From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This is cool technology from HP:
Each printer with the ePrint capability will be assigned its own e-mail address. If someone wants to print a document from an...schneier From Schneier on Security | June 18, 2010 at 06:37 PM
The Atlantic on stupid terrorists:
Nowhere is the gap between sinister stereotype and ridiculous reality more apparent than in Afghanistan, where it's fair toPortrait...schneier From Schneier on Security | June 18, 2010 at 10:49 AM
A nice dose of risk reality:
Last week, the American Academy of Pediatrics issued a statement calling for large-type warning labels on the foods that kids most...schneier From Schneier on Security | June 17, 2010 at 07:28 PM
Doesn't the DHS have anything else to do?
As someone who believes that our nation has a right to enforce its borders, I should have been gratified when the Immigrations...schneier From Schneier on Security | June 17, 2010 at 11:57 AM
In at least three U.S. states, it is illegal to film an active duty policeman:
The legal justification for arresting the "shooter" rests on existing wiretapping...schneier From Schneier on Security | June 16, 2010 at 06:36 PM
Interesting:
The capability, called "electrical network frequency analysis" (ENF), is now attracting interest from the FBI and is considered the exciting new frontier...schneier From Schneier on Security | June 16, 2010 at 12:00 PM
The number of different ways to read my essays, commentaries, and links has grown recently. Here's the rundown:
You can read my writings daily on my blog.
These...schneier From Schneier on Security | June 15, 2010 at 06:05 PM
On April 1, I announced the Fifth Annual Movie Plot Threat Contest:
Your task, ye Weavers of Tales, is to create a fable of fairytale suitable for instilling the...schneier From Schneier on Security | June 15, 2010 at 11:02 AM
From the Freakonomics blog:
At some point, the Club was mentioned. The professional thieves laughed and exchanged knowing glances. What we knew was that the Club...schneier From Schneier on Security | June 14, 2010 at 06:46 PM
There's a long article in Nature on the practice:
It remains unclear what the officers found anomalous about George's behaviour, and why he was detained. The TSA's...schneier From Schneier on Security | June 14, 2010 at 11:23 AM
This essay in The New York Times is refreshingly cogent:
You've seen it over and over. At a certain intersection in a certain town, there'll be an unfortunate...schneier From Schneier on Security | June 11, 2010 at 05:08 PM
Earlier this week, the Ninth Workshop on Economics and Information Security (WEIS 2010) was held at Harvard. As always, it was a great workshop with some veryliveblogged...schneier From Schneier on Security | June 10, 2010 at 05:56 PM
Any essay on hiring hackers quickly gets bogged down in definitions. What is a hacker, and how is he different from a cracker? I have my own definitions, but I'd...schneier From Schneier on Security | June 10, 2010 at 11:34 AM
This looks like a good research direction:
Is it possible that given a clean slate and likely millions of dollars, engineers could come up with the ultimate in...schneier From Schneier on Security | June 9, 2010 at 05:59 PM
Supposedly, the latest terrorist tactic is to place fake bombs -- suspicious looking bags, backpacks, boxes, and coolers -- in public places in an effort to paralyze...schneier From Schneier on Security | June 9, 2010 at 11:24 AM