From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This is a creepy story. The FBI wanted access to a hotel guest's room without a warrant. So agents broke his Internet connection, and then posed as Internet technicians...Bruce Schneier From Schneier on Security | November 26, 2014 at 07:50 AM
Regin is another military-grade surveillance malware (tech details from Symantec and Kaspersky). It seems to have been in operation between 2008 and 2011. The Intercept...Bruce Schneier From Schneier on Security | November 25, 2014 at 07:57 AM
Nice article on some of the security assumptions we rely on in cryptographic algorithms....Bruce Schneier From Schneier on Security | November 24, 2014 at 03:45 PM
Jim Sanborn has given he world another clue to the fourth cyphertext in his Kryptos sculpture at the CIA headquarters. Older posts on Kryptos....Bruce Schneier From Schneier on Security | November 24, 2014 at 07:54 AM
Tales of cephalopod behavior, including octopuses, squid, cuttlefish and nautiluses. Cephalopod Cognition, published by Cambridge University Press, is currently...Bruce Schneier From Schneier on Security | November 21, 2014 at 05:52 PM
Reuters is reporting that in 2009, several senior NSA officials objected to the NSA call-records collection program. The now-retired NSA official, a longtime code...Bruce Schneier From Schneier on Security | November 20, 2014 at 03:46 PM
Citadel is the first piece of malware I know of that specifically steals master passwords from password managers. Note that my own Password Safe is a target....Bruce Schneier From Schneier on Security | November 20, 2014 at 10:53 AM
Announcing Let's Encrypt, a new free certificate authority. This is a joint project of EFF, Mozilla, Cisco, Akamai, and the University of Michigan. This is an absolutely...Bruce Schneier From Schneier on Security | November 18, 2014 at 02:01 PM
Whatapp is now offering end-to-end message encryption: Whatsapp will integrate the open-source software Textsecure, created by privacy-focused non-profit Open Whisper...Bruce Schneier From Schneier on Security | November 18, 2014 at 02:01 PM
The NSA recently declassified a report on the Eurocrypt '92 conference. Honestly, I share some of the writer's opinions on the more theoretical stuff. I know it's...Bruce Schneier From Schneier on Security | November 18, 2014 at 11:57 AM
New article on the NSA's efforts to control academic cryptographic research in the 1970s. It includes new interviews with public-key cryptography inventor Martin...Bruce Schneier From Schneier on Security | November 17, 2014 at 10:19 PM
The interesting story of how engineers at Ford Motor Co. invented the superconducting quantum interference device, or SQUID. As usual, you can also use this squid...Bruce Schneier From Schneier on Security | November 14, 2014 at 06:01 PM
Last month, for the first time since US export restrictions on cryptography were relaxed two decades ago, the US government has fined a company for exporting crypto...Bruce Schneier From Schneier on Security | November 14, 2014 at 10:58 AM
Pew Research has released a new survey on American's perceptions of privacy. The results are pretty much in line with all the other surveys on privacy I've read...Bruce Schneier From Schneier on Security | November 13, 2014 at 04:00 PM
It's not happening often, but it seems that some ISPs are blocking STARTTLS messages and causing web encryption to fail. EFF has the story....Bruce Schneier From Schneier on Security | November 13, 2014 at 08:43 AM
Orin Kerr has a new article that argues for narrowly constructing national security law: This Essay argues that Congress should adopt a rule of narrow construction...Bruce Schneier From Schneier on Security | November 11, 2014 at 03:41 PM
Kaspersky Labs is reporting (detailed report here, technical details here) on a sophisticated hacker group that is targeting specific individuals around the world...Bruce Schneier From Schneier on Security | November 10, 2014 at 03:55 PM
Good paper, and layman's explanation. Internet voting scares me. It gives hackers the potential to seriously disrupt our democratic processes....Bruce Schneier From Schneier on Security | November 10, 2014 at 02:43 PM
Security is a combination of protection, detection, and response. It's taken the industry a long time to get to this point, though. The 1990s was the era of protection...Bruce Schneier From Schneier on Security | November 10, 2014 at 07:51 AM
I'm not sure why this is news, except that it makes for a startling headline. (Is the New York Times now into clickbait?) It's not as if people are throwing squid...Bruce Schneier From Schneier on Security | November 7, 2014 at 06:00 PM