From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
It looks great.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | March 16, 2012 at 09:57 PM
Jon Callas talks about BitCoin's security model, and how susceptible it would be to a Goldfinger-style attack (destroy everyone else's BitCoins).schneier From Schneier on Security | March 16, 2012 at 03:35 PM
The U.S. military has a non-lethal heat ray. No details on what "non-lethal" means in this context.schneier From Schneier on Security | March 16, 2012 at 12:09 PM
I have several stories in the news (and one podcast), mostly surrounding the talks I gave at the RSA Conference last month.schneier From Schneier on Security | March 15, 2012 at 07:35 PM
First, five new reviews of the book.
Second, four new AV interviews about the book.
Third, I take the Page 99 Test.schneier From Schneier on Security | March 15, 2012 at 11:16 AM
Good article by Thomas Rid on the hype surrounding cyberwar. It's well worth reading.
And in a more academic paper, published in the RUSI Journal, Thomas Ridgeneric...schneier From Schneier on Security | March 14, 2012 at 11:22 AM
Ths person didn't like it at all.
It'll go up on the book's webpage, along with all the positive reviews.schneier From Schneier on Security | March 13, 2012 at 07:01 PM
Interesting research on the security of passphrases. From a blog post on the work:
We found about 8,000 phrases using a 20,000 phrase dictionary. Using a very...schneier From Schneier on Security | March 13, 2012 at 04:50 PM
The Internet is buzzing about this video, showing a blogger walking through two different types of full-body scanners with metal objects. Basically, by placing...schneier From Schneier on Security | March 12, 2012 at 09:30 PM
This is cool:
The idea is simple. Psychologists have known for some years that it is almost impossible to speak when your words are replayed to you with a delay...schneier From Schneier on Security | March 12, 2012 at 11:35 AM
Yet another impressive Humboldt squid feat:
"We've seen them make really impressive dives up to a kilometre and a half deep, swimming straight through a zone where...schneier From Schneier on Security | March 9, 2012 at 10:01 PM
This essay uses the interesting metaphor of the man-in-the-middle attacker to describe cloud providers like Facebook and Google. Basically, they get in the middle...schneier From Schneier on Security | March 8, 2012 at 12:50 PM
The NSA has released its specification for a secure Android.
One of the interesting things it's requiring is that all data be tunneled through a secure VPN:
Inter...schneier From Schneier on Security | March 7, 2012 at 07:35 PM
Security is a tradeoff, a balancing act between attacker and defender. Unfortunately, that balance is never static. Changes in technology affect both sides. Society...schneier From Schneier on Security | March 7, 2012 at 12:14 PM
According to this document, received by EPIC under the Freedom of Information Act, the U.S. Department of Homeland Security is combing through the gazillions of...schneier From Schneier on Security | March 6, 2012 at 07:22 PM
Last week was the big RSA Conference in San Francisco: something like 20,000 people. From what I saw, these were the major themes on the show floor:
Companies...schneier From Schneier on Security | March 5, 2012 at 07:30 PM
Some squid can see aspects of light that are invisible to humans, including polarized light.
As usual, you can also use this squid post to talk about the security...schneier From Schneier on Security | March 2, 2012 at 10:41 PM