From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Interesting research: Sebastian Hellmeier, "The Dictator's Digital Toolkit: Explaining Variation in Internet Filtering in Authoritarian Regimes," Politics & Policy...Bruce Schneier From Schneier on Security | January 13, 2017 at 07:48 AM
President Obama has changed the rules regarding raw intelligence, allowing the NSA to share raw data with the US's other 16 intelligence agencies. The new rules...Bruce Schneier From Schneier on Security | January 12, 2017 at 01:07 PM
New paper: "A Simple Power Analysis Attack on the Twofish Key Schedule." This shouldn't be a surprise; these attacks are devastating if you don't take steps to...Bruce Schneier From Schneier on Security | January 12, 2017 at 07:28 AM
In the first of what will undoubtedly be a large number of battles between companies that make IoT devices and the police, Amazon is refusing to comply with a warrant...Bruce Schneier From Schneier on Security | January 11, 2017 at 07:22 AM
I am co-author on a paper discussing whether elections be classified as "critical infrastructure" in the US, based on experiences in other countries: Abstract:...Bruce Schneier From Schneier on Security | January 10, 2017 at 07:02 AM
The FDA has issued a report giving medical devices guidance on computer and network security. There's nothing particularly new or interesting; it reads like standard...Bruce Schneier From Schneier on Security | January 10, 2017 at 06:06 AM
President Barack Obama's public accusation of Russia as the source of the hacks in the US presidential election and the leaking of sensitive e-mails through WikiLeaks...Bruce Schneier From Schneier on Security | January 9, 2017 at 06:53 AM
Easy recipe from America's Test Kitchen. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | January 6, 2017 at 05:29 PM
Good article debunking the myth that requiring people to use their real names on the Internet makes them behave better....Bruce Schneier From Schneier on Security | January 6, 2017 at 10:44 AM
Someone just registered their company name as ; DROP TABLE "COMPANIES";-- LTD. Reddit thread. Obligatory xkcd comic....Bruce Schneier From Schneier on Security | January 4, 2017 at 04:17 PM
In The Better Angels of Our Nature, Steven Pinker convincingly makes the point that by pretty much every measure you can think of, violence has declined on our...Bruce Schneier From Schneier on Security | January 4, 2017 at 08:42 AM
There's a concept from computer security known as a class break. It's a particular security vulnerability that breaks not just one system, but an entire class of...Bruce Schneier From Schneier on Security | January 3, 2017 at 07:50 AM
A modern photocopier is basically a computer with a scanner and printer attached. This computer has a hard drive, and scans of images are regularly stored on that...Bruce Schneier From Schneier on Security | January 2, 2017 at 07:12 AM
BBC.com reports that squid are proliferating around the North Sea, and speculates that they will become an increasingly common British dinner. As usual, you can...Bruce Schneier From Schneier on Security | December 30, 2016 at 05:06 PM
Nice article on the 2011 DigiNotar attack and how it changed security practices in the CA industry....Bruce Schneier From Schneier on Security | December 29, 2016 at 07:50 AM
Signal, the encrypted messaging app I prefer, is being blocked in both Egypt and the UAE. Recently, the Signal team developed a workaround: domain fronting. Signal's...Bruce Schneier From Schneier on Security | December 28, 2016 at 07:20 AM
Former TSA Administrator Kip Hawley wrote an op-ed pointing out the security vulnerabilities in the TSA's PreCheck program: The first vulnerability in the system...Bruce Schneier From Schneier on Security | December 27, 2016 at 07:11 AM
Merry Squidmas. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | December 23, 2016 at 05:55 PM
Crowdstrike has an interesting blog post about how the Russian military is tracking Ukranian field artillery units by compromising soldiers' smart phones and tracking...Bruce Schneier From Schneier on Security | December 23, 2016 at 09:46 AM