From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
People can be identified from their "driver fingerprint": ...a group of researchers from the University of Washington and the University of California at San Diego...Bruce Schneier From Schneier on Security | May 30, 2016 at 11:10 AM
This research paper shows that the number of squids, and the number of cephalopods in general, has been steadily increasing over the past 60 years: Our analyses...Bruce Schneier From Schneier on Security | May 27, 2016 at 05:28 PM
Interesting research paper: Cormac Herley, "Unfalsifiability of security claims: There is an inherent asymmetry in computer security: things can be declared insecure...Bruce Schneier From Schneier on Security | May 27, 2016 at 07:19 AM
Suckfly seems to be another Chinese nation-state espionage tool, first stealing South Korean certificates and now attacking Indian networks. Symantec has done a...Bruce Schneier From Schneier on Security | May 26, 2016 at 07:31 AM
There's a new trend in Silicon Valley startups; companies are not collecting and saving data on their customers: In Silicon Valley, there's a new emphasis on putting...Bruce Schneier From Schneier on Security | May 25, 2016 at 03:37 PM
Good debate in the Wall Street Journal. This isn't an obvious one; there are good arguments on both sides....Bruce Schneier From Schneier on Security | May 25, 2016 at 06:58 AM
This is good news: Communications and Electronics Security Group (CESG), the information security arm of GCHQ, was credited with the discovery of two vulnerabilities...Bruce Schneier From Schneier on Security | May 24, 2016 at 03:12 PM
Google is trying to bring this to Android developers by the end of the year: Today, secure logins -- like those used by banks or in the enterprise environment -...Bruce Schneier From Schneier on Security | May 24, 2016 at 09:35 AM
Really interesting research: "Online tracking: A 1-million-site measurement and analysis," by Steven Englehardt and Arvind Narayanan: Abstract: We present the largest...Bruce Schneier From Schneier on Security | May 23, 2016 at 06:33 AM
Video. Plus an octopus kite, with another squid kite in the background. As usual, you can also use this squid post to talk about the security stories in the news...Bruce Schneier From Schneier on Security | May 20, 2016 at 05:20 PM
Really interesting article on the difficulties involved with explosive detection at airport security checkpoints. Abstract: The mid-air bombing of a Somali passenger...Bruce Schneier From Schneier on Security | May 20, 2016 at 03:06 PM
Jonathan Mayer, Patrick Mutchler, and John C. Mitchell, "Evaluating the privacy properties of telephone metadata": Abstract: Since 2013, a stream of disclosures...Bruce Schneier From Schneier on Security | May 19, 2016 at 07:10 AM
Economists argue that the security needs of various crops are the cause of civilization size: The argument depends on the differences between how grains and tubers...Bruce Schneier From Schneier on Security | May 18, 2016 at 10:11 AM
The Intercept is starting to publish a lot more documents. Yesterday they published the first year of an internal newsletter called SIDtoday, along with several...Bruce Schneier From Schneier on Security | May 17, 2016 at 07:18 AM
At the last match of the year for Manchester United, someone found a bomb in a toilet, and security evacuated all 75,000 people and canceled the match. Turns out...Bruce Schneier From Schneier on Security | May 16, 2016 at 06:15 PM
Here's an interesting case of doctored urine-test samples from the Sochi Olympics. Evidence points to someone defeating the tamper-resistance of the bottles: Berlinger...Bruce Schneier From Schneier on Security | May 16, 2016 at 07:03 AM
Goya is facing a $5 million lawsuit; the plaintiff is claiming its canned octopus is really squid. As usual, you can also use this squid post to talk about the...Bruce Schneier From Schneier on Security | May 13, 2016 at 05:14 PM
Lawfare is turning out to be the go-to blog for policy wonks about various government debates on cybersecurity. There are two good posts this week on the Going...Bruce Schneier From Schneier on Security | May 13, 2016 at 07:55 AM