From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Rumors are that RSA president Art Coviello declined the job. No surprise: it has no actual authority but a lot of responsibility.
Security experts have pointed...schneier From Schneier on Security | December 11, 2009 at 12:37 PM
Last month, researchers found a security flaw in the SSL protocol, which is used to protect sensitive web data. The protocol is used for online commerce, webmail...schneier From Schneier on Security | December 10, 2009 at 07:13 PM
BoingBoing is pretty snarky:
The TSA has published a "redacted" version of their s00per s33kr1t screening procedure guidelines (Want to know whether to frisk a...schneier From Schneier on Security | December 10, 2009 at 12:47 PM
Schmidt said:
I think judgment matters. If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place. If you really...schneier From Schneier on Security | December 9, 2009 at 06:22 PM
This, from The New England Journal of Medicine, sounds familiar:
This is the story line for most headline-grabbing illnesses schneier From Schneier on Security | December 9, 2009 at 12:43 PM
I missed this story:
Since 2007, the U.S. State Department has been issuing high-tech "e-passports," which contain computer chips carrying biometric data to prevent...schneier From Schneier on Security | December 8, 2009 at 12:05 PM
In an AP story on increased security at major football (the American variety) events, this sentence struck me:
"High-profile events are something that terrorist...schneier From Schneier on Security | December 7, 2009 at 01:53 PM
Wired summarizes research by Christopher Soghoian:
Sprint Nextel provided law enforcement agencies with customer location data more than 8 million times between...schneier From Schneier on Security | December 3, 2009 at 11:47 AM
It can be impossible to securely delete a file:
What are the security implications of Volume Shadow Copy?
Suppose you decide to protect one of your documents...schneier From Schneier on Security | December 2, 2009 at 09:49 AM
This research centers on looking at the radio characteristics of individual RFID chips and creating a "fingerprint." It makes sense; fingerprinting individual...schneier From Schneier on Security | December 1, 2009 at 04:15 PM
National Journal has an excellent article on cyberwar policy. I agree with the author's comments on The Atlantic blog:
Would the United States ever use a morereport...schneier From Schneier on Security | December 1, 2009 at 12:59 PM
This is a very interesting paper: "The Real Hustle, which does hidden camera demonstrations of con games. (There's no DVD of the show available, but there areprevious...schneier From Schneier on Security | November 30, 2009 at 10:20 AM
This 1996 interview with psychiatrist Robert DuPont was part of a Frontline program called "Nuclear Reaction."
He's talking about the role fear plays in the perception...schneier From Schneier on Security | November 27, 2009 at 02:25 PM
Wikileaks has published pager intercepts from New York on 9/11:
WikiLeaks released half a million US national text pager intercepts. The intercepts cover a 24nuggets...schneier From Schneier on Security | November 26, 2009 at 01:11 PM
Long, detailed, and very good story of the Mumbai terrorist attacks of last year.
My own short commentary in the aftermath of the attacks.
schneier From Schneier on Security | November 25, 2009 at 07:52 PM
If you allow players in an online world to penalize each other, you open the door to extortion:
One of the features that supported user socialization in the game...schneier From Schneier on Security | November 25, 2009 at 10:11 AM