From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Telepathwords is a pretty clever research project that tries to evaluate password strength. It's different from normal strength meters, and I think better.
Telepathwords...schneier From Schneier on Security | December 6, 2013 at 07:19 AM
Here's a new biometric I know nothing about:
The wristband relies on authenticating identity by matching the overall shape of the user's heartwave (captured via...schneier From Schneier on Security | December 5, 2013 at 02:16 PM
Some apps are being distributed with secret Bitcoin-mining software embedded in them. Coins found are sent back to the app owners, of course.
And to make it legal...schneier From Schneier on Security | December 5, 2013 at 07:58 AM
The news is reporting about Evan Booth, who builds weaponry out of items you can buy after airport security. It's clever stuff.
It's not new, though. Peopleexplained...schneier From Schneier on Security | December 4, 2013 at 07:28 AM
As more and more media outlets from all over the world continue to report on the Snowden documents, it's harder and harder to keep track of what has been released...schneier From Schneier on Security | December 3, 2013 at 07:14 AM
One of the things I do is expert witness work in patent litigations. Often, it's defending companies against patent trolls. One of the patents I have worked on...schneier From Schneier on Security | December 2, 2013 at 01:48 PM
Since we learned that the NSA has surreptitiously weakened Internet security so it could more easily eavesdrop, we've been wondering if it's done anything to antivirus...schneier From Schneier on Security | December 2, 2013 at 07:05 AM
This squid-like worm -- Teuthidodrilus samae -- is new to science.
As usual, you can also use this squid post to talk about the security stories in the news that...schneier From Schneier on Security | November 29, 2013 at 05:15 PM
Ralph Langer has written the definitive analysis of Stuxnet: short, popular version, and long, technical version.
Stuxnet is not really one weapon, but two. The...schneier From Schneier on Security | November 29, 2013 at 07:18 AM
Safeplug is an easy-to-use Tor appliance. I like that it can also act as a Tor exit node.schneier From Schneier on Security | November 27, 2013 at 07:28 AM
This is a long article about the FBI's Data Intercept Technology Unit (DITU), which is basically its own internal NSA.
It carries out its own signals intelligence...schneier From Schneier on Security | November 26, 2013 at 07:29 AM
Google recently announced that it would start including individual users' names and photos in some ads. This means that if you rate some product positively, your...schneier From Schneier on Security | November 25, 2013 at 07:53 AM
Neat photo. Video, too.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | November 22, 2013 at 05:53 PM
Renesys is reporting that Internet traffic is being manipulatively rerouted, presumably for eavesdropping purposes. The attacks exploit flaws in the Border Gateway...schneier From Schneier on Security | November 21, 2013 at 02:42 PM
Fokirtor is a Linux Trojan that exfiltrates traffic by inserting it into SSH connections. It looks very well-designed and -constructed.schneier From Schneier on Security | November 19, 2013 at 07:32 AM
Nicholas Weaver has a great essay explaining how the NSA's QUANTUM packet injection system works, what we know it does, what else it can possibly do, and how to...schneier From Schneier on Security | November 18, 2013 at 08:35 AM
Cool photo.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
schneier From Schneier on Security | November 15, 2013 at 05:05 PM