From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Matthew Green has a good post on what's wrong with PGP and what should be done about it....Bruce Schneier From Schneier on Security | August 25, 2014 at 01:36 PM
We have an error rate of about 15%: Professor Mike Burton, Sixth Century Chair in Psychology at the University of Aberdeen said: "Psychologists identified around...Bruce Schneier From Schneier on Security | August 25, 2014 at 08:35 AM
Really: To attract the phytoplankton, fishermen suspend green lights from their boats to illuminate the sea. When the squid chase after their dinner, they're drawn...Bruce Schneier From Schneier on Security | August 22, 2014 at 05:49 PM
Someone wrote Sherlock-Schneier fan fiction. Not slash, thank heavens. (And no, that's not an invitation.)...Bruce Schneier From Schneier on Security | August 22, 2014 at 03:56 PM
There's an interesting article on a data exfiltration technique. What was unique about the attackers was how they disguised traffic between the malware and command...Bruce Schneier From Schneier on Security | August 21, 2014 at 08:01 AM
The web intelligence firm Recorded Future has posted two stories about how al Qaeda is using new encryption software in response to the Snowden disclosures. NPR...Bruce Schneier From Schneier on Security | August 19, 2014 at 07:39 AM
The US Air Force is focusing on cyber deception next year: Background: Deception is a deliberate act to conceal activity on our networks, create uncertainty and...Bruce Schneier From Schneier on Security | August 18, 2014 at 03:10 PM
Last October, I broke the story about the NSA's top secret program to inject packets into the Internet backbone: QUANTUM. Specifically, I wrote about how QUANTUMINSERT...Bruce Schneier From Schneier on Security | August 18, 2014 at 12:55 PM
There's a new story on the c't magazin website about a 5-Eyes program to infect computers around the world for use as launching pads for attacks. These are not...Bruce Schneier From Schneier on Security | August 18, 2014 at 07:51 AM
That's two more than I have. They're hoping it's a male. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...Bruce Schneier From Schneier on Security | August 15, 2014 at 05:54 PM
There's a new article on Edward Snowden in Wired. It's written by longtime NSA watcher James Bamford, who interviewed Snowden is Moscow. There's lots of interesting...Bruce Schneier From Schneier on Security | August 14, 2014 at 03:00 AM
This is a smart and interesting blog post: I prefer to think of security as a class of interface guarantee. In particular, security guarantees are a kind of correctness...Bruce Schneier From Schneier on Security | August 13, 2014 at 03:14 PM
This borders on ridiculous: Chinese scientists are developing a mini-camera to scan crowds for highly stressed individuals, offering law-enforcement officers a...Bruce Schneier From Schneier on Security | August 13, 2014 at 07:54 AM
There's a horrible story of a South Carolina mother arrested for letting her 9-year-old daughter play alone at a park while she was at work. The article linked...Bruce Schneier From Schneier on Security | August 11, 2014 at 10:53 AM
There's a protein in squid that might be useful in getting biological circuits to talk to computer circuits. As usual, you can also use this squid post to talk...Bruce Schneier From Schneier on Security | August 8, 2014 at 05:58 PM
Researchers are able to recover sound through soundproof glass by recording the vibrations of a plastic bag. Researchers at MIT, Microsoft, and Adobe have developed...Bruce Schneier From Schneier on Security | August 8, 2014 at 12:50 PM
Ever since The Intercept published this story about the US government's Terrorist Screening Database, the press has been writing about a "second leaker": The Intercept...Bruce Schneier From Schneier on Security | August 7, 2014 at 01:24 PM