he says, lax authentication rules could allow an attacker to set up a fake cellular base...schneier From Schneier on Security | August 10, 2011 at 09:11 PM
I'm a big fan of taxonomies, and this -- from Carnegie Mellon -- seems like a useful one:
The taxonomy of operational cyber security risks, summarized in Table...schneier From Schneier on Security | August 10, 2011 at 11:39 AM
There's a security story from biology I've used a few times: plants that use chemicals to call in airstrikes by wasps on the herbivores attacking them. This is...schneier From Schneier on Security | August 9, 2011 at 06:09 PM
An article from Salon -- lots of interesting research.
My previous blog post on the topic.schneier From Schneier on Security | August 9, 2011 at 10:45 AM
I've been using the phrase "arms race" to describe the world's militaries' rush into cyberspace for a couple of years now. Here's a good article on the topic that...schneier From Schneier on Security | August 8, 2011 at 11:13 AM
I just can't make this stuff up:
A report of a severed hand found at an Oahu seabird sanctuary has turned out to be dried squid.
Remember: if you see something...schneier From Schneier on Security | August 5, 2011 at 09:24 PM
I admit I don't pay much attention to pencil-and-paper ciphers, so I knew nothing about the Zodiac cipher. Seems it has finally been broken:
The Zodiac Killer...schneier From Schneier on Security | August 5, 2011 at 05:25 PM
I'm not surprised:
The weekly Welt am Sonntag, quoting a police report, said 35 percent of the 730,000 passengers checked by the scanners set off the alarm more...schneier From Schneier on Security | August 5, 2011 at 11:22 AM
Two items on hacking lotteries. The first is about someone who figured out how to spot winner in a scratch-of tic-tac-toe style game, and a daily draw style game...schneier From Schneier on Security | August 4, 2011 at 12:36 PM
Seems that the one-time pad was not first invented by Vernam:
He could plainly see that the document described a technique called the one-time pad fully 35 years...schneier From Schneier on Security | August 3, 2011 at 05:57 PM
The article is in the context of the big Facebook lawsuit, but the part about identifying people by their writing style is interesting:
Recently, a team of computer...schneier From Schneier on Security | August 3, 2011 at 11:08 AM
Eventually, it will work. You'll be able to wear a camera that will automatically recognize someone walking towards you, and a microphone that will automatically...schneier From Schneier on Security | August 2, 2011 at 06:33 PM
Embedded system vulnerabilities in prisons:
Some of the same vulnerabilities that the Stuxnet superworm used to sabotage centrifuges at a nuclear plant in Iran...schneier From Schneier on Security | August 2, 2011 at 11:23 AM
It's a power-analysis attack, which makes it much harder to defend against. And since the attack model is an engineer trying to reverse-engineer the chip, it's...schneier From Schneier on Security | August 1, 2011 at 05:29 PM
Interesting paper: "Science Fiction Prototyping and Security Education: Cultivating Contextual and Societal Thinking in Computer Security Education and Beyond,"...schneier From Schneier on Security | August 1, 2011 at 11:03 AM