From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Interesting article on the NSA's use of multi-beam antennas for surveillance. Certainly smart technology; it can eavesdrop on multiple targets per antenna. I'm...Bruce Schneier From Schneier on Security | July 13, 2015 at 04:01 PM
A cute series of knitted plushies. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | July 10, 2015 at 05:29 PM
India is cracking down on people who use technology to cheat on exams: Candidates have been told to wear light clothes with half-sleeves, and shirts that do not...Bruce Schneier From Schneier on Security | July 10, 2015 at 01:44 PM
Recently, WikiLeaks began publishing over half a million previously secret cables and other documents from the Foreign Ministry of Saudi Arabia. It's a huge trove...Bruce Schneier From Schneier on Security | July 10, 2015 at 05:35 AM
Monday a group of cryptographers and security experts released a major paper outlining the risks of government-mandated back-doors in encryption products: Keys...Bruce Schneier From Schneier on Security | July 9, 2015 at 07:31 AM
This is an interesting story of a reviewer who had her reviewer deleted because Amazon believed she knew the author personally. Leaving completely aside the ethics...Bruce Schneier From Schneier on Security | July 8, 2015 at 07:36 AM
Read this: Hacking Team asked its customers to shut down operations, but according to one of the leaked files, as part of Hacking Team's "crisis procedure," it...Bruce Schneier From Schneier on Security | July 7, 2015 at 06:44 PM
I've been reading through the 48 classified documents about the NSA's XKEYSCORE system released by the Intercept last week. From the article: The NSA's XKEYSCORE...Bruce Schneier From Schneier on Security | July 7, 2015 at 07:38 AM
Someone hacked the cyberweapons arms manufacturer Hacking Team and posted 400 GB of internal company data. Hacking Team is a pretty sleazy company, selling surveillance...Bruce Schneier From Schneier on Security | July 6, 2015 at 01:53 PM
On Friday, WikiLeaks published three summaries of NSA intercepts of German government communications. To me, the most interesting thing is not the intercept analyses...Bruce Schneier From Schneier on Security | July 6, 2015 at 06:13 AM
Long article about a very lucrative squid-fishing industry that involves bribing the Cambodian Navy. As usual, you can also use this squid post to talk about the...Bruce Schneier From Schneier on Security | July 3, 2015 at 05:39 PM
It's the Internet, which means there must be cute animal videos on this blog. But this one is different. Watch a mother rabbit beat up a snake to protect her children...Bruce Schneier From Schneier on Security | July 3, 2015 at 01:13 PM
This is really clever: Enigma's technique -- what cryptographers call "secure multiparty computation" -- works by mimicking a few of the features of bitcoin's decentralized...Bruce Schneier From Schneier on Security | July 3, 2015 at 07:38 AM
The Intercept has published a highly detailed two-part article on how the NSA's XKEYSCORE works, including a huge number of related documents from the Snowden archive...Bruce Schneier From Schneier on Security | July 2, 2015 at 12:22 PM
I don't have much to say about the recent hack of the US Office of Personnel Management, which has been attributed to China (and seems to be getting worse all the...Bruce Schneier From Schneier on Security | July 1, 2015 at 07:32 AM
The official Twitter feed for my blog is @schneierblog. The account @Bruce_Schneier also mirrors my blog, but it is not mine. I have nothing to do with it, and...Bruce Schneier From Schneier on Security | June 30, 2015 at 02:16 PM
Interesting research from 2012: "The Dynamics of Evolving Beliefs, Concerns, Emotions, and Behavioral Avoidance Following 9/11: A Longitudinal Analysis of Representative...Bruce Schneier From Schneier on Security | June 30, 2015 at 07:27 AM
There's a new paper on a low-cost TEMPEST attack against PC cryptography: We demonstrate the extraction of secret decryption keys from laptop computers, by nonintrusively...Bruce Schneier From Schneier on Security | June 29, 2015 at 02:38 PM
Here's a comprehensive document on migrating from SHA-1 to SHA-2 in Active Directory certificates....Bruce Schneier From Schneier on Security | June 29, 2015 at 07:05 AM
I have always liked this one. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | June 26, 2015 at 05:32 PM