From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
What's interesting is that this matchstick-sized microphone can be attached to drones.
Conventional microphones work when sound waves make a diaphragm move, creating...schneier From Schneier on Security | October 4, 2013 at 07:59 AM
A National Academy of Sciences panel says no:
Sticking to the quality control aspect of the report, professionalization, it says, has the potential to attractreport...schneier From Schneier on Security | October 3, 2013 at 01:55 PM
Gabriella Coleman has published an interesting analysis of the hacker group Anonymous:
Abstract: Since 2010, digital direct action, including leaks, hacking and...schneier From Schneier on Security | October 3, 2013 at 07:43 AM
"When everything is classified, then nothing is classified."
I should suppose that moral, political, and practical considerations would dictate that a very first...schneier From Schneier on Security | October 2, 2013 at 02:28 PM
Two new stories based on the Snowden documents.
This is getting silly. General Alexander just lied about this to Congress last week. The old NSA tactic of hiding...schneier From Schneier on Security | October 1, 2013 at 02:08 PM
Last year, NIST selected Keccak as the winner of the SHA-3 hash function competition. Yes, I would have rather my own Skein had won, but it was a good choice.
...schneier From Schneier on Security | October 1, 2013 at 11:50 AM
ICANN has a draft study that looks at abuse of the Whois database.
This study, conducted by the National Physical Laboratory (NPL) in the United Kingdom, analyzes...schneier From Schneier on Security | October 1, 2013 at 10:09 AM
We know from the Snowden documents (and other sources) that the NSA taps Internet backbone through secret-agreements with major U.S. telcos., but the U.S. government...schneier From Schneier on Security | September 28, 2013 at 07:10 AM
The Grimalditeuthis bonplandi is the only known squid to use its tenticles to fish:
Its tentacles are thin and fragile, and almost always break off when it's captured...schneier From Schneier on Security | September 27, 2013 at 05:53 PM
Neat project. The reason it works is that the Android system doesn't start putting in very long delays between PIN attempts after a whole bunch of unsuccessful...schneier From Schneier on Security | September 27, 2013 at 07:21 AM
Interesting paper: "Three Paradoxes of Big Data," by Neil M. Richards and Jonathan H. King, Stanford Law Review Online, 2013.
Abstract: Big data is all the rage...schneier From Schneier on Security | September 26, 2013 at 07:58 AM
Kim Zetter has written the definitive story -- at least so far -- of the possible backdoor in the Dual_EC_DRBG random number generator that's part of the NIST SP800...schneier From Schneier on Security | September 25, 2013 at 08:17 AM
Nice hack from the Chaos Computer Club:
The method follows the steps outlined in this how-to with materials that can be found in almost every household: First,...schneier From Schneier on Security | September 24, 2013 at 10:20 AM
The NSA is looking for a Civil Liberties & Privacy Officer. It appears to be an internal posting.
The NSA Civil Liberties & Privacy Officer (CLPO) is conceived...schneier From Schneier on Security | September 23, 2013 at 02:14 PM
Back in June, when the contents of Edward Snowden's cache of NSA documents were just starting to be revealed and we learned about the NSA collecting phone metadata...schneier From Schneier on Security | September 23, 2013 at 07:21 AM
Fascinating:
The bacterium Vibrio fischeri is a squid terraformer. Although it can live independently in seawater, it also colonises the body of the adorable Hawaiian...schneier From Schneier on Security | September 20, 2013 at 05:25 PM
Kit Walsh has an interesting blog post where he looks at how existing law can be used to justify the surveillance of Americans.
Just to challenge ourselves, we'll...schneier From Schneier on Security | September 20, 2013 at 01:01 PM