From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In the wake of the Paris terrorist shootings, David Cameron has said that he wants to ban encryption in the UK. Here's the quote: "If I am prime minister I will...Bruce Schneier From Schneier on Security | January 13, 2015 at 03:52 PM
Good essay. Worry about Ebola (or anything) manifests physically as what's known as a fight, flight, or freeze response. Biological systems ramp up or down to focus...Bruce Schneier From Schneier on Security | January 13, 2015 at 08:54 AM
This is an interesting historical use of viking runes as a secret code. Yes, the page is all in Finnish. But scroll to the middle. There's a picture of the Stockholm...Bruce Schneier From Schneier on Security | January 12, 2015 at 02:58 PM
A worldwide survey of writers affiliated with PEN shows a significant level of self-censoring. From the press release: The report's revelations, based on a survey...Bruce Schneier From Schneier on Security | January 12, 2015 at 07:41 AM
This just in: the threat of being eaten doesn't deter dumpling squid from having sex. As usual, you can also use this squid post to talk about the security stories...Bruce Schneier From Schneier on Security | January 9, 2015 at 06:46 PM
The FBI has provided more evidence: Speaking at a Fordham Law School cybersecurity conference Wednesday, Comey said that he has "very high confidence" in the FBI's...Bruce Schneier From Schneier on Security | January 9, 2015 at 07:24 AM
Good information on how Internet Explorer, Chrome, and Firefox store user passwords....Bruce Schneier From Schneier on Security | January 8, 2015 at 06:50 PM
This sort of thing is still very rare, but I fear it will become more common: ...hackers had struck an unnamed steel mill in Germany. They did so by manipulating...Bruce Schneier From Schneier on Security | January 8, 2015 at 04:16 PM
When you're attacked by a missile, you can follow its trajectory back to where it was launched from. When you're attacked in cyberspace, figuring out who did it...Bruce Schneier From Schneier on Security | January 8, 2015 at 07:34 AM
No one has admitted taking down North Korea's Internet. It could have been an act of retaliation by the US government, but it could just as well have been an ordinary...Bruce Schneier From Schneier on Security | January 7, 2015 at 12:49 PM
Sophie Van Der Zee and colleagues have a new paper on using body movement as a lie detector: Abstract: We present a new robust signal for detecting deception: full...Bruce Schneier From Schneier on Security | January 6, 2015 at 03:48 PM
New paper: "Attributing Cyber Attacks," by Thomas Rid and Ben Buchanan: Abstract: Who did it? Attribution is fundamental. Human lives and the security of the state...Bruce Schneier From Schneier on Security | January 6, 2015 at 07:50 AM
In Kyoto, taxi drivers are encouraged to loiter around convenience stores late at night. Their presence reduces crime. In Kyoto about half of the convenience stores...Bruce Schneier From Schneier on Security | January 5, 2015 at 08:35 AM
Stewed squid with tomatoes, sauteed squid with parsley and garlic, and braised squid with garlic and herbs. As usual, you can also use this squid post to talk about...Bruce Schneier From Schneier on Security | January 2, 2015 at 05:53 PM
Those of you unfamiliar with hacker culture might need an explanation of "doxing." The word refers to the practice of publishing personal information about people...Bruce Schneier From Schneier on Security | January 2, 2015 at 09:00 AM
An analysis of the timestamps on some of the leaked documents shows that they were downloaded at USB 2.0 speeds -- which implies an insider. Our Gotnews.com investigation...Bruce Schneier From Schneier on Security | December 31, 2014 at 08:56 AM
I haven't seen much press mention about the leaked CIA documents that have appeared on Wikileaks this month. There are three: The CIA review of high-value target...Bruce Schneier From Schneier on Security | December 29, 2014 at 07:46 AM
Spiegel published a long article today on the NSA's analysis capabilities against encrypted systems, with a lot of new documents from the Snowden archive. I'm not...Bruce Schneier From Schneier on Security | December 28, 2014 at 06:32 PM
"St. George, the Dragon, and the Squid: A Preservation Mumming," by the American Folklife Center. As usual, you can also use this squid post to talk about the security...Bruce Schneier From Schneier on Security | December 26, 2014 at 05:32 PM