From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Interesting paper: "Anonymization and Risk," by Ira S. Rubinstein and Woodrow Hartzog: Abstract: Perfect anonymization of data sets has failed. But the process...Bruce Schneier From Schneier on Security | July 11, 2016 at 07:31 AM
It's chromatic aberration. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | July 8, 2016 at 05:09 PM
Adam Conover interviewed me on his podcast. If you remember, I was featured on his "Adam Ruins Everything" TV episode on security....Bruce Schneier From Schneier on Security | July 8, 2016 at 01:08 PM
Two researchers have discovered over 100 Tor nodes that are spying on hidden services. Cory Doctorow explains: These nodes -- ordinary nodes, not exit nodes --...Bruce Schneier From Schneier on Security | July 8, 2016 at 08:01 AM
BBC has the story. The confusion is that a scan of a passport is much easier to forge than an actual passport. This is a truly hard problem: how do you give people...Bruce Schneier From Schneier on Security | July 7, 2016 at 02:27 PM
Interesting research: "Characterizing and Avoiding Routing Detours Through Surveillance States," by Anne Edmundson, Roya Ensafi, Nick Feamster, and Jennifer Rexford...Bruce Schneier From Schneier on Security | July 7, 2016 at 07:47 AM
The New York Times wrote a good piece comparing airport security around the world, and pointing out that moving the security perimeter doesn't make any difference...Bruce Schneier From Schneier on Security | July 6, 2016 at 10:45 AM
Interesting research: Debora Halbert, "Intellectual property theft and national security: Agendas and assumptions": Abstract: About a decade ago, intellectual property...Bruce Schneier From Schneier on Security | July 5, 2016 at 11:54 AM
Funny: The Department of Canine Security urges dogs to remain on high alert and employ the tactic of See Something, Say Something. Remember to bark upon spotting...Bruce Schneier From Schneier on Security | July 4, 2016 at 08:40 PM
Here's a Corpse Reviver #2 variant with squid ink. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...Bruce Schneier From Schneier on Security | July 1, 2016 at 05:34 PM
Peter Maas interviewed the former NSA official who wrote the infamous "I Hunt Sysadmins" memo. It's interesting, but I wanted to hear less of Peter Maas -- I already...Bruce Schneier From Schneier on Security | June 29, 2016 at 07:29 AM
Interesting research: Mark G. Stewart and John Mueller, "Risk-based passenger screening: risk and economic assessment of TSA PreCheck increased security at reduced...Bruce Schneier From Schneier on Security | June 28, 2016 at 03:10 PM
This could go badly: "People You May Know are people on Facebook that you might know," a Facebook spokesperson said. "We show you people based on mutual friends...Bruce Schneier From Schneier on Security | June 28, 2016 at 07:56 AM
There's an app that allows people to submit photographs of hotel rooms around the world into a centralized database. The idea is that photographs of victims of...Bruce Schneier From Schneier on Security | June 27, 2016 at 07:05 AM
Interesting: There is one feature of the squid that is not transparent and which could act as a signal to prey the eyes. However, the squid has a developed protection...Bruce Schneier From Schneier on Security | June 24, 2016 at 05:39 PM
Stories of burglars using social media to figure out who's on vacation are old hat. Now financial investigators are using social media to find hidden wealth....Bruce Schneier From Schneier on Security | June 24, 2016 at 07:29 AM
Michah Lee has a nice comparison among Signal, WhatsApp, and Allo. In this article, I'm going to compare WhatsApp, Signal, and Allo from a privacy perspective....Bruce Schneier From Schneier on Security | June 23, 2016 at 07:54 AM
IPv4 addresses are valuable, so criminals are figuring out how to buy or steal them. Hence criminals' interest in ways to land themselves IP addresses, some of...Bruce Schneier From Schneier on Security | June 22, 2016 at 02:15 PM