From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In 2008 Yahoo fought the NSA to avoid becoming part of the PRISM program. They eventually lost their court battle, and at one point were threatened with a $250,000...Bruce Schneier From Schneier on Security | September 18, 2014 at 08:36 AM
According to court documents, Dread Pirate Roberts was identified because a CAPTCHA service used on the Silk Road login page leaked the users' true location....Bruce Schneier From Schneier on Security | September 17, 2014 at 03:45 PM
What's interesting about this story is not that the cell phone system can track your location worldwide. That makes sense; the system has to know where you are....Bruce Schneier From Schneier on Security | September 17, 2014 at 08:16 AM
New Zealand is spying on its citizens. Edward Snowden weighs in personally. The NSA and GCHQ are mapping the entire Internet, including hacking into Deutsche Telekom...Bruce Schneier From Schneier on Security | September 15, 2014 at 03:52 PM
Good article on the insecurity of SHA-1 and the need to replace it sooner rather than later....Bruce Schneier From Schneier on Security | September 15, 2014 at 10:27 AM
A 200-pound dead giant squid was found near the coast of Matagorda, Texas. This is only the third giant squid ever found in the Gulf of Mexico. As usual, you can...Bruce Schneier From Schneier on Security | September 12, 2014 at 05:49 PM
Since the beginning, data privacy regulation focused on collection, storage, and use. You can see it in the OECD Privacy Framework from 1980 (see also this proposed...Bruce Schneier From Schneier on Security | September 12, 2014 at 08:50 AM
Aza Raskin describes a new phishing attack: taking over a background tab on a browser to trick people into entering in their login credentials. Clever....Bruce Schneier From Schneier on Security | September 11, 2014 at 07:59 AM
WikiLeaks has organized the trove of documents about corporations aiding government surveillance around the world. It's worth wandering around through all this...Bruce Schneier From Schneier on Security | September 10, 2014 at 03:59 PM
Good security analysis of Safeplug, which is basically Tor in a box. Short answer: not yet....Bruce Schneier From Schneier on Security | September 10, 2014 at 07:35 AM
A device called Cyborg Unplugged can be configured to prevent any Wi-Fi connection: Oliver notes on the product's website that its so-called "All Out Mode" -- which...Bruce Schneier From Schneier on Security | September 9, 2014 at 04:00 PM
Apple is including some sort of automatic credit-card payment system with the iPhone 6. They're using some security feature of the phone and system to negotiate...Bruce Schneier From Schneier on Security | September 8, 2014 at 08:55 AM
Preparing the Ghost: An Essay Concerning the Giant Squid and Its First Photographer, by Matthew Gavin Frank. As usual, you can also use this squid post to talk...Bruce Schneier From Schneier on Security | September 5, 2014 at 05:06 PM
At USENIX Security this year there were two papers studying the security of password managers: David Silver, Suman Jana, and Dan Boneh, "Password Managers: Attacks...Bruce Schneier From Schneier on Security | September 5, 2014 at 07:01 AM
JackPair is a clever device encrypts your voice between your headset and the audio jack. The crypto looks competent, and the design looks well-thought-out. I'd...Bruce Schneier From Schneier on Security | September 3, 2014 at 11:00 AM
Squid are color-blind, but may detect color directly through their skin. A researcher is working on a system to detect colored light the way squid do....Bruce Schneier From Schneier on Security | August 29, 2014 at 05:45 PM
California passed a kill-switch law, meaning that all cell phones sold in California must have the capability to be remotely turned off. It was sold as an antitheft...Bruce Schneier From Schneier on Security | August 29, 2014 at 01:58 PM
They're openly mocking our profiling. But in several telephone conversations with a Reuters reporter over the past few months, Islamic State fighters had indicated...Bruce Schneier From Schneier on Security | August 29, 2014 at 08:44 AM