From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This is an important development:
Shor's algorithm was first demonstrated in a computing system based on nuclear magnetic resonance -- manipulating molecules in...schneier From Schneier on Security | September 22, 2009 at 11:01 AM
Interesting:
For nine months, Eagle's team recorded data from the phones of 94 students and staff at MIT. By using blue-tooth technology and phone masts, theyabstract...schneier From Schneier on Security | September 21, 2009 at 06:41 PM
Good essay on "terrorist havens" -- like Afghanistan -- and why they're not as big a worry as some maintain:
Rationales for maintaining the counterinsurgency in...schneier From Schneier on Security | September 21, 2009 at 11:46 AM
I wrote about the DHS's color-coded threat alert system in 2003, in Beyond Fear:
The color-coded threat alerts issued by the Department of Homeland Security are...schneier From Schneier on Security | September 18, 2009 at 11:45 AM
Using a 3D printer. Impressive.
At the end of the day he talked the officers into trying the key on their handcuffs and schneier From Schneier on Security | September 16, 2009 at 02:00 PM
Skein is one of the 14 SHA-3 candidates chosen by NIST to advance to the second round. As part of the process, NIST allowed the algorithm designers to implement...schneier From Schneier on Security | September 15, 2009 at 11:10 AM
Back in 2002, science fiction author Robert J. Sawyer wrote an essay about the trade-off between privacy and security, and came out in favor of less privacy. I...schneier From Schneier on Security | September 14, 2009 at 09:20 AM
On September 30, 2001, I published a special issue of Crypto-Gram discussing the terrorist attacks. I wrote about the novelty of the attacks, airplane security...schneier From Schneier on Security | September 11, 2009 at 02:47 PM
File deletion is all about control. This used to not be an issue. Your data was on your computer, and you decided when and how to delete a file. You could use the...schneier From Schneier on Security | September 10, 2009 at 11:08 AM
The BBC has a video demonstration of a 16-ounce bottle of liquid blowing a hole in the side of a plane.
I know no more details other than what's in the video.
...schneier From Schneier on Security | September 9, 2009 at 05:25 PM
Three of the UK liquid bombers were convicted Monday. NSA-intercepted e-mail was introduced as evidence in the trial:
The e-mails, several of which have been ...schneier From Schneier on Security | September 9, 2009 at 03:10 PM
Interesting video:
A new class of global actors is playing an increasingly important role in globalization: smugglers, warlords, guerrillas, terrorists, gangs,...schneier From Schneier on Security | September 8, 2009 at 03:06 PM
Very interesting hour-long interview.
Australian-born David Kilcullen was the senior advisor to US General David Petraeus during his time in Iraq, advising on...Bruce Schneier From Schneier on Security | September 7, 2009 at 11:04 AM
Blog post from Ed Felten:
Usually when the threat model mentions subpoenas, the bigger threats in reality come from malicious intruders or insiders. The biggest...schneier From Schneier on Security | September 4, 2009 at 11:18 AM
If there's actually a cult out there, I want to hear about it. In an essay by that name, John Viega writes about the dangers of relying on Applied Cryptography...schneier From Schneier on Security | September 3, 2009 at 06:56 PM