From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This is a really good paper describing the unique threat model of children in the home, and the sorts of security philosophies that are effective in dealing with...schneier From Schneier on Security | July 2, 2013 at 01:08 PM
More Snowden documents analyzed by the Guardian -- two articles -- discuss how the NSA collected e-mails and data on Internet activity of both Americans and foreigners...schneier From Schneier on Security | July 2, 2013 at 07:49 AM
Two weeks ago, the Guardian published two new Snowden documents. These outline how the NSA's data-collection procedures allow it to collect lots of data on Americans...schneier From Schneier on Security | July 1, 2013 at 01:16 PM
The NSA has published some new symmetric algorithms:
Abstract: In this paper we propose two families of block ciphers, SIMON and SPECK, each of which comes in...schneier From Schneier on Security | July 1, 2013 at 07:24 AM
Video story on Animal Planet.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
schneier From Schneier on Security | June 28, 2013 at 05:07 PM
Last week, I gave a talk at Google. It's another talk about power and security, my continually evolving topic-of-the-moment that could very well become my next...schneier From Schneier on Security | June 28, 2013 at 03:42 PM
Adding a remote kill switch to cell phones would deter theft.
Here we can see how the rise of the surveillance state permeates everything about computer security...schneier From Schneier on Security | June 28, 2013 at 02:37 PM
This is an interesting article about a new breed of malware that also hijack's the victim's phone text messaging system, to intercept one-time passwords sent via...schneier From Schneier on Security | June 28, 2013 at 06:31 AM
This quote is from the Spring 1997 issue of CRYPTOLOG, the internal NSA newsletter. The writer is William J. Black, Jr., the Director's Special Assistant for Information...schneier From Schneier on Security | June 27, 2013 at 12:49 PM
Nice essay:
The biological world is also open source in the sense that threats are always present, largely unpredictable, and always changing. Because of this,...schneier From Schneier on Security | June 27, 2013 at 07:34 AM
Interesting article on the history of, and the relationship between, secrecy and privacy
As a matter of historical analysis, the relationship between secrecy and...schneier From Schneier on Security | June 26, 2013 at 05:35 PM
Ron Beckstrom gives a talk (video and transcript) about "Mutually Assured Destruction," "Mutually Assured Disruption," and "Mutually Assured Dependence."
schneier From Schneier on Security | June 25, 2013 at 11:24 AM
Pretty scary -- and cool.
Remember, it's not any one thing that's worrisome; it's everything together.schneier From Schneier on Security | June 24, 2013 at 10:31 AM
It's not good.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
schneier From Schneier on Security | June 21, 2013 at 09:28 PM
Today, the United States is conducting offensive cyberwar actions around the world.
More than passively eavesdropping, we're penetrating and damaging foreign networks...schneier From Schneier on Security | June 21, 2013 at 04:43 PM