From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I'm dubious:
At a demonstration of the technology this week, project manager Robert P. Burns said the idea is to track a set of involuntary physiological reactions...schneier From Schneier on Security | October 7, 2009 at 05:54 PM
Witnesses are much more accurate at identifying criminals when computers assist in the identification process, not police officers.
A major cause of miscarriages...schneier From Schneier on Security | October 7, 2009 at 12:12 PM
You'd think this would be obvious:
Douglas Havard, 27, serving six years for stealing up to schneier From Schneier on Security | October 6, 2009 at 07:32 PM
This is brilliant:
The sophisticated hack uses a Trojan horse program installed on the victim's machine that alters html coding before it's displayed in the user's...schneier From Schneier on Security | October 6, 2009 at 11:40 AM
Wow. It's over 2,000 pages, so it'll take time to make any sense of. According to Ross Anderson, who's given it a quick look over, "it seems to be the bureaucratic...schneier From Schneier on Security | October 5, 2009 at 08:10 PM
It's a security risk:
The crate was hoisted onto the flatbed with a 120-ton construction crane. For security reasons, there were no signs on the truck indicating...schneier From Schneier on Security | October 5, 2009 at 06:29 PM
For the U.N. General Assembly:
For those entranced by security theater, New York City is a sight to behold this week. A visit to one of the two centers of the...schneier From Schneier on Security | October 2, 2009 at 05:23 PM
This is interesting:
Professor Gernot Heiser, the John Lions Chair in Computer Science in the School of Computer Science and Engineering and a senior principal...Schneier From Schneier on Security | October 2, 2009 at 09:25 AM
During a daring bank robbery in Sweden that involved a helicopter, the criminals disabled a police helicopter by placing a package with the word "bomb" near the...Schneier From Schneier on Security | October 1, 2009 at 10:50 AM
Reproducing keys from distant and angled photographs:
Abstract:The access control provided by a physical lock is based on the assumption that the information content...Schneier From Schneier on Security | October 1, 2009 at 09:27 AM
New experiment demonstrates what we already knew:
That's because people tend to view their immediate emotions, such as their perceptions of threats or risks, as...schneier From Schneier on Security | September 30, 2009 at 06:17 PM
Crypteto has a 49,152-bit symmetric key:
The most important issue of any encryption product is the 'bit key strength'. To date the strongest known algorithm has...schneier From Schneier on Security | September 30, 2009 at 10:52 AM
The average American commits three felonies a day: the title of a new book by Harvey Silverglate. More specifically, the problem is the intersection of vague laws...schneier From Schneier on Security | September 29, 2009 at 06:08 PM
Turns out "gaydar" can be automated:
Using data from the social network Facebook, they made a striking discovery: just by looking at a person's online friends,...schneier From Schneier on Security | September 29, 2009 at 12:13 PM
In computer security, a lot of effort is spent on the authentication problem. Whether it's passwords, secure tokens, secret questions, image mnemonics, or something...schneier From Schneier on Security | September 28, 2009 at 06:34 PM
Nobody tell the TSA, but last month someone tried to assassinate a Saudi prince by exploding a bomb stuffed in his rectum. He pretended to be a repentant militant...schneier From Schneier on Security | September 28, 2009 at 11:19 AM
First one sighted in the Gulf since 1954:
The new specimen, weighing 103 pounds, was found during a preliminary survey of the Gulf during which scientists hope...schneier From Schneier on Security | September 25, 2009 at 06:04 PM