From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
TikTok seems to be skewing things in the interests of the Chinese Communist Party. (This is a serious analysis, and the methodology looks sound.)
Conclusion: Substantial...Bruce Schneier From Schneier on Security | January 2, 2024 at 07:04 AM
Wow:
To test PIGEON’s performance, I gave it five personal photos from a trip I took across America years ago, none of which have been published online. Some photos...Bruce Schneier From Schneier on Security | December 29, 2023 at 07:03 AM
They’re short unique strings:
Sqids (pronounced “squids”) is an open-source library that lets you generate YouTube-looking IDs from numbers. These IDs are short...Bruce Schneier From Schneier on Security | December 29, 2023 at 05:08 AM
Apple is rolling out a new “Stolen Device Protection” feature that seems well thought out:
When Stolen Device Protection is turned on, Face ID or Touch ID authentication...Bruce Schneier From Schneier on Security | December 27, 2023 at 07:01 AM
Google Maps now stores location data locally on your device, meaning that Google no longer has that data to turn over to the police.Bruce Schneier From Schneier on Security | December 26, 2023 at 07:03 AM
It’s squid parts from college dissections, so it’s not a volume operation.
As usual, you can also use this squid post to talk about the security stories in thehere...Bruce Schneier From Schneier on Security | December 22, 2023 at 05:08 PM
Interesting attack on a LLM:
In Writer, users can enter a ChatGPT-like session to edit or create their documents. In this chat session, the LLM can retrieve information...Bruce Schneier From Schneier on Security | December 22, 2023 at 07:05 AM
There’s a rumor flying around the Internet that OpenAI is training foundation models on your Dropbox documents.
Here’s CNBC. Here’s Boing Boing. Some articles are...Bruce Schneier From Schneier on Security | December 19, 2023 at 07:09 AM
More unconstrained surveillance:
Lawmakers noted the pharmacies’ policies for releasing medical records in a letter dated Tuesday to the Department of Health and...Bruce Schneier From Schneier on Security | December 18, 2023 at 10:37 AM
The Molinière Underwater Sculpture Park has pieces that are colored in part with squid ink.
As usual, you can also use this squid post to talk about the security...Bruce Schneier From Schneier on Security | December 15, 2023 at 05:06 PM
In 2016, I wrote about an Internet that affected the world in a direct, physical manner. It was connected to your smartphone. It had sensors like cameras and thermostats...Bruce Schneier From Schneier on Security | December 15, 2023 at 07:01 AM
This seems like a bad idea. And there are ongoing lawsuits against Amazon for selling them.Bruce Schneier From Schneier on Security | December 14, 2023 at 11:23 AM
This is not about mass surveillance of mail, this is about sorts of targeted surveillance the US Postal Inspection Service uses to catch mail thieves:
To track...Bruce Schneier From Schneier on Security | December 13, 2023 at 07:04 AM
Interesting attack based on malicious pre-OS logo images:
LogoFAIL is a constellation of two dozen newly discovered vulnerabilities that have lurked for years,...Bruce Schneier From Schneier on Security | December 12, 2023 at 07:01 AM
It’s happened. Details here, and tech details here (for messages in transit) and here (for messages in storage)
Rollout to everyone will take months, but it’s a...Bruce Schneier From Schneier on Security | December 11, 2023 at 07:10 AM
Another rare security + squid story:
The woman—who has only been identified by her surname, Wang—was having a meal with friends at a hotpot restaurant in Kunming...Bruce Schneier From Schneier on Security | December 8, 2023 at 05:03 PM
New attack breaks forward secrecy in Bluetooth.
Three. news articles.
The vulnerability has been around for at least a decade.Bruce Schneier From Schneier on Security | December 8, 2023 at 07:05 AM
When you get a push notification on your Apple or Google phone, those notifications go through Apple and Google servers. Which means that those companies can spy...Bruce Schneier From Schneier on Security | December 7, 2023 at 07:02 AM
Interesting analysis:
This paper discusses the protocol used for electing the Doge of Venice between 1268 and the end of the Republic in 1797. We will show that...Bruce Schneier From Schneier on Security | December 6, 2023 at 01:18 PM