From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Symbiotic relationship between the Hawaiian bobtail squid and bioluminescent bacteria, with bonus security implications.
schneier From Schneier on Security | July 16, 2010 at 09:34 PM
Someone claims to have reverse-engineered Skype's proprietary encryption protocols, and has published pieces of it.
If the crypto is good, this is less of a big...schneier From Schneier on Security | July 16, 2010 at 05:08 PM
In what creepy back room do they come up with these names?
The federal government is launching an expansive program dubbed "Perfect Citizen" to detect cyber assaults...schneier From Schneier on Security | July 16, 2010 at 10:19 AM
This is interesting:
Some of the scenarios where we have installed video analytics for our clients include:
to detect someone walking in an area of their yard...schneier From Schneier on Security | July 14, 2010 at 05:54 PM
It's easy to access someone else's voicemail by spoofing the caller ID. This isn't new; what is new is that many people now have easy access to caller ID spoofing...schneier From Schneier on Security | July 14, 2010 at 11:51 AM
From 1955, intended as humor:
In the future when I should ever call on the telephone to make a request or issue an order I will identify myself as follows: This...schneier From Schneier on Security | July 13, 2010 at 05:42 PM
The Chaocipher is a mechanical encryption algorithm invented in 1918. No one was able to reverse-engineer the algorithm, given sets of plaintexts and ciphertexts...schneier From Schneier on Security | July 13, 2010 at 12:21 PM
Try to keep up:
Leslie Van Houten, a one-time member of Charles Manson's infamous 'family' is up for parole for the 17th time today....
"These are serial killers...schneier From Schneier on Security | July 12, 2010 at 05:54 PM
Last month, Sen. Joe Lieberman, I-Conn., introduced a bill that might -- we're not really sure -- give the president the authority to shut down all or portionsproposed...schneier From Schneier on Security | July 12, 2010 at 12:07 PM
Riddles of squid sex:
All cephalopods are hindered by their body shape, which comprises a closed hood-type structure called a mantle, which forms most of what...schneier From Schneier on Security | July 9, 2010 at 09:02 PM
The measures used to prevent cheating during tests remind me of casino security measures:
No gum is allowed during an exam: chewing could disguise a studentschneier From Schneier on Security | July 9, 2010 at 11:34 AM
Long and interesting article from The Toronto Star on the Toronto 18, a terrorist cell arrested in 2006. Lots of stuff in this article I had not read before....schneier From Schneier on Security | July 8, 2010 at 05:17 PM
"Does Surveillance Make Us Morally Better?":
Conclusion
The upshot of these reflections is that the relation between surveillance and moral edification is complicated...schneier From Schneier on Security | July 8, 2010 at 12:07 PM
There's a power struggle going on in the U.S. government right now.
It's about who is in charge of cyber security, and how much control the government will exert...schneier From Schneier on Security | July 7, 2010 at 05:58 PM
This sign is from a gas station in the U.K.
My first reaction was to laugh, but then I started thinking about it. We know that signs like "No Shoplifting"...schneier From Schneier on Security | July 7, 2010 at 02:20 PM
From the National Academies in 2009: Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. It's 390 pages.
schneier From Schneier on Security | July 6, 2010 at 11:00 AM
Interesting:
...water molecules differ slightly in their isotope ratios depending on the minerals at their source. ...researchers found that water samples from...schneier From Schneier on Security | July 5, 2010 at 03:00 PM