From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Al Jazeera is reporting on leaked emails (not leaked by Snowden, but by someone else) detailing close ties between the NSA and Google. There are no smoking guns...Bruce Schneier From Schneier on Security | May 7, 2014 at 07:56 AM
Mathias Dopfner writes an open letter explaining why he fears Google: We know of no alternative which could offer even partially comparable technological prerequisites...Bruce Schneier From Schneier on Security | May 6, 2014 at 11:57 AM
Interesting article on the business of selling enhancements that allow you to cheat in online video games....Bruce Schneier From Schneier on Security | May 5, 2014 at 07:55 AM
Someone has finally proven how: How do these squid go from swimming to flying? Four phases of flight are described in the research: launching, jetting, gliding...Bruce Schneier From Schneier on Security | May 2, 2014 at 05:58 PM
Rats have destroyed dozens of electronic voting machines by eating the cables. It would have been a better story if the rats had zeroed out the machines after the...Bruce Schneier From Schneier on Security | May 2, 2014 at 03:59 PM
Detailed response and analysis of the inspectors general report on the Boston Marathon bombings: Two opposite mistakes in an after-the-fact review of a terrorist...Bruce Schneier From Schneier on Security | May 2, 2014 at 07:53 AM
Comedian John Oliver interviewed now-retired NSA director General Keith Alexander. It's truly weird....Bruce Schneier From Schneier on Security | May 1, 2014 at 03:47 PM
It's been long known that individual analog devices have their own fingerprints. Decades ago, individual radio transmitters were identifiable and trackable. Now...Bruce Schneier From Schneier on Security | April 30, 2014 at 02:42 PM
Good essay on the Quantified Toilet hoax, and the difference between public surveillance and private self-surveillance....Bruce Schneier From Schneier on Security | April 30, 2014 at 09:58 AM
This is interesting: Touch ID takes a 88x88 500ppi scan of your finger and temporarily sends that data to a secure cache located near the RAM, after the data is...Bruce Schneier From Schneier on Security | April 29, 2014 at 07:47 AM
Handycipher is a new pencil-and-paper symmetric encryption algorithm. I'd bet a gazillion dollars that it's not secure, although I haven't done the cryptanalysis...Bruce Schneier From Schneier on Security | April 28, 2014 at 07:45 AM
It's called "Tentacles." As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | April 25, 2014 at 05:17 PM
Interesting essay about how Google's lack of transparency is hurting their trust: The reality is that Google's business is and has always been about mining as much...Bruce Schneier From Schneier on Security | April 24, 2014 at 07:45 AM
Surveillance is getting cheaper and easier: Two artists have revealed Conversnitch, a device they built for less than $100 that resembles a lightbulb or lamp and...Bruce Schneier From Schneier on Security | April 23, 2014 at 03:33 PM
Interesting research on the security of code written in different programming languages. We don't know whether the security is a result of inherent properties of...Bruce Schneier From Schneier on Security | April 23, 2014 at 08:59 AM
Good essay: To repeat, Heartbleed is a common mode failure. We would not know about it were it not open source (Good). That it is open source has been shown to...Bruce Schneier From Schneier on Security | April 22, 2014 at 09:21 AM
Good information: Russian law gives Russia’s security service, the FSB, the authority to use SORM (“System for Operative Investigative Activities”) to collect,...Bruce Schneier From Schneier on Security | April 21, 2014 at 06:55 AM
Good news from Malaysia: The Terengganu International Squid Jigging Festival (TISJF) will be continued and become an annual event as one of the state's main tourism...Bruce Schneier From Schneier on Security | April 18, 2014 at 05:27 PM
There's a new study looking at the metaphors we use to describe surveillance. Over 62 days between December and February, we combed through 133 articles by 105...Bruce Schneier From Schneier on Security | April 18, 2014 at 03:49 PM