From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Good article on the current battle for Internet governance:
The War for the Internet was inevitable -- a time bomb built into its creation. The war grows out of...schneier From Schneier on Security | April 4, 2012 at 05:34 PM
Symantec deliberately "lost" a bunch of smart phones with tracking software on them, just to see what would happen:
Some 43 percent of finders clicked on an app...schneier From Schneier on Security | April 4, 2012 at 11:07 AM
Turns out the password can be easily bypassed:
XRY works by first jailbreaking the handset. According to Micro Systemation, no schneier From Schneier on Security | April 3, 2012 at 07:01 PM
Paul Ceglia's lawsuit against Facebook is fascinating, but that's not the point of this blog post. As part of the case, there are allegations that documents and...schneier From Schneier on Security | April 3, 2012 at 11:53 AM
This article talks about legitimate companies buying zero-day exploits, including the fact that "an undisclosed U.S. government contractor recently paid $250,000...schneier From Schneier on Security | April 2, 2012 at 12:56 PM
Interesting research:
The squid use two closely spaced organs called statocysts to sense sound.
"I think of a statocyst as an inside-out tennis ball," explains...schneier From Schneier on Security | March 30, 2012 at 09:28 PM
Normally I just delete these as spam, but this summer program for graduate students 1) looks interesting, and 2) has some scholarship money available. schneier From Schneier on Security | March 29, 2012 at 07:07 PM
As I posted previously, I have been debating former TSA Administrator Kip Hawley on the Economist website. I didn't bother reposting my opening statement and rebuttal...schneier From Schneier on Security | March 29, 2012 at 11:53 AM
Last weekend was the 2012 SHARCS (Special-Purpose Hardware for Attacking Cryptographic Systems) conference. The presentations are online.schneier From Schneier on Security | March 28, 2012 at 11:05 AM
"Empirical Analysis of Data Breach Litigation," Sasha Romanosky, David Hoffman, and Alessandro Acquisti:
Abstract: In recent years, a large number of data breaches...schneier From Schneier on Security | March 27, 2012 at 12:24 PM
I was supposed to testify today about the TSA in front of the House Committee on Oversight and Government Reform. I was informally invited a couple of weeks ago...schneier From Schneier on Security | March 26, 2012 at 06:02 PM
This is a neat story:
A pair of rare Enigma machines used in the Spanish Civil War have been given to the head of GCHQ, Britain's communications intelligence agency...schneier From Schneier on Security | March 26, 2012 at 11:38 AM
On The Economist website, I am currently debating Kip Hawley on airplane security. On Tuesday we posted our initial statements, and today (London time) we posted...schneier From Schneier on Security | March 23, 2012 at 11:33 AM
In an excellent article in Wired, James Bamford talks about the NSA's codebreaking capability.
According to another top official also involved with the program...schneier From Schneier on Security | March 22, 2012 at 12:17 PM
A way to securely erase paper:
"The key idea was to find a laser energy level that is high enough to ablate - or vaporise - the toner that at the same time isNew...schneier From Schneier on Security | March 21, 2012 at 11:26 AM
A otherwise uninteresting article on Internet threats to public infrastructure contains this paragraph:
At a closed-door briefing, the senators were shown howtake...schneier From Schneier on Security | March 20, 2012 at 01:52 PM
Avi Rubin has a TEDx talk on hacking various computer devices: medical devices, automobiles, police radios, smart phones, etc.schneier From Schneier on Security | March 19, 2012 at 07:33 PM
I like the quote at the end of this excerpt:
Aviation officials have questioned the need for such a strong permanent police presence at airports, suggesting they...schneier From Schneier on Security | March 19, 2012 at 11:38 AM