From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Two researchers are working on a system to detect spoofed messages sent to automobiles by fingerprinting the clock skew of the various computer components within...Bruce Schneier From Schneier on Security | July 20, 2016 at 08:26 AM
I think the best hacks are the ones that are obvious once they're explained, but no one has thought of them before. Here's an example: Instagram ($2000), Google...Bruce Schneier From Schneier on Security | July 19, 2016 at 07:21 AM
This is a piece of near-future fiction about a cyberattack on New York, including hacking of cars, the water system, hospitals, elevators, and the power grid. Although...Bruce Schneier From Schneier on Security | July 18, 2016 at 07:27 AM
Looks like a tasty recipe. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | July 15, 2016 at 10:16 PM
This week, I have joined the board of directors of the Tor Project. Slashdot thread. Hacker News thread....Bruce Schneier From Schneier on Security | July 15, 2016 at 02:32 PM
Interesting analysis: Abstract: Objectives -- Informed by situational crime prevention (SCP) this study evaluates the effectiveness of the "West Bank Barrier" that...Bruce Schneier From Schneier on Security | July 14, 2016 at 06:58 AM
While we're on the subject of terrible 9th Circuit Court rulings: The U.S. Court of Appeals for the 9th Circuit has handed down a very important decision on the...Bruce Schneier From Schneier on Security | July 13, 2016 at 03:10 PM
In a truly terrible ruling, the US 9th Circuit Court ruled that using someone else's password with their permission but without the permission of the site owner...Bruce Schneier From Schneier on Security | July 13, 2016 at 12:07 PM
News has been bubbling about an announcement by Google that it's starting to experiment with public-key cryptography that's resistant to cryptanalysis by a quantum...Bruce Schneier From Schneier on Security | July 12, 2016 at 01:53 PM
I have written before on the vulnerabilities equities process (VEP): the system by which the US government decides whether to disclose and fix a computer vulnerability...Bruce Schneier From Schneier on Security | July 11, 2016 at 01:15 PM
Interesting paper: "Anonymization and Risk," by Ira S. Rubinstein and Woodrow Hartzog: Abstract: Perfect anonymization of data sets has failed. But the process...Bruce Schneier From Schneier on Security | July 11, 2016 at 07:31 AM
It's chromatic aberration. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | July 8, 2016 at 05:09 PM
Adam Conover interviewed me on his podcast. If you remember, I was featured on his "Adam Ruins Everything" TV episode on security....Bruce Schneier From Schneier on Security | July 8, 2016 at 01:08 PM
Two researchers have discovered over 100 Tor nodes that are spying on hidden services. Cory Doctorow explains: These nodes -- ordinary nodes, not exit nodes --...Bruce Schneier From Schneier on Security | July 8, 2016 at 08:01 AM
BBC has the story. The confusion is that a scan of a passport is much easier to forge than an actual passport. This is a truly hard problem: how do you give people...Bruce Schneier From Schneier on Security | July 7, 2016 at 02:27 PM
Interesting research: "Characterizing and Avoiding Routing Detours Through Surveillance States," by Anne Edmundson, Roya Ensafi, Nick Feamster, and Jennifer Rexford...Bruce Schneier From Schneier on Security | July 7, 2016 at 07:47 AM
The New York Times wrote a good piece comparing airport security around the world, and pointing out that moving the security perimeter doesn't make any difference...Bruce Schneier From Schneier on Security | July 6, 2016 at 10:45 AM
Interesting research: Debora Halbert, "Intellectual property theft and national security: Agendas and assumptions": Abstract: About a decade ago, intellectual property...Bruce Schneier From Schneier on Security | July 5, 2016 at 11:54 AM
Funny: The Department of Canine Security urges dogs to remain on high alert and employ the tactic of See Something, Say Something. Remember to bark upon spotting...Bruce Schneier From Schneier on Security | July 4, 2016 at 08:40 PM