From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Fascinating.
How long before someone claims he can use this technology to detect nervous people in airports?schneier From Schneier on Security | August 23, 2012 at 11:43 AM
Good list, summarized here:
1. Probability neglect – people sometimes don’t consider the probability of the occurrence of an outcome, but focus on the consequences...schneier From Schneier on Security | August 22, 2012 at 05:34 PM
Gallup has the results:
Despite recent negative press, a majority of Americans, 54%, think the U.S. Transportation Security Administration is doing either an excellent...schneier From Schneier on Security | August 22, 2012 at 11:09 AM
Simson Garfinkel writes that the iPhone has such good security that the police can't use it for forensics anymore:
Technologies the company has adopted protect...schneier From Schneier on Security | August 21, 2012 at 06:42 PM
A new technology uses the radiation given off by wi-fi devices to sense the positions of people through a one-foot-thick brick wall.schneier From Schneier on Security | August 20, 2012 at 03:39 PM
This is an extraordinary (and gut-wrenching) first-person account of what it's like to staff an Israeli security checkpoint. It shows how power corrupts: how it's...schneier From Schneier on Security | August 20, 2012 at 11:36 AM
Japanese researchers are attempting to film the elusive giant squid.
As usual, you can also use this squid post to talk about the security stories in the news...schneier From Schneier on Security | August 17, 2012 at 09:16 PM
This is pretty funny:
Moving red laser beams scare away potential intruders
Laser beams move along floor and wall 180 degrees
Easy to install, 110v comes on automatically...schneier From Schneier on Security | August 17, 2012 at 11:39 AM
In the short story "A Wayside Comedy," published in 1888 in Under the Deodars, Kipling wrote:
You must remember, though you will not understand, that all lawsmy...schneier From Schneier on Security | August 16, 2012 at 06:52 PM
This is an analysis of Apple's disk encryption program, FileVault 2, that first appeared in the Lion operating system. Short summary: they couldn't break it....schneier From Schneier on Security | August 16, 2012 at 11:49 AM
Good post, not because it picks on Tesco but because it's filled with good advice on how not to do it wrong.schneier From Schneier on Security | August 15, 2012 at 07:23 PM
Excellent blog post by Valerie Aurora about sexual harassment at the DefCon hackers conference. Aside from the fact that this is utterly reprehensible behavior...schneier From Schneier on Security | August 15, 2012 at 01:57 PM
Liars and Outliers has been out since late February, and while it's selling great, I'd like it to sell better. So I have a special offer for my regular readers...schneier From Schneier on Security | August 15, 2012 at 10:59 AM
In Liars and Outliers, I talk a lot about social norms and when people follow them. This research uses survival data from shipwrecks to measure it.
The authors...schneier From Schneier on Security | August 14, 2012 at 06:16 PM
I'm late writing about this one. Cryptocat is a web-based encrypted chat application. After Wired published a pretty fluffy profile on the program and its author...schneier From Schneier on Security | August 14, 2012 at 11:00 AM
This is kind of a rambling essay on the need to spend more on infrastructure, but I was struck by this paragraph:
Here's a news flash: There are some events that...schneier From Schneier on Security | August 13, 2012 at 05:41 PM
Stuart Baker calls them "proxy talks" because they're not government to government, but it's a start.schneier From Schneier on Security | August 13, 2012 at 11:57 AM
The sex life of the dumpling squid.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | August 10, 2012 at 09:02 PM