From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This idea, by Stuart Schechter at Microsoft Research, is -- I think -- clever:
Abstract: Implantable medical devices, such as implantable cardiac defibrillators...schneier From Schneier on Security | April 15, 2010 at 11:43 AM
Fifteen years ago, Matt Blaze wrote an Afterword to my book Applied Cryptography. Here are his current thoughts on that piece of writing.
schneier From Schneier on Security | April 14, 2010 at 06:30 PM
Chris Hoofnagle has a new paper: "Internalizing Identity Theft." Basically, he shows that one of the problems is that lenders extend credit even when credit applications...schneier From Schneier on Security | April 14, 2010 at 11:57 AM
John Adams argues that our irrationality about comparative risks depends on the type of risk:
With "pure" voluntary risks, the risk itself, with its associated...schneier From Schneier on Security | April 13, 2010 at 06:18 PM
Nice analysis by John Mueller and Mark G. Stewart:
There is a general agreement about risk, then, in the established regulatory practices of several developed...schneier From Schneier on Security | April 13, 2010 at 08:54 AM
Says Matt Blaze:
A decade ago, I observed that commercial certificate authorities protect you from anyone from whom they are unwilling to take money. That turns...schneier From Schneier on Security | April 12, 2010 at 06:32 PM
An NYU student has been reverse-engineering facial recognition algorithms to devise makeup patterns to confuse face recognition software.
schneier From Schneier on Security | April 12, 2010 at 11:08 AM
Last month at the RSA Conference, I gave a talk titled "Security, Privacy, and the Generation Gap." It was pretty good, but it was the first time I gave that talk...schneier From Schneier on Security | April 9, 2010 at 05:55 PM
New cryptanalysis of the proprietrary encryption algorithm used in the Digital Enhanced Cordless Telecommunications (DECT) standard for cordless phones.
Abstract...schneier From Schneier on Security | April 8, 2010 at 06:05 PM
Air marshals are being arrested faster than air marshals are making arrests.
Actually, there have been many more arrests of Federal air marshals than that story...schneier From Schneier on Security | April 8, 2010 at 11:22 AM
Any ideas?
At a news conference at the National Press Club, WikiLeaks said it had acquired the video from whistle-blowers in the military and viewed it after breaking...schneier From Schneier on Security | April 7, 2010 at 06:37 PM
People intent on preventing a Moscow-style terrorist attack against the New York subway system are proposing a range of expensive new underground security measures...schneier From Schneier on Security | April 7, 2010 at 01:52 PM
In January, Facebook Chief Executive, Mark Zuckerberg, declared the age of privacy to be over. A month earlier, Google Chief Eric Schmidt expressed a similar sentiment...schneier From Schneier on Security | April 6, 2010 at 12:47 PM
This seems like science fiction to me:
The camera uses the same "red eye" effect of from camera flashes to project it hundreds of meters, allowing it to identify...schneier From Schneier on Security | April 5, 2010 at 06:30 PM