From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A fine piece: "A Love Letter to the NSA Agent who is Monitoring my Online Activity."
A similar sentiment is expressed in this video.schneier From Schneier on Security | June 20, 2013 at 05:19 PM
Companies allow US intelligence to exploit vulnerabilities before it patches them:
Microsoft Corp. (MSFT), the world's largest software company, provides intelligence...schneier From Schneier on Security | June 20, 2013 at 11:04 AM
I have signed a petition calling on the NSA to "suspend its domestic surveillance program pending public comment." This is what's going on:
In a request today...schneier From Schneier on Security | June 19, 2013 at 07:18 PM
On his blog, Scott Adams suggests that it might be possible to identify sociopaths based on their interactions on social media.
My hypothesis is that scienceknow...schneier From Schneier on Security | June 19, 2013 at 04:19 PM
John Mueller and Mark Stewart ask the important questions about the NSA surveillance programs: why were they secret, what have they accomplished, and what do they...schneier From Schneier on Security | June 19, 2013 at 11:24 AM
Facebook (here), Apple (here), and Yahoo (here) have all released details of US government requests for data. They each say that they've turned over user datamuch...schneier From Schneier on Security | June 18, 2013 at 09:00 PM
In an excellent essay about privacy and secrecy, law professor Daniel Solove makes an important point. There are two types of NSA secrecy being discussed. It's...schneier From Schneier on Security | June 18, 2013 at 04:02 PM
Interesting speculation that the NSA is storing everyone's phone calls, and not just metadata. Definitely worth reading.
I expressed skepticism about this just...schneier From Schneier on Security | June 18, 2013 at 11:57 AM
This finally explains what John Ellis was talking about in "The Possibility of Non-Secret Encryption" when he dropped a tantalizing hint about wartime work at Bell...schneier From Schneier on Security | June 17, 2013 at 05:47 PM
There's one piece of blowback that isn't being discussed -- aside from the fact that Snowden killed the chances of a liberal arts major getting a job at the DoD...schneier From Schneier on Security | June 17, 2013 at 11:13 AM
It's a novel behavior.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | June 14, 2013 at 09:53 PM
On April 1, I announced the Sixth Annual Movie Plot Threat Contest:
I want a cyberwar movie-plot threat. (For those who don't know, a movie-plot threat is a scare...schneier From Schneier on Security | June 14, 2013 at 05:20 PM
This paper (full paper behind paywall) -- from Environment International (2009) -- does a good job of separating fact from fiction:
Abstract: In recent yearsThis...schneier From Schneier on Security | June 14, 2013 at 12:15 PM
Ray Wang makes an important point about trust and our data:
This is the paradox. The companies contending to win our trust to manage our digital identities all...schneier From Schneier on Security | June 13, 2013 at 09:06 PM
Facebook regularly abuses the privacy of its users. Google has stopped supporting its popular RSS feeder. Apple prohibits all iPhone apps that are political orGame...schneier From Schneier on Security | June 13, 2013 at 04:34 PM
Here's a quick list of some of my older writings that are related to the current NSA spying documents:
"The Internet Is a Surveillance State ," 2013.
The importance...schneier From Schneier on Security | June 13, 2013 at 11:09 AM
Edward Snowden broke the law by releasing classified information. This isn't under debate; it's something everyone with a security clearance knows. It's written...schneier From Schneier on Security | June 12, 2013 at 11:16 AM
Interesting.
Crazy as these theories are, those propagating them are not -- they’re quite normal, in fact. But recent scientific research tells us this much: if...schneier From Schneier on Security | June 11, 2013 at 05:30 PM
Ignore the sensationalist headline. This article is a good summary of the need for trust in IT, and provides some ideas for how to enable more of it.
Virtually...schneier From Schneier on Security | June 11, 2013 at 11:21 AM