From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
John Mueller suggests an alternative to the FBI's practice of encouraging terrorists and then arresting them for something they would have never have planned on...Bruce Schneier From Schneier on Security | April 10, 2015 at 11:38 AM
Researchers found voting-system flaws in New South Wales, and were attacked by voting officials and the company that made the machines....Bruce Schneier From Schneier on Security | April 9, 2015 at 07:45 AM
The Southern Poverty Law Center warns of the rise of lone-wolf terrorism. From a security perspective, lone wolves are much harder to prevent because there is no...Bruce Schneier From Schneier on Security | April 8, 2015 at 11:21 AM
Here's an article on making secret phone calls with cell phones. His step-by-step instructions for making a clandestine phone call are as follows: Analyze your...Bruce Schneier From Schneier on Security | April 7, 2015 at 10:32 AM
Giant squid caught on video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | April 3, 2015 at 05:17 PM
Wow. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | April 3, 2015 at 05:16 PM
The security audit of the TrueCrypt code has been completed (see here for the first phase of the audit), and the results are good. Some issues were found, but nothing...Bruce Schneier From Schneier on Security | April 3, 2015 at 02:14 PM
Nice idea, but I would like it to work for other browsers and other e-mail programs....Bruce Schneier From Schneier on Security | April 1, 2015 at 02:13 PM
It's April 1, and time for another Movie-Plot Threat Contest. This year, the theme is Crypto Wars II. Strong encryption is evil, because it prevents the police...Bruce Schneier From Schneier on Security | April 1, 2015 at 07:33 AM
Pew Research has a new survey on Americans' privacy habits in a post-Snowden world. The 87% of those who had heard at least something about the programs were asked...Bruce Schneier From Schneier on Security | March 31, 2015 at 03:54 PM
There's a Chinese CA that's issuing fraudulent Google certificates. Yet another example of why the CA model is so broken....Bruce Schneier From Schneier on Security | March 31, 2015 at 01:42 PM
In the US, certain types of warrants can come with gag orders preventing the recipient from disclosing the existence of warrant to anyone else. A warrant canary...Bruce Schneier From Schneier on Security | March 31, 2015 at 08:19 AM
This is a clever attack, using a black box that attaches to the iPhone via USB: As you know, an iPhone keeps a count of how many wrong PINs have been entered, in...Bruce Schneier From Schneier on Security | March 30, 2015 at 07:47 AM
More research. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | March 27, 2015 at 05:03 PM
Researchers have managed to get two computers to communicate using heat and thermal sensors. It's not really viable communication -- the bit rate is eight per hour...Bruce Schneier From Schneier on Security | March 27, 2015 at 08:01 AM
The Intercept and the New Zealand Herald have reported that New Zealand spied on communications about the World Trade Organization director-general candidates....Bruce Schneier From Schneier on Security | March 26, 2015 at 10:59 AM
There's a new story about the hacking capabilities of Canada's Communications Security Establishment (CSE), based on the Snowden documents....Bruce Schneier From Schneier on Security | March 25, 2015 at 07:55 AM