From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Marissa A. Ramsier, Andrew J. Cunningham, Gillian L. Moritz, James J. Finneran, Cathy V. Williams, Perry S. Ong, Sharon L. Gursky-Doyen, and Nathaniel J. Dominy...schneier From Schneier on Security | February 20, 2012 at 12:30 PM
Beautiful sculpture.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | February 17, 2012 at 10:37 PM
Self-domestication happens when the benefits of cooperation outweigh the costs:
But why and how could natural selection tame the bonobo? One possible narrative...schneier From Schneier on Security | February 17, 2012 at 10:21 AM
From the abstract of the paper:
In this paper, we analyze the encryption systems used in the two existing (and competing) satphone standards, GMR-1 and GMR-2....schneier From Schneier on Security | February 16, 2012 at 06:22 PM
There's some excellent research (paper, news articles) surveying public keys in the wild. Basically, the researchers found that a small fraction of them (27,000...schneier From Schneier on Security | February 16, 2012 at 12:51 PM
Geotagged images of children:
Joanne Kuzma of the University of Worcester, England, has analyzed photos that clearly show children's faces on the photo sharing...schneier From Schneier on Security | February 15, 2012 at 07:11 PM
This writer wrestles with the costs and benefits of tighter controls on pseudoephedrine, a key chemical used to make methamphetamine:
Now, personally, I sincerely...schneier From Schneier on Security | February 15, 2012 at 01:09 PM
Adam Shostack explains to Verisign that trust requires transparency.
This is a lesson Path should have learned.schneier From Schneier on Security | February 14, 2012 at 01:12 PM
Liars and Outliers is available. Amazon and Barnes & Noble have ben shipping the book since the beginning of the month. Both the Kindle and the Nook versionsordered...schneier From Schneier on Security | February 13, 2012 at 08:53 PM
Last month, a U.S. court demanded that a defendent surrender the encryption key to a laptop so the police could examine it. Now it seems that she's forgotten the...schneier From Schneier on Security | February 13, 2012 at 11:20 AM
It's an acoustic bluegrass band.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | February 10, 2012 at 10:04 PM
Interesting paper: Paul J. Freitas (2012), "Passenger aviation security, risk management, and simple physics," Journal of Transportation Security.
Abstract: Since...schneier From Schneier on Security | February 9, 2012 at 12:10 PM
The error rate for hand-counted ballots is about two percent.
All voting systems have nonzero error rates. This doesn't surprise technologists, but does surprise...schneier From Schneier on Security | February 7, 2012 at 11:53 AM
In 2005, I wrote an essay called "The Failure of Two-Factor Authentication," where I predicted that attackers would get around multi-factor authentication systems...schneier From Schneier on Security | February 6, 2012 at 07:23 PM
It's called Squid.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | February 3, 2012 at 10:18 PM