From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Policy essay: "Encryption Substitutes," by Andrew Keane Woods: In this short essay, I make a few simple assumptions that bear mentioning at the outset. First, I...Bruce Schneier From Schneier on Security | July 25, 2017 at 07:52 AM
The US Army Research Agency is funding research into autonomous bot swarms. From the announcement: The objective of this CRA is to perform enabling basic and applied...Bruce Schneier From Schneier on Security | July 24, 2017 at 07:39 AM
It's the second in two months. Video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my...Bruce Schneier From Schneier on Security | July 21, 2017 at 05:33 PM
The Segway has a mobile app. It is hackable: While analyzing the communication between the app and the Segway scooter itself, Kilbride noticed that a user PIN number...Bruce Schneier From Schneier on Security | July 21, 2017 at 07:23 AM
The press is reporting a $32M theft of the cryptocurrency Ethereum. Like all such thefts, they're not a result of a cryptographic failure in the currencies, but...Bruce Schneier From Schneier on Security | July 20, 2017 at 10:12 AM
Slashdot asks if password masking -- replacing password characters with asterisks as you type them -- is on the way out. I don't know if that's true, but I would...Bruce Schneier From Schneier on Security | July 19, 2017 at 11:35 AM
Humble Bundle is selling a bunch of cybersecurity books very cheaply. You can get copies of Applied Cryptography, Secrets and Lies, and Cryptography Engineering...Bruce Schneier From Schneier on Security | July 18, 2017 at 07:38 AM
News from Australia: Under the law, internet companies would have the same obligations telephone companies do to help law enforcement agencies, Prime Minister Malcolm...Bruce Schneier From Schneier on Security | July 17, 2017 at 07:29 AM
They're rare: The one Dubielzig really wants is an eye from a giant squid, which has the biggest eye of any living animal -- it's the size of a dinner plate. "But...Bruce Schneier From Schneier on Security | July 14, 2017 at 05:35 PM
There are two opposing models of how the Internet has changed protest movements. The first is that the Internet has made protesters mightier than ever. This comes...Bruce Schneier From Schneier on Security | July 14, 2017 at 01:06 PM
A set of documents in Pakistan were detected as forgeries because their fonts were not in circulation at the time the documents were dated....Bruce Schneier From Schneier on Security | July 14, 2017 at 07:51 AM
I have a soft spot for interesting biological security measures, especially by plants. I've used them as examples in several of my books. Here's a new one: when...Bruce Schneier From Schneier on Security | July 13, 2017 at 07:06 AM
"Traffic shaping" -- the practice of tricking data to flow through a particular route on the Internet so it can be more easily surveiled -- is an NSA technique...Bruce Schneier From Schneier on Security | July 12, 2017 at 07:32 AM
This article argues that AI technologies will make image, audio, and video forgeries much easier in the future. Combined, the trajectory of cheap, high-quality...Bruce Schneier From Schneier on Security | July 10, 2017 at 07:04 AM
Counting squid is not easy. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...Bruce Schneier From Schneier on Security | July 7, 2017 at 03:08 PM
This teapot has two chambers. Liquid is released from one or the other depending on whether an air hole is covered. I want one....Bruce Schneier From Schneier on Security | July 7, 2017 at 02:01 PM
The Intelligence Advanced Research Projects Activity (IARPA) is soliciting proposals for research projects in secure multiparty computation: Specifically of interest...Bruce Schneier From Schneier on Security | July 7, 2017 at 07:20 AM
The website key.me will make a duplicate key from a digital photo. If a friend or coworker leaves their keys unattended for a few seconds, you know what to do.....Bruce Schneier From Schneier on Security | July 6, 2017 at 07:27 AM
It's hard to tell how much of this story is real and how much is aspirational, but it really is only a matter of time: About the size of a child's electric toy...Bruce Schneier From Schneier on Security | July 5, 2017 at 01:48 PM