From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Neat.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | May 4, 2012 at 09:01 PM
This vendor is selling a tampon-shaped USB drive. Although it's less secure now that there are blog posts about it.schneier From Schneier on Security | May 4, 2012 at 06:31 PM
I suppose this sort of thing might be useful someday.
In Second Life, avatars are easily identified by their username, meaning police can just ask San Francisco...schneier From Schneier on Security | May 4, 2012 at 11:31 AM
I've often written about the base rate fallacy and how it makes tests for rare events -- like airplane terrorists -- useless because the false positives vastlyThis...schneier From Schneier on Security | May 3, 2012 at 11:22 AM
The reports are still early, but it seems that a bunch of terrorist planning documents were found embedded in a digital file of a porn movie.
Several weeks later...schneier From Schneier on Security | May 2, 2012 at 05:41 PM
Two very interesting points in this essay on cybercrime. The first is that cybercrime isn't as big a problem as conventional wisdom makes it out to be.
We have...schneier From Schneier on Security | May 2, 2012 at 12:10 PM
I've long advocated investigation, intelligence, and emergency response as the places where we can most usefully spend our counterterrorism dollars. Here's anthat...schneier From Schneier on Security | May 1, 2012 at 12:31 PM
Army General Martin E. Dempsey, the chairman of the Joint Chiefs of Staff, said:
A cyber attack could stop our society in its tracks.
Gadzooks. A scared populace...schneier From Schneier on Security | April 30, 2012 at 11:52 AM
Actionable Books is having a vote to determine which of four books to summarize on their site. If you are willing, please go there and vote for Liars and Outliers...schneier From Schneier on Security | April 28, 2012 at 12:57 AM
Great pictures.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | April 27, 2012 at 04:32 PM
At the RSA Conference this year, I noticed a trend of companies that have products and services designed to help victims recover from attacks. Kelly Jackson Higgins...schneier From Schneier on Security | April 27, 2012 at 11:53 AM
Last year, I wrote about how social media sites are making it harder than ever for undercover police officers. This story talks about how biometric passports are...schneier From Schneier on Security | April 26, 2012 at 11:57 AM
danah boyd is thinking about -- in a draft essay, and as a recording of a presentation -- fear and the attention economy. Basically, she is making the argument...schneier From Schneier on Security | April 25, 2012 at 11:51 AM
In Liars and Outliers, I use the metaphor of the Prisoner's Dilemma to exemplify the conflict between group interest and self-interest. There are a gazillion academic...schneier From Schneier on Security | April 24, 2012 at 04:44 PM
GCHQ, the UK government's communications headquarters, has released two new -- well, 70 years old, but new to us -- cryptanalysis documents by Alan Turing.
The...schneier From Schneier on Security | April 23, 2012 at 11:18 AM
How to extract squid ink.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | April 20, 2012 at 09:49 PM
Liars & Outliers has been available for about two months, and is selling well both in hardcover and e-book formats. More importantly, I'm very pleased with the...schneier From Schneier on Security | April 20, 2012 at 05:48 PM
Interesting data from the U.S. Government Accounting Office:
But congressional auditors have questions about other efficiencies as well, like having 3,000 "behavior...schneier From Schneier on Security | April 20, 2012 at 11:19 AM
A burglar was identified by his dance moves, captured on security cameras:
"The 16-year-old juvenile suspect is known for his 'swag,' or signature dance move,"...schneier From Schneier on Security | April 19, 2012 at 06:03 PM
Brian Krebs writes about smart meter hacks:
But it appears that some of these meters are smarter than others in their ability to deter hackers and block unauthorized...schneier From Schneier on Security | April 19, 2012 at 10:52 AM