From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
"Reliably Erasing Data From Flash-Based Solid State Drives," by Michael Wei, Laura M. Grupp, Frederick E. Spada, and Steven Swanson.
Abstract: Reliably erasing...schneier From Schneier on Security | March 1, 2011 at 12:29 PM
One of the effects of writing a book is that I don't have the time to devote to other writing. So while I've been wanting to write about Anonymous vs HBGary, I...schneier From Schneier on Security | February 28, 2011 at 09:13 AM
This is a really good piece by Paul Roberts on Anonymous vs. HBGary: not the tactics or the politics, but what HBGary demonstrates about the IT security industry...schneier From Schneier on Security | February 25, 2011 at 12:14 PM
From Reason:
Know thy enemy is an ancient principle of warfare. And if America had
heeded it, it might have refrained from a full-scale "war" on terrorism whose...schneier From Schneier on Security | February 24, 2011 at 12:44 PM
Interesting story about a con man who conned the U.S. government, and how the government is trying to hide its dealings with him.
For eight years, government officials...schneier From Schneier on Security | February 22, 2011 at 01:21 PM
Interesting:
Squid can hear, scientists have confirmed. But they don't detect the changes in pressure associated with sound waves, like we do. They have another...schneier From Schneier on Security | February 18, 2011 at 10:17 PM
Not an electronic wallet, a physical one:
Virtually indestructible, the dunhill Biometric Wallet will open only with touch of your fingerprint.
It can be linked...schneier From Schneier on Security | February 18, 2011 at 07:45 PM
NIST has just defined two new versions of SHA-512. They're SHA-512/224 and SHA-512/256: 224- and 256-bit truncations of SHA-512 with a new IV. They've done this...schneier From Schneier on Security | February 18, 2011 at 12:22 PM
Recently declassified: "Historical Study: The National Security Agency Scientific Advisory Board 1952schneier From Schneier on Security | February 17, 2011 at 02:38 PM
Interesting article from Wired: "How a Remote Town in Romania Has Become Cybercrime Central."
schneier From Schneier on Security | February 16, 2011 at 12:26 PM
Roger Grimes has an article describing "the seven types of malicious hackers." I generally like taxonomies, and this one is pretty good.
He says the seven types...schneier From Schneier on Security | February 15, 2011 at 07:11 PM
Humans have a natural propensity to trust non-kin, even strangers. We do it so often, so naturally, that we don't even realize how remarkable it is. But except...schneier From Schneier on Security | February 15, 2011 at 11:43 AM
A newly discovered female squid pheromone sparks aggression in male squids. Article.
schneier From Schneier on Security | February 11, 2011 at 10:52 PM
From a blog post:
In my own area of study, the familiar trope of "balancing privacy and security" is a source of constant frustration to privacy advocates, because...schneier From Schneier on Security | February 11, 2011 at 06:48 PM