From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
NIST is accepting proposals for public-key algorithms immune to quantum computing techniques. Details here. Deadline is the end of November 2017. I applaud NIST...Bruce Schneier From Schneier on Security | December 23, 2016 at 07:39 AM
This Verge article isn't great, but we are certainly moving into a future where audio and video will be easy to fake, and easier to fake undetectably. This is going...Bruce Schneier From Schneier on Security | December 22, 2016 at 04:35 PM
A few days ago I blogged an excellent essay by Filippo Valsorda on why he's giving up on PGP. Neal Walkfield wrote a good rebuttal. I am on Valsorda's side. I don't...Bruce Schneier From Schneier on Security | December 22, 2016 at 08:59 AM
The Encryption Working Group of the House Judiciary Committee and the House Energy and Commerce Committee has released its annual report. Observation #1: Any measure...Bruce Schneier From Schneier on Security | December 21, 2016 at 10:25 AM
Google has released Project Wycheproof a test suite designed to test cryptographic libraries against a series of known attacks. From a blog post: In cryptography...Bruce Schneier From Schneier on Security | December 20, 2016 at 07:12 AM
A film student put spyware on a smartphone and then allowed it to be stolen. He made a movie of the results....Bruce Schneier From Schneier on Security | December 19, 2016 at 03:29 PM
This would be a good idea, although I can't imagine countries like the US, China, and Russia going along with it -- at least not right now....Bruce Schneier From Schneier on Security | December 19, 2016 at 09:57 AM
This is what passes for news these days. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | December 16, 2016 at 05:52 PM
Filippo Valsorda wrote an exellent essay on why he's giving up on PGP. I have long believed PGP to be more trouble than it is worth. It's hard to use correctly,...Bruce Schneier From Schneier on Security | December 16, 2016 at 06:36 AM
In this impressive lc7scxvKQOo">social-engineering display, a hacker convinces a cell phone tech-support person to change an account password without being verified...Bruce Schneier From Schneier on Security | December 15, 2016 at 04:43 PM
Like many, I was surprised and shocked by the election of Donald Trump as president. I believe his ideas, temperament, and inexperience represent a grave threat...Bruce Schneier From Schneier on Security | December 15, 2016 at 04:50 AM
That's the conclusion of a research paper: Once [costs and complexity] are eliminated, it enables big hosting providers to issue and deploy certificates for their...Bruce Schneier From Schneier on Security | December 14, 2016 at 07:46 AM
Interesting: "We used silver and carbon ink to print an image consisting of small rods that are about a millimeter long and a couple of hundred microns wide," said...Bruce Schneier From Schneier on Security | December 13, 2016 at 07:21 AM
A new ransomware, Popcorn Time, gives users the option of infecting others in lieu of paying the ransom. Related: a good general article on ransomware....Bruce Schneier From Schneier on Security | December 12, 2016 at 07:51 AM
It's called Cryptomancer. Think computer hacking plus magic. I know nothing about it, but it feels reminiscent of Shadowrun. Reddit thread. RPG.net thread....Bruce Schneier From Schneier on Security | December 10, 2016 at 10:00 AM
Squid-inspired electronic screens. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | December 9, 2016 at 05:11 PM
Le Monde and the Intercept are reporting about NSA spying in Africa, and NSA spying on in-flight mobile phone calls -- both from the Snowden documents....Bruce Schneier From Schneier on Security | December 8, 2016 at 12:04 PM
There's new malware toolkit that uses stegaography to hide in images: For the past two months, a new exploit kit has been serving malicious code hidden in the pixels...Bruce Schneier From Schneier on Security | December 7, 2016 at 09:06 AM
This article outlines two different types of international phone fraud. The first can happen when you call an expensive country like Cuba: My phone call never actually...Bruce Schneier From Schneier on Security | December 6, 2016 at 07:15 AM