From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The city of Paradise Valley, AZ, is hiding license plate scanners in fake cactus plants....Bruce Schneier From Schneier on Security | May 14, 2015 at 07:18 AM
This 1947 document describes a German machine to cryptanalyze the American M-209 mechanical encryption machine. I can't figure out anything about how it works.....Bruce Schneier From Schneier on Security | May 13, 2015 at 12:05 PM
Anyone can design a cipher that he himself cannot break. This is why you should uniformly distrust amateur cryptography, and why you should only use published algorithms...Bruce Schneier From Schneier on Security | May 12, 2015 at 06:46 AM
Ross Anderson summarizes a meeting in Princeton where Edward Snowden was "present." Third, the leaks give us a clear view of an intelligence analyst's workflow....Bruce Schneier From Schneier on Security | May 11, 2015 at 07:26 AM
Squid chair. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | May 8, 2015 at 05:04 PM
It helps if you own the banks: The report said Shor and his associates worked together in 2012 to buy a controlling stake in three Moldovan banks and then gradually...Bruce Schneier From Schneier on Security | May 8, 2015 at 07:13 AM
Interesting research: We identified three types of scams happening on Jiayuan. The first one involves advertising of escort services or illicit goods, and is very...Bruce Schneier From Schneier on Security | May 7, 2015 at 01:30 PM
Matthew Cole explains how the Italian police figured out how the CIA kidnapped Abu Omar in Milan. Interesting use of cell phone metadata, showing how valuable it...Bruce Schneier From Schneier on Security | May 6, 2015 at 09:35 PM
In this long article on the 2005 assassination of Rafik Hariri in Beirut, there's a detailed section on what the investigators were able to learn from the cell...Bruce Schneier From Schneier on Security | May 6, 2015 at 08:09 AM
Impressive. Kamkar told Ars his Master Lock exploit started with a well-known vulnerability that allows Master Lock combinations to be cracked in 100 or fewer tries...Bruce Schneier From Schneier on Security | May 5, 2015 at 07:59 AM
Fox-IT has a blog post (and has published Snort rules) on how to detect man-on-the-side Internet attacks like the NSA's QUANTUMINSERT. From a Wired article: But...Bruce Schneier From Schneier on Security | May 4, 2015 at 07:17 AM
It's an obvious biometric for cell phones: Bodyprint recognizes users by their ears with 99.8% precision with a false rejection rate of only 1 out of 13. Grip,...Bruce Schneier From Schneier on Security | May 1, 2015 at 01:46 PM
New research paper: "New methods for examining expertise in burglars in natural and simulated environments: preliminary findings": Expertise literature in mainstream...Bruce Schneier From Schneier on Security | April 30, 2015 at 03:22 PM
Google has a new Chrome extension called "Password Alert": To help keep your account safe, today we're launching Password Alert, a free, open-source Chrome extension...Bruce Schneier From Schneier on Security | April 30, 2015 at 10:14 AM
Interesting article. There are a lot of surveillance and privacy issues at play here....Bruce Schneier From Schneier on Security | April 29, 2015 at 07:12 AM
A drug dealer claims that the police leaned him over an 18th floor balcony and threatened to kill him if he didn't give up his password. One of the policemen involved...Bruce Schneier From Schneier on Security | April 28, 2015 at 01:50 PM