From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Interesting essay on the impossibility of being entirely lawful all the time, the balance that results from the difficulty of law enforcement, and the societalwithout...schneier From Schneier on Security | July 16, 2013 at 01:35 PM
I haven't heard much about the Privacy and Civil Liberties Oversight Board. They recently held hearings regarding the Snowden documents.
This particular comment...schneier From Schneier on Security | July 16, 2013 at 08:11 AM
A political history of walls: Roman walls such as Hadrian's Wall, the Great Wall of China, the Berlin Wall, and the wall between Mexico and the U.S. Moral: they...schneier From Schneier on Security | July 15, 2013 at 08:03 AM
I have been awarded a fellowship at the Berkman Center for Internet and Society at Harvard University, for the 2013–2014 academic year. I'm excited about this;...schneier From Schneier on Security | July 13, 2013 at 07:30 PM
This is really interesting research.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | July 12, 2013 at 05:49 PM
This is a really interesting article about something I never even thought about before: how games ("F2P" means "free to play") trick players into paying for stuff...schneier From Schneier on Security | July 12, 2013 at 07:37 AM
We don't know what they mean, but there are a bunch of NSA code names on LinkedIn profiles.
ANCHORY, AMHS, NUCLEON, TRAFFICTHIEF, ARCMAP, SIGNAV, COASTLINE, DISHFIRE...schneier From Schneier on Security | July 11, 2013 at 07:36 AM
Nice history of Project SHAMROCK, the NSA's illegal domestic surveillance program from the 1970s. It targeted telegrams.schneier From Schneier on Security | July 10, 2013 at 02:19 PM
This is really interesting. It starts by talking about a "cant" dictionary of 16th-century thieves' argot, and ends up talking about secret languages in general...schneier From Schneier on Security | July 10, 2013 at 06:55 AM
This study concludes that there is a benefit to forcing companies to undergo privacy audits: "The results show that there are empirical regularities consistent...schneier From Schneier on Security | July 9, 2013 at 01:17 PM
A philosophical perspective:
But while Descartes's overall view has been rightly rejected, there is something profoundly right about the connection between privacy...schneier From Schneier on Security | July 9, 2013 at 07:24 AM
Evgeny Morozov makes a point about surveillance and big data: it just looks for useful correlations without worrying about causes, and leads people to implement...schneier From Schneier on Security | July 8, 2013 at 12:50 PM
In the wake of the Snowden NSA documents, reporters have been asking me whether encryption can solve the problem. Leaving aside the fact that much of what theadvice...schneier From Schneier on Security | July 8, 2013 at 07:43 AM
Giant origami squid photo found -- without explanation -- on Reddit.
As usual, you can also use this squid post to talk about the security stories in the news...schneier From Schneier on Security | July 5, 2013 at 05:01 PM
Interesting article:
Apple is famously focused on design and human experience as their top guiding principles. When it comes to security, that focus created a...schneier From Schneier on Security | July 5, 2013 at 02:33 PM
On April 1, I announced the Sixth Mostly-Annual Movie-Plot Threat Contest:
For this year's contest, I want a cyberwar movie-plot threat. (For those who don't know...schneier From Schneier on Security | July 5, 2013 at 01:08 PM
Responding to a tweet by Thomas Ptacek saying, "If you're not learning crypto by coding attacks, you might not actually be learning crypto," Colin Percival published...schneier From Schneier on Security | July 5, 2013 at 08:04 AM
Here's a transcript of a panel discussion about NSA surveillance. There's a lot worth reading here, but I want to quote Bob Litt's opening remarks. He's the General...schneier From Schneier on Security | July 4, 2013 at 08:07 AM
Interesting law journal article: "Privacy Protests: Surveillance Evasion and Fourth Amendment Suspicion," by Elizabeth E. Joh.
Abstract: The police tend to think...schneier From Schneier on Security | July 3, 2013 at 01:30 PM
The US Department of Defense is blocking sites that are reporting about the Snowden documents. I presume they're not censoring sites that are smearing him personally...schneier From Schneier on Security | July 3, 2013 at 07:02 AM