From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This article points out that as people are logging into Wi-Fi networks from their Android phones, and backing up those passwords along with everything else into...schneier From Schneier on Security | September 20, 2013 at 08:05 AM
Excellent essay:
We have learned that in pursuit of its bureaucratic mission to obtain signals intelligence in a pervasively networked world, the NSA has mounted...schneier From Schneier on Security | September 18, 2013 at 08:06 AM
We recently learned that US intelligence agencies had at least three days' warning that Syrian President Bashar al-Assad was preparing to launch a chemical attack...schneier From Schneier on Security | September 17, 2013 at 07:15 AM
This is really interesting research: "Stealthy Dopant-Level Hardware Trojans." Basically, you can tamper with a logic gate to be either stuck-on or stuck-off by...schneier From Schneier on Security | September 16, 2013 at 02:25 PM
This was published during the battle about the Clipper Chip, and is remarkably prescient.schneier From Schneier on Security | September 16, 2013 at 01:59 PM
Leaks from the whistleblower Edward Snowden have catapulted the NSA into newspaper headlines and demonstrated that it has become one of the most powerful government...schneier From Schneier on Security | September 16, 2013 at 07:55 AM
Government and industry have betrayed the Internet, and us.
By subverting the Internet at every level to make it a vast, multi-layered and robust surveillanceWe...schneier From Schneier on Security | September 15, 2013 at 12:53 PM
Now that we have enough details about how the >NSA eavesdrops on the Internet, including today's disclosures of the NSA's deliberate weakening of cryptographicits...schneier From Schneier on Security | September 15, 2013 at 09:11 AM
Diamondback squid could be a source of food. No word on taste.
As usual, you can also use this squid post to talk about the security stories in the news that...schneier From Schneier on Security | September 13, 2013 at 05:07 PM
The Brazilian television show "Fantastico" has exposed an NSA training presentation that discusses how the agency runs man-in-the-middle attacks on the Internet...schneier From Schneier on Security | September 13, 2013 at 07:23 AM
I'm quoted (also here) as using this analogy to explain how IT companies will be damaged by the news that they've been collaborating with the NSA:
"How would it...schneier From Schneier on Security | September 12, 2013 at 02:34 PM
Ed Felten has an excellent essay on the damage caused by the NSA secretly breaking the security of Internet systems:
In security, the worst case -- the thing you...schneier From Schneier on Security | September 12, 2013 at 07:05 AM
This blog post is well worth reading, and not just because Johns Hopkins University asked him to remove it, and then backed down a few hours later. schneier From Schneier on Security | September 11, 2013 at 12:53 PM
When Apple bought AuthenTec for its biometrics technology -- reported as one of its most expensive purchases -- there was a lot of speculation about how the company...schneier From Schneier on Security | September 11, 2013 at 07:43 AM
The TSA does not have to tell the truth:
Can the TSA (or local governments as directed by the TSA) lie in response to a FOIA request?
Sure, no problem! Evenclassified...schneier From Schneier on Security | September 10, 2013 at 07:55 AM
Big-government secrets require a lot of secret-keepers. As of October 2012, almost 5m people in the US have security clearances, with 1.4m at the top-secret level...schneier From Schneier on Security | September 9, 2013 at 02:30 PM
People commented about a point I made in a recent essay:
In the months after 9/11, so many people chose to drive instead of fly that the resulting deaths dwarfed...schneier From Schneier on Security | September 9, 2013 at 07:20 AM
The incomplete specimen weighs over 160 lbs. And here's a map of squid spottings.
As usual, you can also use this squid post to talk about the security stories...schneier From Schneier on Security | September 6, 2013 at 05:50 PM