From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
There's an interesting message in the documents about Snowden that Vice magazine got out of the NSA with a FOIA request. At least in 2012, the NSA was using Word...Bruce Schneier From Schneier on Security | June 13, 2016 at 08:01 AM
Two years ago, I posted a photograph of a beautiful giant bronze squid sculpture by Kirk McGuire. He has a new sculpture: a squid table base. it's also beautiful...Bruce Schneier From Schneier on Security | June 10, 2016 at 05:38 PM
This interesting essay argues that financial risks are generally not systemic risks, and instead are generally much smaller. That's certainly been our experience...Bruce Schneier From Schneier on Security | June 10, 2016 at 01:56 PM
It makes for interesting reading. Someone noticed that parts of it read like standard modern office procedures....Bruce Schneier From Schneier on Security | June 10, 2016 at 10:54 AM
People who don't want Wayz routing cars through their neighborhoods are feeding it false data. It was here that Connor learned that some Waze warriors had launched...Bruce Schneier From Schneier on Security | June 9, 2016 at 07:17 AM
Really good investigative reporting on the automatic algorithms used to predict recidivism rates....Bruce Schneier From Schneier on Security | June 8, 2016 at 02:14 PM
Lots of details that demonstrate that Snowden did try to raise his concerns internally before going public, and that the NSA lied about this....Bruce Schneier From Schneier on Security | June 8, 2016 at 07:44 AM
New paper: "Physical Key Extraction Attacks on PCs," by Daniel Genkin, Lev Pachmanov, Itamar Pipman, Adi Shamir, and Eran Tromer. They recover keys acoustically...Bruce Schneier From Schneier on Security | June 7, 2016 at 03:59 PM
There's a new report on security vulnerabilities in the PC initialization/update process, allowing someone to hijack it to install malware: One of the major things...Bruce Schneier From Schneier on Security | June 6, 2016 at 07:10 AM
Earlier this week, I was at the ninth Workshop on Security and Human Behavior, hosted at Harvard University. SHB is a small invitational gathering of people studying...Bruce Schneier From Schneier on Security | June 3, 2016 at 02:36 PM
There's a new piece of malware called Irongate, which is obviously inspired by Stuxnet. We don't know who is responsible for it. Slashdot thread....Bruce Schneier From Schneier on Security | June 3, 2016 at 07:33 AM
Citizen Lab has the details: This report describes a campaign of targeted spyware attacks carried out by a sophisticated operator, which we call Stealth Falcon....Bruce Schneier From Schneier on Security | June 2, 2016 at 08:49 AM
This is a good summary article on the fallibility of DNA evidence. Most interesting to me are the parts on the proprietary algorithms used in DNA matching: William...Bruce Schneier From Schneier on Security | May 31, 2016 at 02:04 PM
A proposed law in Albany, NY, would make it a crime to walk away from airport screening. Aside from wondering why county lawmakers are getting involved with what...Bruce Schneier From Schneier on Security | May 31, 2016 at 07:35 AM
People can be identified from their "driver fingerprint": ...a group of researchers from the University of Washington and the University of California at San Diego...Bruce Schneier From Schneier on Security | May 30, 2016 at 11:10 AM
This research paper shows that the number of squids, and the number of cephalopods in general, has been steadily increasing over the past 60 years: Our analyses...Bruce Schneier From Schneier on Security | May 27, 2016 at 05:28 PM
Interesting research paper: Cormac Herley, "Unfalsifiability of security claims: There is an inherent asymmetry in computer security: things can be declared insecure...Bruce Schneier From Schneier on Security | May 27, 2016 at 07:19 AM