From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This paper, by Cormac Herley at Microsoft Research, sounds like me:
Abstract: It is often suggested that users are hopelessly lazy and unmotivated on securityme...schneier From Schneier on Security | November 24, 2009 at 04:06 PM
Norbt (no robot) is a low-security web application to encrypt web pages. You can create and encrypt a webpage. The key is an answer to a question; anyone who...schneier From Schneier on Security | November 24, 2009 at 09:24 AM
This article reads like something written by the company's PR team.
When it comes to sleuthing these days, knowing your way within a database is as valued a skill...schneier From Schneier on Security | November 23, 2009 at 08:36 PM
I would sure like to know more about this:
Top code-breakers at the Government Communications Headquarters in the United Kingdom have succeeded in breaking the...schneier From Schneier on Security | November 23, 2009 at 09:53 AM
An expedition to study seamounts in the Indian Ocean has discovered some new species, including some squid.
schneier From Schneier on Security | November 20, 2009 at 10:57 PM
Yet another interview with me. This one is audio, and was conducted in Rotterdam in October.
schneier From Schneier on Security | November 20, 2009 at 04:20 PM
Interesting:
The researchers say they've found a vulnerability in U.S. law enforcement wiretaps, if only theoretical, that would allow a surveillance target to...schneier From Schneier on Security | November 20, 2009 at 09:22 AM
At the Internet Governance Forum in Sharm El Sheikh this week, there was a conversation on social networking data. Someone made the point that there are several...schneier From Schneier on Security | November 19, 2009 at 09:26 AM
"Use of a pig model to demonstrate vulnerability of major neck vessels to inflicted trauma from common household items," from the American Journal of Forensic Medical...schneier From Schneier on Security | November 19, 2009 at 09:16 AM
Organizational Learning and Islamic Militancy (May 2009) was written by Michael Kenney for the U.S. Department of Justice. It's long: 146 pages. From the executive...schneier From Schneier on Security | November 18, 2009 at 04:04 PM
This is cool:
Ghost imaging is a technique that allows a high-resolution camera to produce an image of an object that the camera itself cannot see. It uses two...schneier From Schneier on Security | November 18, 2009 at 09:43 AM
A study in the British Journal of Criminology makes the point that drink-spiking date-raping is basically an urban legend:
Abstract. There is a stark contrast...schneier From Schneier on Security | November 17, 2009 at 10:39 AM
Interesting research:
For the last five years we have researched the connection between times of terrorist threats and public opinion. In a series of tightly designed...schneier From Schneier on Security | November 16, 2009 at 09:51 AM
A month ago, ThatsMyFace.com approached me about making a Bruce Schneier action figure. It's $100. I'd like to be able to say something like "half the proceeds...schneier From Schneier on Security | November 15, 2009 at 04:22 PM
The algorithm is mentioned in Von Neumann's War, by John Ringo and Travis Taylor.
P. 495:
The guy was using a fairly simple buffer overflow attack but withEvery...schneier From Schneier on Security | November 13, 2009 at 08:43 PM
Here's an interview with me, conducted at the Information Security Decisions conference in Chicago in October.
schneier From Schneier on Security | November 13, 2009 at 07:47 PM