From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Yesterday, we learned that the NSA received all calling records from Verizon customers for a three-month period starting in April. That's everything except themetadata...schneier From Schneier on Security | June 10, 2013 at 11:12 AM
A squid comic about the importance of precise language in security warnings.
As usual, you can also use this squid post to talk about the security stories in the...schneier From Schneier on Security | June 7, 2013 at 09:35 PM
In this podcast interview, I talk about security, power, and the various things I have been thinking about recently.schneier From Schneier on Security | June 7, 2013 at 07:22 PM
Ars Technica gave three experts a 16,000-entry encrypted password file, and asked them to break them. The winner got 90% of them, the loser 62% -- in a few hours...schneier From Schneier on Security | June 7, 2013 at 11:41 AM
This study claims "terrorism has cost Pakistan around 33.02% of its real national income" between the years 1973 and 2008, or about 1% per year.
The St. Louis$100...schneier From Schneier on Security | June 6, 2013 at 10:58 AM
I'm at the Sixth Interdisciplinary Workshop on Security and Human Behavior (SHB 2013). This year we're in Los Angeles, at USC -- hosted by CREATE.
My description...schneier From Schneier on Security | June 5, 2013 at 12:20 PM
The FBI wants a new law that will make it easier to wiretap the Internet. Although its claim is that the new law will only maintain the status quo, it's reallyeverything...schneier From Schneier on Security | June 4, 2013 at 05:44 PM
Someday I need to write an essay on the security risks of secret algorithms that become part of our infrastructure. This paper gives one example of that. Could...schneier From Schneier on Security | June 4, 2013 at 11:19 AM
New paper from the Harvard Law Review by Daniel Solove: "Privacy Self-Management and the Consent Dilemma":
Privacy self-management takes refuge in consent. It...schneier From Schneier on Security | June 3, 2013 at 11:15 AM
The translated version of a Spanish menu contains the entry "squids in his (her, your) ink."
As usual, you can also use this squid post to talk about the security...schneier From Schneier on Security | May 31, 2013 at 09:39 PM
Interesting article on a greatly increased aspect of surveillance: "the ordinary citizen who by chance finds himself in a position to record events of great public...schneier From Schneier on Security | May 31, 2013 at 11:07 AM
This, by Judge Kozinski, is from a Federal court ruling about false statements and First Amendment protection
Saints may always tell the truth, but for mortals...schneier From Schneier on Security | May 30, 2013 at 11:31 AM
This article wonders if we are:
Yet for pretty much the first time there has been a considerable amount of media commentary seeking to put terrorism in context...schneier From Schneier on Security | May 29, 2013 at 04:22 PM
From his Facebook page:
An illustration of how the news are largely created, bloated and magnified by journalists. I have been in Lebanon for the past 24h, and...schneier From Schneier on Security | May 28, 2013 at 05:52 PM
Terrorism causes fear, and we overreact to that fear. Our brains aren't very good at probability and risk analysis. We tend to exaggerate spectacular, strange and...schneier From Schneier on Security | May 28, 2013 at 10:09 AM
How does he know this?
Chris Cosentino, the Bay Area’s "Offal Chef" at Incanto in San Francisco and PIGG at Umamicatessen in Los Angeles, opted for the most intimidating...schneier From Schneier on Security | May 24, 2013 at 09:54 PM
The research in G. Giguère and B.C. Love, "Limits in decision making arise from limits in memory retrieval," Proceedings of the National Academy of Sciences v.Abstract...schneier From Schneier on Security | May 24, 2013 at 05:17 PM
Interesting report from the From the Pew Internet and American Life Project:
Teens are sharing more information about themselves on their social media profiles...schneier From Schneier on Security | May 24, 2013 at 01:40 PM
This post by Aleatha Parker-Wood is very applicable to the things I wrote in Liars & Outliers:
A lot of fundamental social problems can be modeled as a disconnection...schneier From Schneier on Security | May 23, 2013 at 02:18 PM