From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
SecureDrop is an open-source whistleblower support system, originally written by Aaron Swartz and now run by the Freedom of the Press Foundation. The first instance...schneier From Schneier on Security | October 17, 2013 at 08:15 AM
The new iPhone has a motion sensor chip, and that opens up new opportunities for surveillance:
The M7 coprocessors introduce functionality that some may instinctively...schneier From Schneier on Security | October 16, 2013 at 08:33 AM
A new Snowden document shows that the NSA is harvesting contact lists -- e-mail address books, IM buddy lists, etc. -- from Google, Yahoo, Microsoft, Facebook,...schneier From Schneier on Security | October 15, 2013 at 02:37 PM
It's hard not to poke fun at this press release for Safeslinger, a new cell phone security app from Carnegie Mellon.
"SafeSlinger provides you with the confidence...schneier From Schneier on Security | October 15, 2013 at 01:37 PM
New paper: "Physical-Layer Cryptography Through Massive MIMO."
Abstract: We propose the new technique of physical-layer cryptography based on using a massive MIMO...schneier From Schneier on Security | October 15, 2013 at 07:27 AM
New paper: "Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust, by Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien...schneier From Schneier on Security | October 14, 2013 at 02:06 PM
In one of the documents recently released by the NSA as a result of an EFF lawsuit, there's discussion of a specific capability of a call records database to identify...schneier From Schneier on Security | October 14, 2013 at 07:37 AM
A 30-foot-long giant squid has washed ashore in Cantabria, Spain. It died at sea, with a broken tentacle.
As usual, you can also use this squid post to talk about...schneier From Schneier on Security | October 11, 2013 at 05:09 PM
It's a Tumblr feed. Right now there are only six posts, all a year old. Presumably that will change soon. To clarify: I have nothing to do with the feed, and...schneier From Schneier on Security | October 11, 2013 at 03:53 PM
Azerbaijan achieves a new low in voter fraud. They government accidentally publishes the results of the election before the polls open.
The mistake came whenanother...schneier From Schneier on Security | October 11, 2013 at 01:33 PM
Since I started working with Snowden's documents, I have been using a number of tools to try to stay secure from the NSA. The advice I shared included using Tor...schneier From Schneier on Security | October 11, 2013 at 07:45 AM
There's a serious random-number generation flaw in the cryptographic systems used to protect the Taiwanese digital ID. Article and paper.schneier From Schneier on Security | October 10, 2013 at 07:03 AM
The idea is basically to use indirection to hide physical addresses. You would get a random number to give to your correspondents, and the post office would use...schneier From Schneier on Security | October 9, 2013 at 02:08 PM
As I recently reported in the Guardian, the NSA has secret servers on the Internet that hack into other computers, codename FOXACID. These servers provide an excellent...schneier From Schneier on Security | October 9, 2013 at 07:28 AM
This is a video of me talking about surveillance and privacy, both relating to the NSA and more generally.schneier From Schneier on Security | October 8, 2013 at 02:05 PM
The Guardian recently reported on how the NSA targets Tor users, along with details of how it uses centrally placed servers on the Internet to attack individual...schneier From Schneier on Security | October 8, 2013 at 07:44 AM
Details of how the FBI found the administrator of Silk Road, a popular black market e-commerce site.
Despite the elaborate technical underpinnings, however, the...schneier From Schneier on Security | October 7, 2013 at 02:35 PM
The online anonymity network Tor is a high-priority target for the National Security Agency. The work of attacking Tor is done by the NSA's application vulnerabilities...schneier From Schneier on Security | October 7, 2013 at 07:24 AM
Opens spring 2014.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | October 4, 2013 at 05:17 PM