From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This is an update to my earlier post. Cloudflare is reporting that its very difficult, if not practically impossible, to steal SSL private keys with this attack...Bruce Schneier From Schneier on Security | April 11, 2014 at 02:50 PM
This is not a surprise: The Los Angeles Police Commission is investigating how half of the recording antennas in the Southeast Division went missing, seemingly...Bruce Schneier From Schneier on Security | April 11, 2014 at 07:59 AM
Heartbleed is a catastrophic bug in OpenSSL: "The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions...Bruce Schneier From Schneier on Security | April 9, 2014 at 07:00 AM
This headline is provocative: "Human biology inspires 'unbreakable' encryption." The article is similarly nonsensical: Researchers at Lancaster University, UK have...Bruce Schneier From Schneier on Security | April 8, 2014 at 07:16 AM
Interesting research: Abstract: We investigate the ability of a passive network observer to leverage third-party HTTP tracking cookies for mass surveillance. If...Bruce Schneier From Schneier on Security | April 4, 2014 at 09:27 AM
Ephemeral messaging apps such as Snapchat, Wickr and Frankly, all of which advertise that your photo, message or update will only be accessible for a short period...Bruce Schneier From Schneier on Security | April 2, 2014 at 06:40 AM
As you might expect, this year's contest has the NSA as the villain: The NSA has won, but how did it do it? How did it use its ability to conduct ubiquitous surveillance...Bruce Schneier From Schneier on Security | April 1, 2014 at 08:00 AM
If you've been reading the news recently, you might think that corporate America is doing its best to thwart NSA surveillance. Google just announced that it is...Bruce Schneier From Schneier on Security | March 31, 2014 at 10:20 AM
This seems really science fictional: It's already possible to make some inferences about the appearance of crime suspects from their DNA alone, including their...Bruce Schneier From Schneier on Security | March 28, 2014 at 01:01 PM
Both Der Spiegel and the New York Times are reporting that the NSA has hacked Huawei pretty extensively, getting copies of the company's products' source code and...Bruce Schneier From Schneier on Security | March 27, 2014 at 01:33 PM
There's a private competition to identify new password hashing schemes. Submissions are due at the end of the month....Bruce Schneier From Schneier on Security | March 27, 2014 at 01:24 PM
Interesting research. Both vocabulary and question comprehension were positively correlated with generalized trust. Those with the highest vocab scores were 34...Bruce Schneier From Schneier on Security | March 27, 2014 at 12:54 PM
An omen of what? An increase in the number of giant squid being caught along the Sea of Japan coast is leading puzzled fishermen to fear their presence may be some...Bruce Schneier From Schneier on Security | March 27, 2014 at 12:41 PM
Interesting research into figuring out where Twitter users are located, based on similar tweets from other users: While geotags are the most definitive location...Bruce Schneier From Schneier on Security | March 27, 2014 at 08:43 AM
Facebook has developed a face-recognition system that works almost as well as the human brain: Asked whether two unfamiliar photos of faces show the same person...Bruce Schneier From Schneier on Security | March 26, 2014 at 09:53 PM
I'm writing a new book, with the tentative title of Data and Power. While it's obvious that the proliferation of data affects power, it's less clear how it does...Bruce Schneier From Schneier on Security | March 26, 2014 at 08:19 PM