From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In 1999, Lance Hoffman, David Balenson, and others published a survey of non-US cryptographic products. The point of the survey was to illustrate that there was...Bruce Schneier From Schneier on Security | September 11, 2015 at 03:08 PM
Last month, a Kentucky man shot down a drone that was hovering near his backyard. WDRB News reported that the camera drone's owners soon showed up at the home of...Bruce Schneier From Schneier on Security | September 11, 2015 at 07:45 AM
Chess player caught cheating at a tournament: I kept on looking at him. He was always sitting down, he never got up. It was very strange; we are taking about hours...Bruce Schneier From Schneier on Security | September 10, 2015 at 01:30 PM
The New York Times is reporting that Apple encryption is hampering an FBI investigation: In an investigation involving guns and drugs, the Justice Department obtained...Bruce Schneier From Schneier on Security | September 10, 2015 at 07:00 AM
It's not just humans who dislike the small flying objects. YouTube has videos of drones being stared at quizzically by a moose, harassed by a raven, attacked by...Bruce Schneier From Schneier on Security | September 9, 2015 at 02:30 PM
Most of us get to be thoroughly relieved that our emails weren't in the Ashley Madison database. But don't get too comfortable. Whatever secrets you have, even...Bruce Schneier From Schneier on Security | September 9, 2015 at 09:42 AM
Someone recently noticed a Washington Post story on the TSA that originally contained a detailed photograph of all the TSA master keys. It's now blurred out of...Bruce Schneier From Schneier on Security | September 8, 2015 at 07:02 AM
Interesting debate, surprisingly civil. Alexander seemed to have been okay with Snowden revealing surveillance based on Section 215: "If he had taken the one court...Bruce Schneier From Schneier on Security | September 7, 2015 at 10:14 AM
Using squid teeth as a model, researchers have created "the first material that heals itself in water." Paper from Nature. As usual, you can also use this squid...Bruce Schneier From Schneier on Security | September 4, 2015 at 05:07 PM
This coming Thursday, I'll be talking with Larry Poneman about cyber-resilience and the results of a new survey he's releasing. Join us here. The event is sponsored...Bruce Schneier From Schneier on Security | September 4, 2015 at 03:19 PM
Interesting research: "An Analysis of China's 'Great Cannon.'" Abstract: On March 16th, 2015, the Chinese censorship apparatus employed a new tool, the "Great Cannon"...Bruce Schneier From Schneier on Security | September 4, 2015 at 09:16 AM
Several times I've mentioned Peter Swire's concept of "the declining half-life of secrets." He's finally written it up: The nature of secrets is changing. Secrets...Bruce Schneier From Schneier on Security | September 3, 2015 at 09:43 AM
This Washington Post article uses the history of the L0pht to talk about the broader issues of Internet security....Bruce Schneier From Schneier on Security | September 2, 2015 at 08:04 AM
An Australian reporter for the ABC, Will Ockenden published a bunch of his metadata, and asked people to derive various elements of his life. They did pretty well...Bruce Schneier From Schneier on Security | September 1, 2015 at 07:36 AM
This is interesting research:: Whilst the fridge implements SSL, it FAILS to validate SSL certificates, thereby enabling man-in-the-middle attacks against most...Bruce Schneier From Schneier on Security | August 31, 2015 at 02:56 PM
Beautiful diorama. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | August 28, 2015 at 05:33 PM
James Mickens, for your amusement. A somewhat random sample: My point is that security people need to get their priorities straight. The "threat model" section...Bruce Schneier From Schneier on Security | August 28, 2015 at 04:58 PM
An unofficial blog post from FTC chief technologist Ashkan Soltani on the virtues of strong end-user device controls....Bruce Schneier From Schneier on Security | August 28, 2015 at 03:36 PM
The German newspaper Zeit is reporting the BfV, Germany's national intelligence agency, (probably) illegally traded data about Germans to the NSA in exchange for...Bruce Schneier From Schneier on Security | August 28, 2015 at 10:23 AM
CitizenLab is reporting on Iranian hacking attempts against activists, which include a real-time man-in-the-middle attack against Google's two-factor authentication...Bruce Schneier From Schneier on Security | August 27, 2015 at 01:36 PM