From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Good article:
Zachary's offense? [He's six years old.] Taking a camping utensil that can serve as a knife, fork and spoon to school. He was so excited about recently...schneier From Schneier on Security | October 15, 2009 at 12:34 PM
I'm just going to quote without comment:
About the file:
the text message file encrypted with a symmetric key combine 3 modes
1st changing the original text...schneier From Schneier on Security | October 13, 2009 at 07:55 PM
Good essay: "Malware to crimeware: How far have they gone, and how do we catch up?" ;login:, August 2009:
I have survived over a decade of advances in delivery...schneier From Schneier on Security | October 13, 2009 at 12:15 PM
I wrote about this in 2004. This is an improved product:
While paints blocking lower frequencies have been available for some time, Mr Ohkoshi's technology is...schneier From Schneier on Security | October 12, 2009 at 06:47 PM
Yesterday, DHS Secretary Janet Napolitano said that the U.S. needed to hire 1,000 cybersecurity experts over the next three years. Bob Cringly doubts that there...schneier From Schneier on Security | October 9, 2009 at 04:33 PM
This is just silly:
Beaver Stadium is a terrorist target. It is most likely the No. 1 target in the region. As such, it deserves security measures commensurate...Schneier From Schneier on Security | October 9, 2009 at 09:39 AM
Interesting:
Songhua Xu presented an interesting idea for measuring pen angle and pressure to present beautiful flower-like visual versions of a handwritten signature...Schneier From Schneier on Security | October 8, 2009 at 09:33 AM
This is interesting:
Since then, his scams have tended to take place in luxury hotels around the world.
Typically, he would arrive at a hotel, claim to be a guest...schneier From Schneier on Security | October 7, 2009 at 06:07 PM
I'm dubious:
At a demonstration of the technology this week, project manager Robert P. Burns said the idea is to track a set of involuntary physiological reactions...schneier From Schneier on Security | October 7, 2009 at 05:54 PM
Witnesses are much more accurate at identifying criminals when computers assist in the identification process, not police officers.
A major cause of miscarriages...schneier From Schneier on Security | October 7, 2009 at 12:12 PM
You'd think this would be obvious:
Douglas Havard, 27, serving six years for stealing up to schneier From Schneier on Security | October 6, 2009 at 07:32 PM
This is brilliant:
The sophisticated hack uses a Trojan horse program installed on the victim's machine that alters html coding before it's displayed in the user's...schneier From Schneier on Security | October 6, 2009 at 11:40 AM
Wow. It's over 2,000 pages, so it'll take time to make any sense of. According to Ross Anderson, who's given it a quick look over, "it seems to be the bureaucratic...schneier From Schneier on Security | October 5, 2009 at 08:10 PM
It's a security risk:
The crate was hoisted onto the flatbed with a 120-ton construction crane. For security reasons, there were no signs on the truck indicating...schneier From Schneier on Security | October 5, 2009 at 06:29 PM