From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Interesting research:
Psychologist Jeremy Ginges and his colleagues identified this backfire effect in studies of the Israeli-Palestinian conflict in 2007. They...schneier From Schneier on Security | March 19, 2010 at 11:58 AM
Who didn't see this coming?
More than 100 drivers in Austin, Texas found their cars disabled or the horns honking out of control, after an intruder ran amok in...schneier From Schneier on Security | March 18, 2010 at 10:26 AM
Interesting research:
Analysing our data for security, though, shows that essentially all human-generated names provide poor resistance to guessing. For an attacker...schneier From Schneier on Security | March 16, 2010 at 11:44 AM
Here's a promotional security product designed by someone who knows nothing about security. The USB drive is "protected" by a combination lock. There are only...schneier From Schneier on Security | March 15, 2010 at 06:59 PM
"Measuring the Perpetrators and Funders of Typosquatting," by Tyler Moore and Benjamin Edelman:
Abstract. We describe a method for identifying "typosquatting",...schneier From Schneier on Security | March 15, 2010 at 09:33 AM
A hollowed-out U.S. nickel can hold a microSD card. Pound and euro coins are also available. I blogged about this about a year ago as well.
schneier From Schneier on Security | March 12, 2010 at 12:58 PM
It's good to dream:
IARPA's five-year plan aims to design experiments that can measure trust with high certainty -- a tricky proposition for a psychological study...schneier From Schneier on Security | March 11, 2010 at 12:17 PM
Really:
Since they are hard to conceal, the study says, noses would work well for identification in covert surveillance.
The researchers say noses have been overlooked...schneier From Schneier on Security | March 10, 2010 at 07:47 PM
Good legal paper on the limits of identity cards: Stephen Mason and Nick Bohm, "Identity and its Verification," in Computer Law & Security Review, Volume 26, Number...schneier From Schneier on Security | March 10, 2010 at 01:09 PM
Interesting commentary:
I don't think this is really a case about ISP liability at all. It is a case about the use of a person's image, without their consent,...schneier From Schneier on Security | March 9, 2010 at 06:36 PM
The "Microsoft Online Services Global Criminal Compliance Handbook (U.S. Domestic Version)" (also can be found here, here, and here) outlines exactly what Microsoft...schneier From Schneier on Security | March 9, 2010 at 12:59 PM
How not to destroy evidence:
In a bold and bizarre attempt to destroy evidence seized during a federal raid, a New York City man grabbed a flash drive and swallowed...schneier From Schneier on Security | March 8, 2010 at 05:00 PM
Interesting paper: "A Practical Attack to De-Anonymize Social Network Users."
Abstract. Social networking sites such as Facebook, LinkedIn, and Xing have been...schneier From Schneier on Security | March 8, 2010 at 12:13 PM