From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This law journal article discusses the role of class-action litigation to secure the Internet of Things. Basically, the article postulates that (1) market realities...Bruce Schneier From Schneier on Security | February 27, 2020 at 07:03 AM
The New York Times is reporting on the NSA's phone metadata program, which the NSA shut down last year: A National Security Agency system that analyzed logs of...Bruce Schneier From Schneier on Security | February 26, 2020 at 07:08 AM
This is good news: Whenever you visit a website -- even if it's HTTPS enabled -- the DNS query that converts the web address into an IP address that computers can...Bruce Schneier From Schneier on Security | February 25, 2020 at 10:15 AM
The Times of London is reporting that Russian agents are in Ireland probing transatlantic communications cables. Ireland is the landing point for undersea cables...Bruce Schneier From Schneier on Security | February 24, 2020 at 07:27 AM
It's probably a juvenile: Researchers aboard the New Zealand-based National Institute of Water and Atmospheric Research Ltd (NIWA) research vessel Tangaroa were...Bruce Schneier From Schneier on Security | February 21, 2020 at 05:19 PM
For decades, I have been talking about the importance of individual privacy. For almost as long, I have been using the metaphor of digital feudalism to describe...Bruce Schneier From Schneier on Security | February 21, 2020 at 03:04 PM
Sometime around 1993 or 1994, during the first Crypto Wars, I was part of a group of cryptography experts that went to Washington to advocate for strong encryption...Bruce Schneier From Schneier on Security | February 21, 2020 at 06:54 AM
There's a Kickstarter for an actual candle, with real fire, that you can control over the Internet. What could possibly go wrong?...Bruce Schneier From Schneier on Security | February 20, 2020 at 03:23 PM
This hack was possible because the McDonald's app didn't authenticate the server, and just did whatever the server told it to do: McDonald's receipts in Germany...Bruce Schneier From Schneier on Security | February 18, 2020 at 07:09 AM
This paper describes the flaws in the Voatz Internet voting app: "The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting...Bruce Schneier From Schneier on Security | February 17, 2020 at 07:35 AM
More news based on the squid brain MRI scan: the complexity of their brains are comparable to dogs. As usual, you can also use this squid post to talk about the...Bruce Schneier From Schneier on Security | February 14, 2020 at 05:11 PM
This is a current list of where and when I am scheduled to speak: I'll be at RSA Conference 2020 in San Francisco. On Wednesday, February 26, at 2:50 PM, I'll be...Bruce Schneier From Schneier on Security | February 14, 2020 at 02:03 PM
Interesting collision of real-world and Internet security: The ceremony sees several trusted internet engineers (a minimum of three and up to seven) from across...Bruce Schneier From Schneier on Security | February 14, 2020 at 07:07 AM
The United States is one of the few democracies without some formal data protection agency, and we need one. Senator Gillibrand just proposed creating one....Bruce Schneier From Schneier on Security | February 13, 2020 at 10:20 AM
Motherboard has a long article on apps -- Edison, Slice, and Cleanfox -- that spy on your email by scraping your screen, and then sell that information to others...Bruce Schneier From Schneier on Security | February 12, 2020 at 11:26 AM
The Swiss cryptography firm Crypto AG sold equipment to governments and militaries around the world for decades after World War II. They were owned by the CIA:...Bruce Schneier From Schneier on Security | February 11, 2020 at 11:42 AM
Last month, engineers at Google published a very curious privacy bug in Apple's Safari web browser. Apple's Intelligent Tracking Prevention, a feature designed...Bruce Schneier From Schneier on Security | February 10, 2020 at 07:06 AM
This paper is filled with brain science that I do not understand (news article), but fails to answer what I consider to be the important question: how do you keep...Bruce Schneier From Schneier on Security | February 7, 2020 at 05:11 PM
Ten years ago, I wrote an essay: "Security in 2020." Well, it's finally 2020. I think I did pretty well. Here's what I said back then: There's really no such thing...Bruce Schneier From Schneier on Security | February 7, 2020 at 01:50 PM
EKANS is a new ransomware that targets industrial control systems: But EKANS also uses another trick to ratchet up the pain: It's designed to terminate 64 different...Bruce Schneier From Schneier on Security | February 7, 2020 at 10:42 AM