From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
China is considering a new "social credit" system, designed to rate everyone's trustworthiness. Many fear that it will become a tool of social control -- but in...Bruce Schneier From Schneier on Security | January 8, 2016 at 06:21 AM
Nice essay that lists ten "truths" about terrorism: We can't keep the bad guys out. Besides, the threat is already inside. More surveillance won't get rid of terrorism...Bruce Schneier From Schneier on Security | January 7, 2016 at 08:00 AM
There's an excellent article in Foreign Affairs on how the European insistence on data privacy -- most recently illustrated by their invalidation of the "safe harbor"...Bruce Schneier From Schneier on Security | January 6, 2016 at 07:14 AM
Recently declassified: Deception Maxims: Fact and Folklore, Office of Research and Development, Central Intelligence Agency, June 1981. Research on deception and...Bruce Schneier From Schneier on Security | January 5, 2016 at 01:44 PM
The Wall Street Journal has a story that the NSA spied on Israeli Prime Minister Benjamin Netanyahu and other Israeli government officials, and incidentally collected...Bruce Schneier From Schneier on Security | January 5, 2016 at 07:36 AM
On the Intercept, Micah Lee has a good article that talks about how Microsoft is collecting the hard-drive encryption keys of Windows 10 users, and how to disable...Bruce Schneier From Schneier on Security | January 4, 2016 at 02:14 PM
Interesting blog post: We are able to de-anonymize executable binaries of 20 programmers with 96% correct classification accuracy. In the de-anonymization process...Bruce Schneier From Schneier on Security | January 4, 2016 at 08:41 AM
Giant squid filmed swimming through a harbor in Japan: Reports in Japanese say that the creature was filmed on December 24, seen by an underwater camera swimming...Bruce Schneier From Schneier on Security | January 1, 2016 at 01:29 PM
Cory Doctorow has a good essay on software integrity and control problems and the Internet of Things. He's writing about self-driving cars, but the issue is much...Bruce Schneier From Schneier on Security | December 31, 2015 at 07:12 AM
A lot of Pennsylvania government officials are being hurt as a result of e-mails being made public. This is all the result of a political pressure to release the...Bruce Schneier From Schneier on Security | December 30, 2015 at 07:29 AM
Brian Krebs has the story. Bottom line: PayPal has no excuse for this kind of stuff. I hope the public shaming incents them to offer better authentication for its...Bruce Schneier From Schneier on Security | December 29, 2015 at 01:25 PM
In theory, the Internet of Things -- the connected network of tiny computers inside home appliances, household objects, even clothing -- promises to make your life...Bruce Schneier From Schneier on Security | December 29, 2015 at 06:58 AM
The Intercept just published a 2011 GCHQ document outlining their exploit capabilities against Juniper networking equipment, including routers and NetScreen firewalls...Bruce Schneier From Schneier on Security | December 28, 2015 at 07:54 AM
Squid sighting in this Christmas cartoon. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. And...Bruce Schneier From Schneier on Security | December 25, 2015 at 04:00 PM
Earlier this month, a Las Vegas taco shop was robbed in the middle of the night. The restaurant took the surveillance-video footage and turned it into a combination...Bruce Schneier From Schneier on Security | December 24, 2015 at 02:24 PM
This weird story describes a "porn dog" that is trained to find hidden hard drives. It's used in child porn investigations. I suppose it's reasonable that computer...Bruce Schneier From Schneier on Security | December 24, 2015 at 09:18 AM
On Thursday, a Brazilian judge ordered the text messaging service WhatsApp shut down for 48 hours. It was a monumental action. WhatsApp is the most popular app...Bruce Schneier From Schneier on Security | December 23, 2015 at 07:48 AM
Two things to read: "Wanting It Bad Enough Won't Make It Work: Why Adding Backdoors and Weakening Encryption Threatens the Internet," by Meredith Whittaker and...Bruce Schneier From Schneier on Security | December 22, 2015 at 07:34 AM
This interesting article by medieval historian Amanda Power traces our culture's relationship with the concept of mass surveillance from the medieval characterization...Bruce Schneier From Schneier on Security | December 21, 2015 at 02:09 PM
Juniper has warned about a malicious back door in their firewalls that automatically decrypts VPN traffic. It's been there for years. Hopefully details are forthcoming...Bruce Schneier From Schneier on Security | December 21, 2015 at 07:52 AM