From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Back in 2007, I wrote an essay, "Portrait of the Modern Terrorist as an Idiot," where I said:
The JFK Airport plotters seem to have been egged on by an informant...schneier From Schneier on Security | September 6, 2010 at 12:24 PM
Interesting:
Who are these certificate authorities? At the beginning of Web history, there were only a handful of companies, like Verisign, Equifax, and Thawte...schneier From Schneier on Security | September 3, 2010 at 11:27 AM
Clever:
Quantum cryptography is often touted as being perfectly secure. It is based on the principle that you cannot make measurements of a quantum system without...schneier From Schneier on Security | September 2, 2010 at 06:46 PM
This is beyond stupid:
The Pentagon is contemplating an aggressive approach to defending its computer systems that includes preemptive actions such as knocking...schneier From Schneier on Security | September 2, 2010 at 12:33 PM
As part of NIST's SHA-3 selection process, people have been implementing the candidate hash functions on a variety of hardware and software platforms. Our team...schneier From Schneier on Security | September 1, 2010 at 06:17 PM
Skein is my new hash function. Well, "my" is an overstatement; I'm one of the eight designers. It was submitted to NIST for their SHA-3 competition, and oneselected...schneier From Schneier on Security | September 1, 2010 at 11:01 AM
"Protecting your daily in-home activity information from a wireless snooping attack," by Vijay Srinivasan, John Stankovic, and Kamin Whitehouse:
Abstract: In...schneier From Schneier on Security | August 31, 2010 at 05:39 PM
In Australia:
A high school teacher who assigned her class to plan a terrorist attack that would kill as many innocent people as possible had no intent to promote...schneier From Schneier on Security | August 31, 2010 at 11:42 AM
Chilling:
How do most wrongful convictions come about?
The primary cause is mistaken identification. Actually, I wouldn't call it mistaken identification; I'd...schneier From Schneier on Security | August 30, 2010 at 05:05 PM
Since a fatal crash a few years ago, Boston T (their subway) operators have been forbidden from using -- or even having -- cell phones while on the job. Passengers...schneier From Schneier on Security | August 30, 2010 at 10:31 AM
Back in May, I attended the EastWest Institute's First Worldwide Cybersecurity Summit in Dallas. I only had eight minutes to speak, and tried to turn the dialog...schneier From Schneier on Security | August 27, 2010 at 05:47 PM
Full-body scanners in roving vans:
American Science & Engineering, a company based in Billerica, Massachusetts, has sold U.S. and foreign government agencies more...schneier From Schneier on Security | August 27, 2010 at 12:58 PM
Research paper: Detecting Deceptive Discussions in Conference Calls, by David F. Larcker and Anastasia A. Zakolyukina.
Abstract: We estimate classification models...schneier From Schneier on Security | August 26, 2010 at 11:15 AM
From danah boyd:
Carmen is engaging in social steganography. She's hiding information in plain sight, creating a message that can be read in one way by those who...schneier From Schneier on Security | August 25, 2010 at 11:20 AM
And you thought fingerprints were intrusive.
The Wright State Research Institute is developing a ground-breaking system that would scan the skeletal structures...schneier From Schneier on Security | August 24, 2010 at 11:56 AM
This is a first, I think:
The airline's central computer which registered technical problems on planes was infected by Trojans at the time of the fatal crash and...schneier From Schneier on Security | August 23, 2010 at 11:03 AM
Who knew?
"Hulse was shooting with burst mode on his camera, so I know exactly what the interval is between the frames and I can calculate velocity of squid flying...schneier From Schneier on Security | August 20, 2010 at 09:02 PM
Intel McAfee.
It's another example of a large non-security company buying a security company. I've been talking about this sort of thing for two and a half years...schneier From Schneier on Security | August 19, 2010 at 04:26 PM