From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Suprising no one, the security of police bodycams is terrible. Mitchell even realized that because he can remotely access device storage on models like the Fire...Bruce Schneier From Schneier on Security | August 15, 2018 at 07:04 AM
Google is tracking you, even if you turn off tracking: Google says that will prevent the company from remembering where you've been. Google's support page on the...Bruce Schneier From Schneier on Security | August 14, 2018 at 07:22 AM
Fascinating research de-anonymizing code -- from either source code or compiled code: Rachel Greenstadt, an associate professor of computer science at Drexel University...Bruce Schneier From Schneier on Security | August 13, 2018 at 05:02 PM
Interesting video of a robot grabber that's delicate enough to capture squid (and even jellyfish) in the ocean. As usual, you can also use this squid post to talk...Bruce Schneier From Schneier on Security | August 10, 2018 at 05:16 PM
Last week, CNN reported that the Transportation Security Administration is considering eliminating security at U.S. airports that fly only smaller planes -- 60...Bruce Schneier From Schneier on Security | August 10, 2018 at 07:10 AM
Really interesting article: A trained eye (or even a not-so-trained one) can discern when something phishy is going on with a domain or subdomain name. There are...Bruce Schneier From Schneier on Security | August 9, 2018 at 07:17 AM
BoingBoing has the story. I have never quite trusted the idea of a warrant canary. But here it seems to have worked. (Presumably, if SpiderOak wanted to replace...Bruce Schneier From Schneier on Security | August 8, 2018 at 10:37 AM
Interesting research: "Dancing Pigs or Externalities? Measuring the Rationality of Security Decisions": Abstract: Accurately modeling human decision-making in security...Bruce Schneier From Schneier on Security | August 7, 2018 at 07:40 AM
Long and interesting story -- now two decades old -- of massive fraud perpetrated against the McDonald's Monopoly sweepstakes. The central fraudster was the person...Bruce Schneier From Schneier on Security | August 6, 2018 at 06:57 AM
The calamari squid grabs prey three feet away with its fast tentacles. As usual, you can also use this squid post to talk about the security stories in the news...Bruce Schneier From Schneier on Security | August 3, 2018 at 05:15 PM
Humble Bundle sells groups of e-books at ridiculously low prices, DRM free. This month, the bundles are all Wiley titles, including three of my books: Applied Cryptography...Bruce Schneier From Schneier on Security | August 3, 2018 at 03:10 PM
Interesting commentary: The military is an impossible place for hackers thanks to antiquated career management, forced time away from technical positions, lack...Bruce Schneier From Schneier on Security | August 3, 2018 at 07:21 AM
Evidence that stolen credit cards are being used to purchase items in games like Clash of Clans, which are then resold for cash....Bruce Schneier From Schneier on Security | August 2, 2018 at 07:14 AM
The UK's GCHQ delivers a brutally blunt assessment of quantum key distribution: QKD protocols address only the problem of agreeing keys for encrypting data. Ubiquitous...Bruce Schneier From Schneier on Security | August 1, 2018 at 03:07 PM
We don't know if this is error or deliberate action, but five backdoors have been discovered already this year....Bruce Schneier From Schneier on Security | August 1, 2018 at 07:22 AM
The Diqee 360 robotic vacuum cleaner can be turned into a surveillance device. The attack requires physical access to the device, so in the scheme of things it's...Bruce Schneier From Schneier on Security | July 31, 2018 at 07:40 AM
Good policy paper (summary here) on the threats, current state, and potential policy solutions for the poor security of US space systems....Bruce Schneier From Schneier on Security | July 30, 2018 at 01:08 PM
Interesting research: "You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information," by Beatrice Perez, Mirco Musolesi...Bruce Schneier From Schneier on Security | July 30, 2018 at 07:35 AM
This is a fantastic video of a squid attracting prey with a tentacle that looks like a smaller squid. As usual, you can also use this squid post to talk about the...Bruce Schneier From Schneier on Security | July 27, 2018 at 05:12 PM