From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A 25-foot (or maybe 23-foot) giant squid was caught off the coast of Florida.
Also, I'm going to try something new. Let's use this weekly squid post to talk...schneier From Schneier on Security | July 29, 2011 at 09:22 PM
Interesting:
Security researcher Charlie Miller, widely known for his work on Mac OS X and Apple's iOS, has discovered an interesting method that enables him to...schneier From Schneier on Security | July 29, 2011 at 04:31 PM
ShareMeNot is a Firefox add-on for preventing tracking from third-party buttons (like the Facebook "Like" button or the Google "+1" button) until the user actually...schneier From Schneier on Security | July 28, 2011 at 07:02 PM
Good analysis:
Companies would be better off if they all provided meaningful privacy protections for consumers, but privacy is a collective action problem for...schneier From Schneier on Security | July 28, 2011 at 11:27 AM
Matt Blaze analyzes the 2010 U.S. Wiretap Report.
In 2000, government policy finally reversed course, acknowledging that encryption needed to become a critical...schneier From Schneier on Security | July 27, 2011 at 07:10 PM
Good article:
Halderman argued that secure software tends to come from companies that have a culture of taking security seriously. But it's hard to mandate, or...schneier From Schneier on Security | July 27, 2011 at 11:44 AM
In this demonstration, researchers photographed keys from 200 feet away and then made working copies. From the paper:
The access control provided by a physical...schneier From Schneier on Security | July 26, 2011 at 06:28 PM
No indication about how well it works:
The smartphone-based scanner, named Mobile Offender Recognition and Information System, or MORIS, is made by BI2 Technologies...schneier From Schneier on Security | July 26, 2011 at 11:51 AM
Sometimes too much security isn't good.
After observing children on playgrounds in Norway, England and Australia, Dr. Sandseter identified six categories of risky...schneier From Schneier on Security | July 25, 2011 at 06:06 PM
This is clever:
A few miles away across the Rio Grande, the FBI determined that Chavez and Gomez were using lookouts to monitor the SENTRI Express Lane at the...schneier From Schneier on Security | July 25, 2011 at 10:59 AM
Freakonomics asks: "Why has there been such a spike in hacking recently? Or is it merely a function of us paying closer attention and of institutions being more...schneier From Schneier on Security | July 21, 2011 at 11:07 AM
This is interesting:
As we work to protect our users and their information, we sometimes discover unusual patterns of activity. Recently, we found some unusual...schneier From Schneier on Security | July 20, 2011 at 11:23 AM
The police arrested sixteen suspected members of the Anonymous hacker group.
Whatever you may think of their politics, the group committed crimes and their members...schneier From Schneier on Security | July 19, 2011 at 07:50 PM
This is really clever:
Many anticensorship systems work by making an encrypted connection (called a “tunnel”) from the user's computer to a trusted proxy server...schneier From Schneier on Security | July 19, 2011 at 10:27 AM
My new book, Liars and Outliers, has a cover.
Publication is still scheduled for the end of February -- in time for the RSA Conference -- assuming I finish the...schneier From Schneier on Security | July 18, 2011 at 08:49 PM