From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Interesting paper on the dark web: Daniel Moore & Thomas Rid, "Cryptopolitik and the Darknet," Survival, 2016. (Technical annex here -- requires the Tor browser...Bruce Schneier From Schneier on Security | February 15, 2016 at 07:19 AM
The Monterey Bay Aquarium has a pajama squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.....Bruce Schneier From Schneier on Security | February 12, 2016 at 05:05 PM
A man learned his wife was pregnant from her Fitbit data. The details of the story are weird. The man posted the data to Reddit and asked for analysis help. But...Bruce Schneier From Schneier on Security | February 12, 2016 at 01:16 PM
Interesting research: "CPV: Delay-based Location Verification for the Internet": Abstract: The number of location-aware services over the Internet continues growing...Bruce Schneier From Schneier on Security | February 12, 2016 at 07:19 AM
Today I released my worldwide survey of encryption products. The findings of this survey identified 619 entities that sell encryption products. Of those 412, or...Bruce Schneier From Schneier on Security | February 11, 2016 at 12:05 PM
EPIC has just launched "Data Protection 2016" to try to make privacy an issue in this year's elections. You can buy swag....Bruce Schneier From Schneier on Security | February 11, 2016 at 07:13 AM
AT&T's CEO believes that the company should not offer robust security to its customers: But tech company leaders aren't all joining the fight against the deliberate...Bruce Schneier From Schneier on Security | February 10, 2016 at 02:59 PM
It's National Threat Assessment Day. Published annually by the Director of National Intelligence, the "Worldwide Threat Assessment of the US Intelligence Community"...Bruce Schneier From Schneier on Security | February 9, 2016 at 04:25 PM
As part of a child pornography investigation, the FBI hacked into over 1,300 computers. But after Playpen was seized, it wasn't immediately closed down, unlike...Bruce Schneier From Schneier on Security | February 9, 2016 at 07:25 AM
Today, Data and Goliath is being published in paperback. Everyone tells me that the paperback version sells better than the hardcover, even though it's a year later...Bruce Schneier From Schneier on Security | February 8, 2016 at 03:11 PM
The New York Times has a long article on fraudulent locksmiths. The scam is a basic one: quote a low price on the phone, but charge much more once you show up and...Bruce Schneier From Schneier on Security | February 8, 2016 at 07:52 AM
The NSA is undergoing a major reorganization, combining its attack and defense sides into a single organization: In place of the Signals Intelligence and Information...Bruce Schneier From Schneier on Security | February 5, 2016 at 04:15 PM
This research shows how to track e-commerce users better across multiple sessions, even when they do not provide unique identifiers such as user IDs or cookies....Bruce Schneier From Schneier on Security | February 5, 2016 at 07:56 AM
The Internet of Things is the name given to the computerization of everything in our lives. Already you can buy Internet-enabled thermostats, light bulbs, refrigerators...Bruce Schneier From Schneier on Security | February 4, 2016 at 07:18 AM
Both the "going dark" metaphor of FBI Director James Comey and the contrasting "golden age of surveillance" metaphor of privacy law professor Peter Swire focus...Bruce Schneier From Schneier on Security | February 3, 2016 at 07:09 AM
I am pleased to have been a part of this report, part of the Berkman Center's Berklett Cybersecurity project: Don't Panic: Making Progress on the "Going Dark" Debate...Bruce Schneier From Schneier on Security | February 2, 2016 at 03:20 PM
The NSA is publicly moving away from cryptographic algorithms vulnerable to cryptanalysis using a quantum computer. It just published a FAQ about the process: Q...Bruce Schneier From Schneier on Security | February 2, 2016 at 08:11 AM
The NSA and GCHQ have successfully hacked Israel's drones, according to the Snowden documents. The story is being reported by the Intercept and Der Spiegel. The...Bruce Schneier From Schneier on Security | February 1, 2016 at 03:27 PM