From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
FBI Director James Comey again called for an end to secure encryption by putting in a backdoor. Here's his speech: There is a misconception that building a lawful...Bruce Schneier From Schneier on Security | October 21, 2014 at 10:58 AM
Last month, I wrote that the FBI identified Ross W. Ulbricht as the Silk Road's Dread Pirate Roberts through a leaky CAPTCHA. Seems that story doesn't hold water...Bruce Schneier From Schneier on Security | October 20, 2014 at 07:19 AM
That's a lot. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. And commenting was broken for a...Bruce Schneier From Schneier on Security | October 17, 2014 at 06:17 PM
Kevin Poulsen has written an interesting story about two people who successfully exploited a bug in a popular video poker machine....Bruce Schneier From Schneier on Security | October 17, 2014 at 07:35 AM
ECI is a classification above Top Secret. It's for things that are so sensitive they're basically not written down, like the names of companies whose cryptography...Bruce Schneier From Schneier on Security | October 16, 2014 at 07:22 AM
This is a creepy story. A woman has her phone seized by the Drug Enforcement Agency and gives them permission to look at her phone. Without her knowledge or consent...Bruce Schneier From Schneier on Security | October 15, 2014 at 08:06 AM
A few days ago, I saw this tweet: "Just a reminder that it is now *a full year* since Schneier cited it, and the FOXACID ops manual remains unpublished." It's true...Bruce Schneier From Schneier on Security | October 15, 2014 at 07:29 AM
This essay, "Grooming students for a lifetime of surveillance," talks about the general trends in student surveillance. Related: essay on the need for student privacy...Bruce Schneier From Schneier on Security | October 14, 2014 at 06:59 AM
Interesting essay about James Bamford and his efforts to publish The Puzzle Palace over the NSA's objections. Required reading for those who think the NSA's excesses...Bruce Schneier From Schneier on Security | October 13, 2014 at 07:55 AM
The latest Intercept article on the Snowden NSA documents talks about their undercover operatives working in foreign companies. There are no specifics, although...Bruce Schneier From Schneier on Security | October 11, 2014 at 04:00 PM
Recipe from Tom Douglas. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | October 10, 2014 at 05:56 PM
Good essay by Molly Sauter: basically, there is no legal avenue for activism and protest on the Internet. Also note Sauter's new book, The Coming Swarm....Bruce Schneier From Schneier on Security | October 10, 2014 at 01:56 PM
This article reads like snake oil. But the company was founded by Lars Knudsen, so it can't possibly be. I'm curious....Bruce Schneier From Schneier on Security | October 10, 2014 at 04:40 AM
In July, I wrote about an unpatchable USB vulnerability called BadUSB. Code for the vulnerability has been published....Bruce Schneier From Schneier on Security | October 8, 2014 at 04:41 PM
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World is finished. I submitted it to my publisher, Norton, this morning. In a few weeks...Bruce Schneier From Schneier on Security | October 7, 2014 at 07:56 AM
Last week Apple announced that it is closing a serious security vulnerability in the iPhone. It used to be that the phone's encryption only protected a small amount...Bruce Schneier From Schneier on Security | October 6, 2014 at 07:50 AM
McDonald's has a Halloween-themed burger with a squid-ink bun. Only in Japan. As usual, you can also use this squid post to talk about the security stories in the...Bruce Schneier From Schneier on Security | October 3, 2014 at 07:19 PM
Former NSA employee -- not technical director, as the link says -- explains how NSA bulk surveillance works, using some of the Snowden documents. Very interesting...Bruce Schneier From Schneier on Security | October 3, 2014 at 07:59 AM
The NSA is building a private cloud with its own security features: As a result, the agency can now track every instance of every individual accessing what is in...Bruce Schneier From Schneier on Security | October 2, 2014 at 07:58 AM