From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This is impressive, and scary:
Every computer connected to the web has an internet protocol (IP) address, but there is no simple way to map this to a physical...schneier From Schneier on Security | April 8, 2011 at 11:22 AM
Our brains are specially designed to deal with cheating in social exchanges. The evolutionary psychology explanation is that we evolved brain heuristics formodus...schneier From Schneier on Security | April 7, 2011 at 06:10 PM
It's been patented; no idea if it actually works.
...newly patented device can render an assailant helpless with a brief flash of high-intensity light. It works...schneier From Schneier on Security | April 7, 2011 at 11:29 AM
"Terror, Security, and Money: Balancing the Risks, Benefits, and Costs of Homeland Security," by John Mueller and Mark Stewart:
Abstract:The cumulative increase...schneier From Schneier on Security | April 6, 2011 at 11:03 AM
I have no idea why the Epsilon hack is getting so much press.
Yes, millions of names and e-mail addresses might have been stolen. Yes, other customer information...schneier From Schneier on Security | April 5, 2011 at 05:58 PM
Here's some very clever thinking from India's chief economic adviser. In order to reduce bribery, he proposes legalizing the giving of bribes:
Under the current...schneier From Schneier on Security | April 5, 2011 at 01:46 PM
Interesting post -- and discussion -- on Making Light about ebook fraud. Currently there are two types of fraud. The first is content farming, discussed in these...schneier From Schneier on Security | April 4, 2011 at 01:40 PM
It's hard to tell how serious this is.
Computer security experts who examined the code say the vulnerabilities are not highly dangerous on their own, because they...schneier From Schneier on Security | April 1, 2011 at 11:58 AM
This isn't good:
The hacker, whose March 15 attack was traced to an IP address in Iran, compromised a partner account at the respected certificate authority Comodo...schneier From Schneier on Security | March 31, 2011 at 12:00 PM
In this amusing story of a terrorist plotter using pencil-and-paper cryptography instead of actually secure cryptography, there's this great paragraph:
Despite...schneier From Schneier on Security | March 30, 2011 at 12:14 PM
New paper by Ross Anderson: "Can We Fix the Security Economics of Federated Authentication?":
There has been much academic discussion of federated authentication...schneier From Schneier on Security | March 29, 2011 at 11:43 AM
This is an interesting read:
It was a question that changed his life, and changed mine, and may have changed -- even saved -- all of ours by calling attention...schneier From Schneier on Security | March 25, 2011 at 05:22 PM
Interesting research: "One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users":
Abstract: Tor is a popular low-latency anonymity...schneier From Schneier on Security | March 25, 2011 at 09:34 AM
Interesting:
Abstract: Although Voice over IP (VoIP) is rapidly being adopted, its security implications are not yet fully understood. Since VoIP calls may traverse...schneier From Schneier on Security | March 24, 2011 at 05:46 PM
This is cool:
Tristan Lawry, doctoral candidate in electrical and computer engineering, has developed equipment which can transmit data at high rates through thick...schneier From Schneier on Security | March 24, 2011 at 12:37 PM