From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
News articles about me (or with good quotes by me).
My talk at the IETF Vancouver meeting on NSA and surveillance. I'm the first speaker after the administrivia...schneier From Schneier on Security | November 15, 2013 at 03:34 PM
The US government sets up secure tents for the president and other officials to deal with classified material while traveling abroad.
Even when Obama travels to...schneier From Schneier on Security | November 15, 2013 at 07:28 AM
The public/private surveillance partnership between the NSA and corporate data collectors is starting to fray. The reason is sunlight. The publicity resulting from...schneier From Schneier on Security | November 14, 2013 at 07:21 AM
I think this is a good move on Microsoft's part:
Microsoft is recommending that customers and CA's stop using SHA-1 for cryptographic applications, including use...schneier From Schneier on Security | November 13, 2013 at 03:17 PM
Der Speigel is reporting that the GCHQ used QUANTUMINSERT to direct users to fake LinkedIn and Slashdot pages run by -- this code name is not in the article --reacted...schneier From Schneier on Security | November 13, 2013 at 07:46 AM
Adobe lost 150 million customer passwords. Even worse, they had a pretty dumb cryptographic hash system protecting those passwords. schneier From Schneier on Security | November 12, 2013 at 02:04 PM
This article argues that online gambling is a strategic national threat because terrorists could use it to launder money.
The Harper demonstration showed the technology...schneier From Schneier on Security | November 12, 2013 at 07:35 AM
This talk by Dan Geer explains the NSA mindset of "collect everything":
I previously worked for a data protection company. Our product was, and I believe still...schneier From Schneier on Security | November 11, 2013 at 07:21 AM
This tree in San Mateo, CA, has been turned into a giant blue squid.
As usual, you can also use this squid post to talk about the security stories in the news...schneier From Schneier on Security | November 8, 2013 at 05:10 PM
There's a story that Edward Snowden successfully socially engineered other NSA employees into giving him their passwords.schneier From Schneier on Security | November 8, 2013 at 02:06 PM
In the Information Age, it's easier than ever to steal and publish data. Corporations and governments have to adjust to their secrets being exposed, regularly.
...schneier From Schneier on Security | November 8, 2013 at 07:58 AM
I like this idea of giving each individual login attempt a risk score, based on the characteristics of the attempt:
The risk score estimates the risk associated...schneier From Schneier on Security | November 7, 2013 at 08:06 AM
The wings of the Goniurellia tridens fruit fly have images of an ant on them, to deceive predators: "When threatened, the fly flashes its wings to give the appearance...schneier From Schneier on Security | November 6, 2013 at 02:53 PM
This is interesting reading, but I'm left wanting more. What are the lessons here? How can we do this better next time? Clearly we won't be able to anticipate...schneier From Schneier on Security | November 5, 2013 at 07:53 AM
This New York Times story on the NSA is very good, and contains lots of little tidbits of new information gleaned from the Snowden documents.
The agency’s Dishfire...schneier From Schneier on Security | November 4, 2013 at 02:39 PM
Good story of badBIOS, a really nasty piece of malware. The weirdest part is how it uses ultrasonic sound to jump air gaps.
Ruiu said he arrived at the theory...schneier From Schneier on Security | November 4, 2013 at 07:15 AM
Make your own 8-foot giant squid pillow.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
schneier From Schneier on Security | November 1, 2013 at 05:40 PM
This is from 2006 -- I blogged it here -- but it's even more true today.
Under a top secret program initiated by the Bush Administration after the Sept. 11 attacks...schneier From Schneier on Security | November 1, 2013 at 03:26 PM
In Spring Semester, I'm running a reading group -- which seems to be a formal variant of a study group -- at Harvard Law School on "Security, Power, and the Internet...schneier From Schneier on Security | November 1, 2013 at 03:03 PM