From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Interesting This American Life show on loopholes. The first part is about getting around the Church's ban against suicide. The second part is about an interesting...schneier From Schneier on Security | November 2, 2012 at 11:37 AM
Really nice profile in the New York Times. It includes a discussion of the Clean Slate program:
Run by Dr. Howard Shrobe, an M.I.T. computer scientist who is...schneier From Schneier on Security | November 1, 2012 at 11:34 AM
There's a lot of hype and hyperbole in this story, but here's the interesting bit:
According to Ronald Kessler, the author of the 2009 book In the President’s,...schneier From Schneier on Security | October 29, 2012 at 06:53 PM
I have a hard time getting worked up about this story:
I have X'd out any information that you could use to change my reservation. But it's all there, PNR, seat...schneier From Schneier on Security | October 26, 2012 at 11:46 AM
I'm not sure what to think about this story:
Six Italian scientists and an ex-government official have been sentenced to six years in prison over the 2009 deadly...schneier From Schneier on Security | October 25, 2012 at 11:27 AM
Peter Swire and Yianni Lagos have pre-published a law journal article on the risks of data portability. It specifically addresses an EU data protection regulation...schneier From Schneier on Security | October 24, 2012 at 06:27 PM
noPhoto reacts to a camera flash, and then jams the image with a bright light.
The website makes the point that this is legal, but that can't last.schneier From Schneier on Security | October 22, 2012 at 12:18 PM
This was once a real insurance product. Squid Insurance Marketing was the low-end offering at Astonish, complete with the tagline "Nothing Kills a Squid!"
As...schneier From Schneier on Security | October 19, 2012 at 09:54 PM
A lot of the debate around President Obama's cubsersecurity initiative center on how much of a burden it would be on industry, and how that should be financed.originally...schneier From Schneier on Security | October 19, 2012 at 12:45 PM
"Quantitative Analysis of the Full Bitcoin Transaction Graph," by Dorit Ron and Adi Shamir:
Abstract. The Bitcoin scheme is a rare example of a large scale global...schneier From Schneier on Security | October 18, 2012 at 11:11 AM
New report from the Presidential Commission for the Study of Biothethical Issues.
It's called "Privacy and Progress in Whole Genome Sequencing." The Commission...schneier From Schneier on Security | October 17, 2012 at 11:23 AM
Interesting paper: "Before We Knew It: An Empirical Study of Zero-Day Attacks In The Real World," by Leyla Bilge and Tudor Dumitras:
Abstract: Little is known...schneier From Schneier on Security | October 16, 2012 at 11:12 AM