From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Self-domestication happens when the benefits of cooperation outweigh the costs:
But why and how could natural selection tame the bonobo? One possible narrative...schneier From Schneier on Security | February 17, 2012 at 10:21 AM
From the abstract of the paper:
In this paper, we analyze the encryption systems used in the two existing (and competing) satphone standards, GMR-1 and GMR-2....schneier From Schneier on Security | February 16, 2012 at 06:22 PM
There's some excellent research (paper, news articles) surveying public keys in the wild. Basically, the researchers found that a small fraction of them (27,000...schneier From Schneier on Security | February 16, 2012 at 12:51 PM
Geotagged images of children:
Joanne Kuzma of the University of Worcester, England, has analyzed photos that clearly show children's faces on the photo sharing...schneier From Schneier on Security | February 15, 2012 at 07:11 PM
This writer wrestles with the costs and benefits of tighter controls on pseudoephedrine, a key chemical used to make methamphetamine:
Now, personally, I sincerely...schneier From Schneier on Security | February 15, 2012 at 01:09 PM
Adam Shostack explains to Verisign that trust requires transparency.
This is a lesson Path should have learned.schneier From Schneier on Security | February 14, 2012 at 01:12 PM
Liars and Outliers is available. Amazon and Barnes & Noble have ben shipping the book since the beginning of the month. Both the Kindle and the Nook versionsordered...schneier From Schneier on Security | February 13, 2012 at 08:53 PM
Last month, a U.S. court demanded that a defendent surrender the encryption key to a laptop so the police could examine it. Now it seems that she's forgotten the...schneier From Schneier on Security | February 13, 2012 at 11:20 AM
It's an acoustic bluegrass band.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | February 10, 2012 at 10:04 PM
Interesting paper: Paul J. Freitas (2012), "Passenger aviation security, risk management, and simple physics," Journal of Transportation Security.
Abstract: Since...schneier From Schneier on Security | February 9, 2012 at 12:10 PM
The error rate for hand-counted ballots is about two percent.
All voting systems have nonzero error rates. This doesn't surprise technologists, but does surprise...schneier From Schneier on Security | February 7, 2012 at 11:53 AM
In 2005, I wrote an essay called "The Failure of Two-Factor Authentication," where I predicted that attackers would get around multi-factor authentication systems...schneier From Schneier on Security | February 6, 2012 at 07:23 PM
It's called Squid.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | February 3, 2012 at 10:18 PM
Reuters discovered the information:
The VeriSign attacks were revealed in a quarterly U.S. Securities and Exchange Commission filing in October that followed new...schneier From Schneier on Security | February 3, 2012 at 04:49 PM
Really good article on the huge incarceration rate in the U.S., its causes, its effects, and its value:
Over all, there are now more people under "correctional...schneier From Schneier on Security | February 2, 2012 at 03:04 PM