From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The NSA is building a private cloud with its own security features: As a result, the agency can now track every instance of every individual accessing what is in...Bruce Schneier From Schneier on Security | October 2, 2014 at 07:58 AM
Firechat is a secure wireless peer-to-peer chat app: Firechat is theoretically resistant to the kind of centralized surveillance that the Chinese government (as...Bruce Schneier From Schneier on Security | October 1, 2014 at 04:01 PM
The Chinese government checked ten thousand pigeons for "dangerous materials." Because fear....Bruce Schneier From Schneier on Security | October 1, 2014 at 09:01 AM
There's a new article on NSA's Technology Transfer Program, a 1990s-era program to license NSA patents to private industry. I was pretty dismissive about the offerings...Bruce Schneier From Schneier on Security | September 29, 2014 at 07:54 AM
Warmer waters are moving squid fishing up the California coast. As usual, you can also use this squid post to talk about the security stories in the news that I...Bruce Schneier From Schneier on Security | September 26, 2014 at 05:28 PM
There's a Reuters article on new types of fraud using stolen medical records. I don't know how much of this is real and how much is hype, but I'm certain that criminals...Bruce Schneier From Schneier on Security | September 26, 2014 at 01:47 PM
This is a good essay on the security trade-offs with cloud backup: iCloud backups have not eliminated this problem, but they have made it far less common. This...Bruce Schneier From Schneier on Security | September 25, 2014 at 03:58 PM
It's a big and nasty one. Invariably we're going to see articles pointing at this and at Heartbleed and claim a trend in vulnerabilities in open-source software...Bruce Schneier From Schneier on Security | September 25, 2014 at 11:55 AM
Julian Sanchez of the Cato Institute has a lengthy audio interview on NSA surveillance and reform. Worth listening to....Bruce Schneier From Schneier on Security | September 24, 2014 at 03:22 PM
Interesting article on the arms race between creating robot "handwriting" that looks human, and detecting text that has been written by a robot. Robots will continue...Bruce Schneier From Schneier on Security | September 24, 2014 at 08:13 AM
I found the story of the Federal Reserve on 9/11 to be fascinating. It seems they just flipped a switch on all their Y2K preparations, and it worked....Bruce Schneier From Schneier on Security | September 23, 2014 at 02:09 PM
Jonathan Zittrain argues that our military weapons should be built with a kill switch, so they become useless when they fall into enemy hands....Bruce Schneier From Schneier on Security | September 23, 2014 at 09:22 AM
The National Highway Traffic Safety Administration (NHTSA) has released a report titled "Vehicle-to-Vehicle Communications: Readiness of V2V Technology for Application...Bruce Schneier From Schneier on Security | September 22, 2014 at 07:03 AM
Months after it was found in August, scientists have dissected a colossal squid. As usual, you can also use this squid post to talk about the security stories in...Bruce Schneier From Schneier on Security | September 19, 2014 at 05:29 PM
Apple claims that they can no longer unlock iPhones, even if the police show up with a warrant. Of course they still have access to everything in iCloud, but it's...Bruce Schneier From Schneier on Security | September 19, 2014 at 01:54 PM
Earlier this month, there were a bunch of stories about fake cell phone towers discovered around the US These seems to be ISMI catchers, like Harris Corporation's...Bruce Schneier From Schneier on Security | September 19, 2014 at 07:39 AM
If there's anything that confuses wannabe cryptographers, it's one-time pads....Bruce Schneier From Schneier on Security | September 18, 2014 at 03:58 PM
In 2008 Yahoo fought the NSA to avoid becoming part of the PRISM program. They eventually lost their court battle, and at one point were threatened with a $250,000...Bruce Schneier From Schneier on Security | September 18, 2014 at 08:36 AM
According to court documents, Dread Pirate Roberts was identified because a CAPTCHA service used on the Silk Road login page leaked the users' true location....Bruce Schneier From Schneier on Security | September 17, 2014 at 03:45 PM
What's interesting about this story is not that the cell phone system can track your location worldwide. That makes sense; the system has to know where you are....Bruce Schneier From Schneier on Security | September 17, 2014 at 08:16 AM