From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
New fossil bed discovered in Alberta: The finds at the site include 16 vampyropods, a relative of the vampire squid with its ink sac and fine details of its muscles...Bruce Schneier From Schneier on Security | January 27, 2017 at 05:37 PM
There are a lot of them. In a world where the number of fans, friends, followers, and likers are social currency -- and where the number of reposts is a measure...Bruce Schneier From Schneier on Security | January 27, 2017 at 07:18 AM
Mike Specter has an interesting idea on how to make biometric access-control systems more secure: add a duress code. For example, you might configure your iPhone...Bruce Schneier From Schneier on Security | January 26, 2017 at 03:03 PM
Reports are that President Trump is still using his old Android phone. There are security risks here, but they are not the obvious ones. I'm not concerned about...Bruce Schneier From Schneier on Security | January 26, 2017 at 08:06 AM
Interesting research -- "Cracking Android Pattern Lock in Five Attempts": Abstract: Pattern lock is widely used as a mechanism for authentication and authorization...Bruce Schneier From Schneier on Security | January 25, 2017 at 07:18 AM
Good article that crunches the data and shows that the press's coverage of terrorism is disproportional to its comparative risk. This isn't new. I've written about...Bruce Schneier From Schneier on Security | January 24, 2017 at 07:31 AM
NextGov has a nice article summarizing President Obama's accomplishments in Internet security: what he did, what he didn't do, and how it turned out....Bruce Schneier From Schneier on Security | January 23, 2017 at 07:55 AM
This graphic shows the important difference between arms and tentacles. As usual, you can also use this squid post to talk about the security stories in the news...Bruce Schneier From Schneier on Security | January 20, 2017 at 05:19 PM
Two days ago, the White House released a report on privacy: "Privacy in our Digital Lives: Protecting Individuals and Promoting Innovation." The report summarizes...Bruce Schneier From Schneier on Security | January 20, 2017 at 10:51 AM
There's research in using a heartbeat as a biometric password. No details in the article. My guess is that there isn't nearly enough entropy in the reproducible...Bruce Schneier From Schneier on Security | January 19, 2017 at 07:22 AM
Back in March, Rolf Weber wrote about a potential vulnerability in the WhatsApp protocol that would allow Facebook to defeat perfect forward secrecy by forcibly...Bruce Schneier From Schneier on Security | January 17, 2017 at 07:09 AM
Interesting post on Cloudflare's experience with receiving a National Security Letter. News article....Bruce Schneier From Schneier on Security | January 16, 2017 at 07:40 AM
This article discusses a giant squid attack on a schooner off the coast of Sri Lanka in 1874. As usual, you can also use this squid post to talk about the security...Bruce Schneier From Schneier on Security | January 13, 2017 at 05:52 PM
Imagine that you are someone in the CIA, concerned about the future of America. You have this Russian dossier on Donald Trump, which you have some evidence might...Bruce Schneier From Schneier on Security | January 13, 2017 at 12:58 PM
Interesting research: Sebastian Hellmeier, "The Dictator's Digital Toolkit: Explaining Variation in Internet Filtering in Authoritarian Regimes," Politics & Policy...Bruce Schneier From Schneier on Security | January 13, 2017 at 07:48 AM
President Obama has changed the rules regarding raw intelligence, allowing the NSA to share raw data with the US's other 16 intelligence agencies. The new rules...Bruce Schneier From Schneier on Security | January 12, 2017 at 01:07 PM
New paper: "A Simple Power Analysis Attack on the Twofish Key Schedule." This shouldn't be a surprise; these attacks are devastating if you don't take steps to...Bruce Schneier From Schneier on Security | January 12, 2017 at 07:28 AM
In the first of what will undoubtedly be a large number of battles between companies that make IoT devices and the police, Amazon is refusing to comply with a warrant...Bruce Schneier From Schneier on Security | January 11, 2017 at 07:22 AM
I am co-author on a paper discussing whether elections be classified as "critical infrastructure" in the US, based on experiences in other countries: Abstract:...Bruce Schneier From Schneier on Security | January 10, 2017 at 07:02 AM