From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Research paper from Mark Stewart and John Mueller:
The Transportation Security Administration (TSA) has been deploying Advanced Imaging Technologies (AIT) that...schneier From Schneier on Security | January 20, 2011 at 07:39 PM
This week, the U.S. Supreme Court will hear arguments about whether or not corporations have the same rights to "personal privacy" that individuals do.
Thisbrief...schneier From Schneier on Security | January 20, 2011 at 12:44 PM
He's not in it for the money:
Mr. Landis...has been one of the most prolific forgers American museums have encountered in years, writing, calling and presenting...schneier From Schneier on Security | January 19, 2011 at 01:02 PM
This would make a great movie:
Rep. Dan Burton, R-Ind., renewed his call for the installation of an impenetrable, see-through security shield around the viewing...schneier From Schneier on Security | January 18, 2011 at 12:29 PM
This long New York Times article includes some interesting revelations. The article claims that Stuxnet was a joint Israeli-American project, and that its effectiveness...schneier From Schneier on Security | January 17, 2011 at 06:31 PM
I wrote a lot last year about the assassination of Mahmoud al-Mabhouh in Dubai. There's a new article by an Israeli investigative journalist that tells the story...schneier From Schneier on Security | January 17, 2011 at 11:47 AM
Last week, I spoke at an airport security conference hosted by EPIC: The Stripping of Freedom: A Careful Scan of TSA Security Procedures. Here's the video of my...schneier From Schneier on Security | January 14, 2011 at 08:11 PM
I'm not really worried about mistakes like this. Sure, a gun slips through occasionally, and a knife slips through even more often. (I'm sure the TSA doesn't catch...schneier From Schneier on Security | January 14, 2011 at 05:03 PM
Interesting reading, mostly for the probable effects of a terrorist-sized nuclear bomb.
A terrorist bomb is likely to be relatively small -- possibly only a fraction...schneier From Schneier on Security | January 14, 2011 at 01:07 PM
Johannesburg installed hundreds of networked traffic lights on its streets. The lights use a cellular modem and a SIM card to communicate.
Those lights introduced...schneier From Schneier on Security | January 13, 2011 at 06:54 PM
Here's a U.S. Army threat assessment of forged law-enforcement credentials.
The authors bought a bunch of fake badges:
Between November 2009 and March 2010, undercover...schneier From Schneier on Security | January 13, 2011 at 02:00 PM
Turns out you can make money by manipulating the network latency.
cPacket has developed a proof of concept showing that these side-channel attacks can be usedthis...schneier From Schneier on Security | January 12, 2011 at 12:59 PM
This will be nothing new to readers of this blog, but it's nice to read other people saying it too.
schneier From Schneier on Security | January 11, 2011 at 01:47 PM
Interesting:
So the train of logic is:
anything that can be called an "assassination" is inherently political;
very often the "politics" are obscure, personal...schneier From Schneier on Security | January 10, 2011 at 01:04 PM
It's an oil field:
Brazil's state-run Petrobras confirmed Wednesday that oil fields recently discovered offshore contained 8.3 billion barrels of recoverable crude...schneier From Schneier on Security | January 7, 2011 at 10:08 PM
Good essay:
Nineteenth-century anarchists promoted what they called the "propaganda of the deed," that is, the use of violence as a symbolic action to make a larger...schneier From Schneier on Security | January 7, 2011 at 12:30 PM
Sony used an ECDSA signature scheme to protect the PS3. Trouble is, they didn't pay sufficient attention to their random number generator.
schneier From Schneier on Security | January 6, 2011 at 11:52 AM
It's easy and cheap:
Speaking at the Chaos Computer Club (CCC) Congress in Berlin on Tuesday, a pair of researchers demonstrated a start-to-finish means of eavesdropping...schneier From Schneier on Security | January 5, 2011 at 12:20 PM