From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
My big idea is a big question. Every cooperative system contains parasites. How do we ensure that society's parasites don't destroy society's systems?
It's all...schneier From Schneier on Security | March 2, 2012 at 04:11 PM
Great movie-plot threat:
Financial institutions depend on timing that is accurate to the microsecond on a global scale so that stock exchanges in, say, London...schneier From Schneier on Security | March 2, 2012 at 12:11 PM
The ACLU filed a FOIA request for a bunch of cables that Wikileaks had already released complete versions of. This is what happened:
The agency released redacted...schneier From Schneier on Security | March 1, 2012 at 07:32 PM
Good essay. Nothing I haven't said before, but it's good to hear it from someone with a widely different set of credentials than I have.schneier From Schneier on Security | February 29, 2012 at 01:11 PM
I was asked to talk about five books related to privacy.
You're best known as a security expert but our theme today is "trust". How would you describe the connection...schneier From Schneier on Security | February 27, 2012 at 06:30 PM
A U.S. Federal Court aruled that it is unconstitutional for the police to force someone to decrypt their laptop computer:
Thursdayschneier From Schneier on Security | February 27, 2012 at 11:49 AM
There's a new study that shows that squid are faster in the air than in the water.
Squid of many species have been seen to 'fly' using the same jet-propulsion...schneier From Schneier on Security | February 24, 2012 at 10:08 PM
The book is selling well. (Signed copies are still available on the website.) All the online stores have it, and most bookstores as well. It is available inavailable...schneier From Schneier on Security | February 24, 2012 at 09:18 PM
The new movie Safe House features the song "No Church in the Wild," by Kanye West, which includes this verse:
I live by you, desire
I stand by you, walk through...schneier From Schneier on Security | February 24, 2012 at 07:37 PM
Interesting:
When Kenneth G. Lieberthal, a China expert at the Brookings Institution, travels to that country, he follows a routine that seems straight from a...schneier From Schneier on Security | February 24, 2012 at 01:06 PM
We can now conclusively link Stuxnet to the centrifuge structure at the Natanz nuclear enrichment lab in Iran. Watch this new video presentation from Ralph Langner...schneier From Schneier on Security | February 23, 2012 at 06:29 PM
According to a report by Juniper, mobile malware is increasing dramatically.
In 2011, we saw unprecedented growth of mobile malware attacks with a 155 percentstory...schneier From Schneier on Security | February 23, 2012 at 12:27 PM
Research paper: "A birthday present every eleven wallets? The security of customer-chosen banking PINs," by Joseph Bonneau, Sören Preibusch, and Ross Anderson:...schneier From Schneier on Security | February 21, 2012 at 01:36 PM
Marissa A. Ramsier, Andrew J. Cunningham, Gillian L. Moritz, James J. Finneran, Cathy V. Williams, Perry S. Ong, Sharon L. Gursky-Doyen, and Nathaniel J. Dominy...schneier From Schneier on Security | February 20, 2012 at 12:30 PM
Beautiful sculpture.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | February 17, 2012 at 10:37 PM