From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Susan Landau has a new paper on the NSA's increasing role in commercial cybersecurity. She argues that the NSA is the wrong organization to do this, and we need...Bruce Schneier From Schneier on Security | October 23, 2014 at 09:52 AM
Last week, Adi Shamir gave a presentation at Black Hat Europe on using all-in-one printers to control computers on the other side of air gaps. There's no paper...Bruce Schneier From Schneier on Security | October 22, 2014 at 03:51 PM
Interesting essay on the sorts of things you can learn from anonymized taxi passenger and fare data....Bruce Schneier From Schneier on Security | October 22, 2014 at 06:54 AM
The Guardian has reported that the app Whisper tracks users, and then published a second article explaining what it knows after Whisper denied the story. Here's...Bruce Schneier From Schneier on Security | October 21, 2014 at 01:07 PM
FBI Director James Comey again called for an end to secure encryption by putting in a backdoor. Here's his speech: There is a misconception that building a lawful...Bruce Schneier From Schneier on Security | October 21, 2014 at 10:58 AM
Last month, I wrote that the FBI identified Ross W. Ulbricht as the Silk Road's Dread Pirate Roberts through a leaky CAPTCHA. Seems that story doesn't hold water...Bruce Schneier From Schneier on Security | October 20, 2014 at 07:19 AM
That's a lot. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. And commenting was broken for a...Bruce Schneier From Schneier on Security | October 17, 2014 at 06:17 PM
Kevin Poulsen has written an interesting story about two people who successfully exploited a bug in a popular video poker machine....Bruce Schneier From Schneier on Security | October 17, 2014 at 07:35 AM
ECI is a classification above Top Secret. It's for things that are so sensitive they're basically not written down, like the names of companies whose cryptography...Bruce Schneier From Schneier on Security | October 16, 2014 at 07:22 AM
This is a creepy story. A woman has her phone seized by the Drug Enforcement Agency and gives them permission to look at her phone. Without her knowledge or consent...Bruce Schneier From Schneier on Security | October 15, 2014 at 08:06 AM
A few days ago, I saw this tweet: "Just a reminder that it is now *a full year* since Schneier cited it, and the FOXACID ops manual remains unpublished." It's true...Bruce Schneier From Schneier on Security | October 15, 2014 at 07:29 AM
This essay, "Grooming students for a lifetime of surveillance," talks about the general trends in student surveillance. Related: essay on the need for student privacy...Bruce Schneier From Schneier on Security | October 14, 2014 at 06:59 AM
Interesting essay about James Bamford and his efforts to publish The Puzzle Palace over the NSA's objections. Required reading for those who think the NSA's excesses...Bruce Schneier From Schneier on Security | October 13, 2014 at 07:55 AM
The latest Intercept article on the Snowden NSA documents talks about their undercover operatives working in foreign companies. There are no specifics, although...Bruce Schneier From Schneier on Security | October 11, 2014 at 04:00 PM
Recipe from Tom Douglas. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | October 10, 2014 at 05:56 PM
Good essay by Molly Sauter: basically, there is no legal avenue for activism and protest on the Internet. Also note Sauter's new book, The Coming Swarm....Bruce Schneier From Schneier on Security | October 10, 2014 at 01:56 PM
This article reads like snake oil. But the company was founded by Lars Knudsen, so it can't possibly be. I'm curious....Bruce Schneier From Schneier on Security | October 10, 2014 at 04:40 AM
In July, I wrote about an unpatchable USB vulnerability called BadUSB. Code for the vulnerability has been published....Bruce Schneier From Schneier on Security | October 8, 2014 at 04:41 PM
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World is finished. I submitted it to my publisher, Norton, this morning. In a few weeks...Bruce Schneier From Schneier on Security | October 7, 2014 at 07:56 AM