From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This was supposed to be a secret until the middle of February, but we've been found out. We already have European customers; this is our European office. And, by...Bruce Schneier From Schneier on Security | January 30, 2015 at 03:57 PM
Here's a story of a fake bank in China -- a real bank, not an online bank -- that stole $32m from depositors over a year. Pro tip: real banks never offer 2%/week...Bruce Schneier From Schneier on Security | January 30, 2015 at 07:49 AM
Another story from the Snowden documents: According to the documents, the LEVITATION program can monitor downloads in several countries across Europe, the Middle...Bruce Schneier From Schneier on Security | January 29, 2015 at 07:26 AM
I missed this paper when it was first published in 2012: "Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks" Abstract...Bruce Schneier From Schneier on Security | January 28, 2015 at 08:00 AM
In the latest example of a military technology that has secretly been used by the police, we have radar guns that can see through walls....Bruce Schneier From Schneier on Security | January 27, 2015 at 02:08 PM
Here's an IDEA-variant with a 128-bit block length. While I think it's a great idea to bring IDEA up to a modern block length, the paper has none of the cryptanalysis...Bruce Schneier From Schneier on Security | January 27, 2015 at 07:24 AM
Remember back in 2013 when the then-director of the NSA Keith Alexander claimed that Section 215 bulk telephone metadata surveillance stopped "fifty-four different...Bruce Schneier From Schneier on Security | January 26, 2015 at 06:51 AM
Today, as part of a Harvard computer science symposium, I had a public conversation with Edward Snowden. The topics were largely technical, ranging from cryptography...Bruce Schneier From Schneier on Security | January 23, 2015 at 05:58 PM
Giggling Squid is a Thai restaurant chain in the UK. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...Bruce Schneier From Schneier on Security | January 23, 2015 at 05:22 PM
Last year, two Swiss artists programmed a Random Botnot Shopper, which every week would spend $100 in bitcoin to buy a random item from an anonymous Internet black...Bruce Schneier From Schneier on Security | January 23, 2015 at 05:55 AM
It's a common fraud on sites like eBay: buyers falsely claim that they never received a purchased item in the mail. Here's a paper on defending against this fraud...Bruce Schneier From Schneier on Security | January 21, 2015 at 07:31 AM
At a CATO surveillance event last month, Ben Wittes talked about inherent presidential powers of surveillance with this hypothetical: "What should Congress have...Bruce Schneier From Schneier on Security | January 20, 2015 at 07:24 AM
Late last year, in a criminal case involving export violations, the US government disclosed a mysterious database of telephone call records that it had queried...Bruce Schneier From Schneier on Security | January 19, 2015 at 01:42 PM
Appelbaum, Poitras and others have another NSA aticle with an enormous Snowden document dump on Der Spiegel, giving details on a variety of offensive NSA cyberoperations...Bruce Schneier From Schneier on Security | January 18, 2015 at 08:42 AM
Classic song written by Arthur Scammell and performed by Hank Snow. As usual, you can also use this squid post to talk about the security stories in the news that...Bruce Schneier From Schneier on Security | January 16, 2015 at 05:44 PM
For its "Top Influencers in Security You Should Be Following in 2015" blog post, TripWire asked me: "If you could have one infosec-related superpower, what would...Bruce Schneier From Schneier on Security | January 16, 2015 at 02:46 PM
I have long said that driving a car is the most dangerous thing regularly do in our lives. Turns out deaths due to automobiles are declining, while deaths due to...Bruce Schneier From Schneier on Security | January 16, 2015 at 07:59 AM
An excellent idea: 311 for encryption. RSA, DSA, and ECDSA must be 3.4 ounces (100bits) or less per container; must be in 1 quart-sized, clear, plastic, zip-top...Bruce Schneier From Schneier on Security | January 15, 2015 at 02:22 PM
Thousands of articles have called the December attack against Sony Pictures a wake-up call to industry. Regardless of whether the attacker was the North Korean...Bruce Schneier From Schneier on Security | January 15, 2015 at 07:44 AM
It's called SnoopSnitch: SnoopSnitch is an app for Android devices that analyses your mobile radio traffic to tell if someone is listening in on your phone conversations...Bruce Schneier From Schneier on Security | January 14, 2015 at 02:23 PM