From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The vigorous debate after the Sony Pictures breach pitted the Obama administration against many of us in the cybersecurity community who didn't buy Washington's...Bruce Schneier From Schneier on Security | March 9, 2015 at 08:57 AM
There's a new 3D-printable biodegradable thermoplastic: Pennsylvania State University researchers have synthesized a biodegradable thermoplastic that can be used...Bruce Schneier From Schneier on Security | March 6, 2015 at 05:21 PM
Data and Goliath is a book about surveillance, both government and corporate. It's an exploration in three parts: what's happening, why it matters, and what to...Bruce Schneier From Schneier on Security | March 6, 2015 at 03:52 PM
This week we learned about an attack called "FREAK" -- "Factoring Attack on RSA-EXPORT Keys" -- that can break the encryption of many websites. Basically, some...Bruce Schneier From Schneier on Security | March 6, 2015 at 11:57 AM
New law journal article: "A Slow March Towards Thought Crime: How the Department of Homeland Security's FAST Program Violates the Fourth Amendment," by Christopher...Bruce Schneier From Schneier on Security | March 6, 2015 at 07:28 AM
The marketing firm Adnear is using drones to track cell phone users: The capture does not involve conversations or personally identifiable information, according...Bruce Schneier From Schneier on Security | March 5, 2015 at 08:00 AM
One of the problems with our current discourse about terrorism and terrorist policies is that the people entrusted with counterterrorism -- those whose job it is...Bruce Schneier From Schneier on Security | March 4, 2015 at 08:00 AM
On the net right now, there are excerpts from the Introduction on Scientific American, Chapter 5 on the Atlantic, Chapter 6 on the Blaze, Chapter 8 on Ars Technica...Bruce Schneier From Schneier on Security | March 3, 2015 at 02:59 PM
Lillipop encryption by default is still in the future. No conspiracy here; it seems like they don't have the appropriate drivers yet. But while relaxing the requirement...Bruce Schneier From Schneier on Security | March 3, 2015 at 02:12 PM
The thing about infrastructure is that everyone uses it. If it's secure, it's secure for everyone. And if it's insecure, it's insecure for everyone. This forces...Bruce Schneier From Schneier on Security | March 2, 2015 at 07:59 AM
Scientists are attaching cameras to Humboldt squid to watch them communicate with each other. As usual, you can also use this squid post to talk about the security...Bruce Schneier From Schneier on Security | February 27, 2015 at 06:00 PM
Over the next two weeks, I am speaking about my new book -- Data and Goliath, if you've missed it -- in New York, Boston, Washington, DC, Seattle, San Francisco...Bruce Schneier From Schneier on Security | February 27, 2015 at 03:55 PM
In December, Google's Executive Chairman Eric Schmidt was interviewed at the CATO Institute Surveillance Conference. One of the things he said, after talking about...Bruce Schneier From Schneier on Security | February 26, 2015 at 07:47 AM
Glenn Greenwald, Laura Poitras, and Edward Snowden did an "Ask Me Anything" on Reddit. Point out anything interesting in the comments. And note that Snowden mentioned...Bruce Schneier From Schneier on Security | February 25, 2015 at 02:54 PM
New paper: "Surreptitiously Weakening Cryptographic Systems," by Bruce Schneier, Matthew Fredrikson, Tadayoshi Kohno, and Thomas Ristenpart. Abstract: Revelations...Bruce Schneier From Schneier on Security | February 25, 2015 at 07:09 AM
AT&T is charging a premium for gigabit Internet service without surveillance: The tracking and ad targeting associated with the gigabit service cannot be avoided...Bruce Schneier From Schneier on Security | February 24, 2015 at 07:33 AM
New research on tracking the location of smart phone users by monitoring power consumption: PowerSpy takes advantage of the fact that a phone's cellular transmissions...Bruce Schneier From Schneier on Security | February 23, 2015 at 11:48 AM
This is freaky: A new study showcases the first example of an animal editing its own genetic makeup on-the-fly to modify most of its proteins, enabling adjustments...Bruce Schneier From Schneier on Security | February 20, 2015 at 05:55 PM
It's not just national intelligence agencies that break your https security through man-in-the-middle attacks. Corporations do it, too. For the past few months,...Bruce Schneier From Schneier on Security | February 20, 2015 at 04:53 PM