From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Monday a group of cryptographers and security experts released a major paper outlining the risks of government-mandated back-doors in encryption products: Keys...Bruce Schneier From Schneier on Security | July 9, 2015 at 07:31 AM
This is an interesting story of a reviewer who had her reviewer deleted because Amazon believed she knew the author personally. Leaving completely aside the ethics...Bruce Schneier From Schneier on Security | July 8, 2015 at 07:36 AM
Read this: Hacking Team asked its customers to shut down operations, but according to one of the leaked files, as part of Hacking Team's "crisis procedure," it...Bruce Schneier From Schneier on Security | July 7, 2015 at 06:44 PM
I've been reading through the 48 classified documents about the NSA's XKEYSCORE system released by the Intercept last week. From the article: The NSA's XKEYSCORE...Bruce Schneier From Schneier on Security | July 7, 2015 at 07:38 AM
Someone hacked the cyberweapons arms manufacturer Hacking Team and posted 400 GB of internal company data. Hacking Team is a pretty sleazy company, selling surveillance...Bruce Schneier From Schneier on Security | July 6, 2015 at 01:53 PM
On Friday, WikiLeaks published three summaries of NSA intercepts of German government communications. To me, the most interesting thing is not the intercept analyses...Bruce Schneier From Schneier on Security | July 6, 2015 at 06:13 AM
Long article about a very lucrative squid-fishing industry that involves bribing the Cambodian Navy. As usual, you can also use this squid post to talk about the...Bruce Schneier From Schneier on Security | July 3, 2015 at 05:39 PM
It's the Internet, which means there must be cute animal videos on this blog. But this one is different. Watch a mother rabbit beat up a snake to protect her children...Bruce Schneier From Schneier on Security | July 3, 2015 at 01:13 PM
This is really clever: Enigma's technique -- what cryptographers call "secure multiparty computation" -- works by mimicking a few of the features of bitcoin's decentralized...Bruce Schneier From Schneier on Security | July 3, 2015 at 07:38 AM
The Intercept has published a highly detailed two-part article on how the NSA's XKEYSCORE works, including a huge number of related documents from the Snowden archive...Bruce Schneier From Schneier on Security | July 2, 2015 at 12:22 PM
I don't have much to say about the recent hack of the US Office of Personnel Management, which has been attributed to China (and seems to be getting worse all the...Bruce Schneier From Schneier on Security | July 1, 2015 at 07:32 AM
The official Twitter feed for my blog is @schneierblog. The account @Bruce_Schneier also mirrors my blog, but it is not mine. I have nothing to do with it, and...Bruce Schneier From Schneier on Security | June 30, 2015 at 02:16 PM
Interesting research from 2012: "The Dynamics of Evolving Beliefs, Concerns, Emotions, and Behavioral Avoidance Following 9/11: A Longitudinal Analysis of Representative...Bruce Schneier From Schneier on Security | June 30, 2015 at 07:27 AM
There's a new paper on a low-cost TEMPEST attack against PC cryptography: We demonstrate the extraction of secret decryption keys from laptop computers, by nonintrusively...Bruce Schneier From Schneier on Security | June 29, 2015 at 02:38 PM
Here's a comprehensive document on migrating from SHA-1 to SHA-2 in Active Directory certificates....Bruce Schneier From Schneier on Security | June 29, 2015 at 07:05 AM
I have always liked this one. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | June 26, 2015 at 05:32 PM
There are two other Snowden stories this week about GCHQ: one about its hacking practices, and the other about its propaganda and psychology research. The second...Bruce Schneier From Schneier on Security | June 26, 2015 at 01:12 PM
On Monday, the Intercept published a new story from the Snowden documents: The spy agencies have reverse engineered software products, sometimes under questionable...Bruce Schneier From Schneier on Security | June 26, 2015 at 07:59 AM
Wikileaks has published some NSA SIGINT documents describing intercepted French government communications. This seems not be from the Snowden documents. It could...Bruce Schneier From Schneier on Security | June 25, 2015 at 01:51 PM
I think this is the first case of one professional sports team hacking another. No idea if it was an official operation, or a couple of employees doing it on their...Bruce Schneier From Schneier on Security | June 25, 2015 at 07:14 AM