From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Good essay by Seth Godin:
We pay the fear tax every time we spend time or money seeking reassurance. We pay it twice when the act of seeking that reassurance actually...schneier From Schneier on Security | August 18, 2010 at 08:48 PM
The Crypto 2010 Conference is going on right now at the University of California, Santa Barbara. Springer-Verlag publishes the proceedings, but they're available...schneier From Schneier on Security | August 17, 2010 at 05:29 PM
Still minor, but this kind of thing is only going to get worse:
The new research shows that other systems in the vehicle are similarly insecure. The tire pressure...schneier From Schneier on Security | August 17, 2010 at 11:42 AM
In seconds.
Garage doors with automatic openers have always seemed like a lot of security theater to me.
schneier From Schneier on Security | August 16, 2010 at 11:51 AM
It wasn't me:
A hardened computer hacker has been arrested on suspicion of writing a computer virus that systematically destroys all the files on victims' PCs...schneier From Schneier on Security | August 13, 2010 at 09:23 PM
Clever attack.
After researching how gift cards work, Zepeda purchased a magnetic card reader online, began stealing blank gift cards, on display for purchase,...schneier From Schneier on Security | August 13, 2010 at 12:36 PM
"Smudge Attacks on Smartphone Touch Screens":
Abstract: Touch screens are an increasingly common feature on personal computing devices, especially smartphones...schneier From Schneier on Security | August 12, 2010 at 11:48 AM
Facebook Privacy Settings: Who Cares?" by danah boyd and Eszter Hargittai.
Abstract: With over 500 million users, the decisions that Facebook makes about its...schneier From Schneier on Security | August 11, 2010 at 11:00 AM
Lately I've been reading about user security and privacy -- control, really -- on social networking sites. The issues are hard and the solutions harder, but I'm...schneier From Schneier on Security | August 10, 2010 at 11:51 AM
There's a new paper circulating that claims to prove that P ? NP. The paper has not been refereed, and I haven't seen any independent verifications or refutations...schneier From Schneier on Security | August 9, 2010 at 07:46 PM
Interesting:
According to Moffett, we might actually learn a thing or two from how ants wage war. For one, ant armies operate with precise organization despite...schneier From Schneier on Security | August 9, 2010 at 12:12 PM
Worked well in a test:
For the first time, the Northwestern researchers used the P300 testing in a mock terrorism scenario in which the subjects are planning,More...schneier From Schneier on Security | August 6, 2010 at 10:36 AM
Most people might not be aware of it, but there's a National Cryptologic Museum at Ft. Meade, at NSA Headquarters. It's hard to know its exact relationship with...schneier From Schneier on Security | August 5, 2010 at 11:36 AM
Now this is an interesting development:
In the wake of strong U.S. government statements condemning WikiLeaks' recent publishing of 77,000 Afghan War documents...schneier From Schneier on Security | August 4, 2010 at 12:52 PM
The United Arab Emirates -- Dubai, etc. -- is threatening to ban BlackBerrys because they can't eavesdrop on them.
At the heart of the battle is access to thecomplicated...schneier From Schneier on Security | August 3, 2010 at 04:08 PM
Location-based encryption -- a system by which only a recipient in a specific location can decrypt the message -- fails because location can be spoofed. Now asolved...schneier From Schneier on Security | August 3, 2010 at 11:25 AM
Seems there are a lot of them. They do it for marketing purposes. Really, they seem to do it because the code base they use does it automatically or just because...schneier From Schneier on Security | August 3, 2010 at 02:21 AM