From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
ShredOS is a stripped-down operating system designed to destroy data.
GitHub page here.Bruce Schneier From Schneier on Security | January 3, 2025 at 09:46 AM
Italian energy company Eni has officially announced one of the world’s most powerful supercomputers that will be used to to scale up its oil and gas discovery technology...staff From insideHPC | January 2, 2025 at 04:01 PM
BERKELEY, Calif.,– Quantum-classical computing company Rigetti announced the launch of its flagship 84-qubit Ankaa-3 system featuring a hardware redesign. Rigetti...staff From insideHPC | January 2, 2025 at 03:47 PM
Lukasz Olejnik writes about device fingerprinting, and why Google’s policy change to allow it in 2025 is a major privacy setback.Bruce Schneier From Schneier on Security | January 2, 2025 at 03:22 PM
Most strings today in software are Unicode strings. It means that you can include mathematical symbols, emojis and so forth. There are many different versions of...Daniel Lemire From Daniel Lemire's Blog | January 2, 2025 at 11:07 AM
Bill's SIGACT Open Problems Column remembering Luca Trevisan is out. I chose the problem of whether Promise-ZPP in P implies Promise-BPP in P, an extension of an...Lance Fortnow From Computational Complexity | January 2, 2025 at 08:30 AM
Alexander Graham Bell was inspired by the deafness of his mother to develop new technologies to help. Lila Harrar, then a computer science student at Queen Mary...Paul Curzon From CS4FN (Computer Science For Fun) | January 1, 2025 at 10:05 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
H1B visas are back in the news these days. One one hand we have some loud calls for more H1B visas with a claim that US native workers are not up to snuff. Or at...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | December 31, 2024 at 07:32 AM
It’s becoming an organized crime tactic:
Card draining is when criminals remove gift cards from a store display, open them in a separate location, and either record...Bruce Schneier From Schneier on Security | December 31, 2024 at 07:02 AM
Modern-day text in software can be expected to be Unicode. Unicode is stored in two formats: UTF-8 and UTF-16. UTF-16 is an encoding system used by several platforms...Daniel Lemire From Daniel Lemire's Blog | December 29, 2024 at 01:24 PM
Next time you are in a large crowd, look around you: all those people moving together, and mostly not bumping into each other. How does it happen? Flocks of birds...Paul Curzon From CS4FN (Computer Science For Fun) | December 29, 2024 at 07:17 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
For the last 20 years or so I have been able to meet some truly great teachers. Some I visited in their schools. Some I met at conferences. Some I have become good...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | December 28, 2024 at 08:07 AM
The basic strategy is to place a device with a hidden camera in a position to capture normally hidden card values, which are interpreted by an accomplice off-site...Bruce Schneier From Schneier on Security | December 27, 2024 at 07:03 AM
Games are becoming ever more realistic. Now, thanks to the work of Joshua Reiss’s research team and their spinout company, Nemisindo, it’s not just the graphics...Paul Curzon From CS4FN (Computer Science For Fun) | December 27, 2024 at 05:46 AM
Pizza Hut in Taiwan has a history of weird pizzas, including a “2022 scalloped pizza with Oreos around the edge, and deep-fried chicken and calamari studded throughout...Bruce Schneier From Schneier on Security | December 27, 2024 at 05:06 AM
Scammers are hacking Google Forms to send email to victims that come from google.com.
Brian Krebs reports on the effects.
Boing Boing post.Bruce Schneier From Schneier on Security | December 26, 2024 at 11:09 AM
by Paul Curzon, Queen Mary University of London Victorian, William Stanley Jevons was born in Liverpool in 1835. He was famous in his day as an economist and his...Paul Curzon From CS4FN (Computer Science For Fun) | December 25, 2024 at 07:09 AM
A judge has found that NSO Group, maker of the Pegasus spyware, has violated the US Computer Fraud and Abuse Act by hacking WhatsApp in order to spy on people using...Bruce Schneier From Schneier on Security | December 24, 2024 at 07:04 AM
By Paul Curzon, Queen Mary University of London Mike Lynch was one of Britain’s most successful entrepreneurs. An electrical engineer, he built his businesses around...Paul Curzon From CS4FN (Computer Science For Fun) | December 24, 2024 at 02:03 AM
by Paul Curzon Queen Mary University of London, first appeared in A BIT of CS4FN 2 Superheroes don’t just have physical powers. Often they come out on top because...Paul Curzon From CS4FN (Computer Science For Fun) | December 23, 2024 at 05:13 PM