From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Happy squid new year.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | January 10, 2014 at 05:27 PM
Interesting story:
...burglars took a lock pick and a crowbar and broke into a Federal Bureau of Investigation office in a suburb of Philadelphia, making off with...schneier From Schneier on Security | January 10, 2014 at 07:45 AM
Today's implant from the NSA's Tailored Access Operations (TAO) group implant catalog:
JETPLOW
(TS//SI//REL) JETPLOW is a firmware persistence implant for Cisco...schneier From Schneier on Security | January 9, 2014 at 02:02 PM
We're at a crisis point now with regard to the security of embedded systems, where computing is embedded into the hardware itself -- as with the Internet of Things...schneier From Schneier on Security | January 9, 2014 at 07:33 AM
Today's implant from the NSA's Tailored Access Operations (TAO) group implant catalog:
HALLUXWATER
(TS//SI//REL) The HALLUXWATER Persistence Back Door implant...schneier From Schneier on Security | January 8, 2014 at 02:48 PM
Paper from First Monday: "Transaction costs, privacy, and trust: The laudable goals and ultimate failure of notice and choice to respect privacy."
Abstract:...schneier From Schneier on Security | January 8, 2014 at 09:07 AM
Continuing our walk through the NSA's Tailored Access Operations (TAO) group implant catalog:
GOURMETTROUGH
(TS//SI//REL) GOURMETTROUGH is a user configurable...schneier From Schneier on Security | January 7, 2014 at 02:16 PM
Matt Blaze makes a point that I have been saying for a while now:
Don't get me wrong, as a security specialist, the NSA's Tailored Access Operations (TAO) scare...schneier From Schneier on Security | January 7, 2014 at 09:22 AM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
FEEDTROUGH
(TS//SI//REL) FEEDTROUGH is a persistence technique for two software...schneier From Schneier on Security | January 6, 2014 at 02:28 PM
For decades, I've said that good security is a combination of protection, detection, and response. In 1999, when I formed Counterpane Internet Security, I focused...schneier From Schneier on Security | January 6, 2014 at 07:18 AM
There are more source documents from the recent Spiegel story on the NSA than I realized. Here is what I think is the complete list:
"Tailored Access Operations...schneier From Schneier on Security | January 3, 2014 at 03:23 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog is IRONCHEF:
IRONCHEF
(TS//SI//REL) IRONCHEF provides access persistence to...schneier From Schneier on Security | January 3, 2014 at 01:20 PM
It has amazed me that the NSA doesn't seem to do any cost/benefit analyses on any of its surveillance programs. This seems particularly important for bulk surveillance...schneier From Schneier on Security | January 3, 2014 at 07:10 AM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog is DEITYBOUNCE:
DEITYBOUNCE
(TS//SI//REL) DEITYBOUNCE provides software application...schneier From Schneier on Security | January 2, 2014 at 04:25 PM
I don't know what to think about this:
Around 1:00 AM on April 16, at least one individual (possibly two) entered two different manholes at the PG&E Metcalf power...schneier From Schneier on Security | January 2, 2014 at 07:40 AM
Der Spiegel has a good article on the NSA's Tailored Access Operations unit: basically, its hackers. The article also has more details on how QUANTUM -- particularly...schneier From Schneier on Security | December 31, 2013 at 08:31 AM
Joseph Stiglitz has an excellent essay on the value of trust, and the lack of it in today's society.
Trust is what makes contracts, plans and everyday transactions...schneier From Schneier on Security | December 30, 2013 at 10:55 AM
Frozen squid makes him happy.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | December 27, 2013 at 05:14 PM
"Talking to Vula" is the story of a 1980s secret communications channel between black South African leaders and others living in exile in the UK. The system used...schneier From Schneier on Security | December 26, 2013 at 07:44 AM