From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I finally have control of my Facebook page. There'll be nothing on it that isn't on my blog, but some of you might prefer following my writing from there.
(ITwitter...schneier From Schneier on Security | February 17, 2010 at 08:38 PM
I had no idea this was being done, but erased answers are now analyzed on standardized tests. Schools with a high number of wrong-to-right changes across multiple...schneier From Schneier on Security | February 16, 2010 at 12:26 PM
I don't know which is more exciting: that someone is trying to break the squid record, or that there is a squid record in the first place.
An Auckland scientist...schneier From Schneier on Security | February 12, 2010 at 10:32 PM
This< is neat:
The Impressioner consists of a sensor that goes into the lock and sends information back to a computer via USB about the location of the lock's...schneier From Schneier on Security | February 12, 2010 at 12:23 PM
Nice attack against the EMV -- Eurocard Mastercard Visa -- the "chip and PIN" credit card payment system. The attack allows a criminal to use a stolen card without...schneier From Schneier on Security | February 11, 2010 at 10:18 PM
Really interesting reading.
Scam-Detective: How did you find victims for your scams?
John: First you need to understand how the gangs work. At the bottom are...schneier From Schneier on Security | February 11, 2010 at 01:19 PM
The iTunes Store Terms and Conditions prohibits it:
Notice, as I read this clause not only are terrorists -- or at least those on terrorist watch lists -- prohibited...schneier From Schneier on Security | February 10, 2010 at 06:39 PM
This appears not to be a joke:
The state's "Subversive Activities Registration Act," passed last year and now officially on the books, states that "every member...schneier From Schneier on Security | February 9, 2010 at 06:09 PM
Isn't it a bit embarrassing for an "expert on counter-terrorism" to be quoted as saying this?
Bill Tupman, an expert on counter-terrorism from Exeter University...schneier From Schneier on Security | February 9, 2010 at 12:07 PM
Interesting research:
Target prevalence powerfully influences visual search behavior. In most visual search experiments, targets appear on at least 50% of trials...schneier From Schneier on Security | February 8, 2010 at 07:54 PM
Three weeks ago, Google announced a sophisticated attack against them from China. There have been some interesting technical details since then. And the NSA is...schneier From Schneier on Security | February 8, 2010 at 12:03 PM
At FSE 2010 this week, Dmitry Khovratovich and Ivica Nikolic presented a paper where they cryptanalyze ARX algorithms (algorithms that use only addition, rotation...schneier From Schneier on Security | February 7, 2010 at 02:06 PM