From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I've written about the difference between risk perception and risk reality. I thought about that when reading this list of Americans' top technology fears: Cyberterrorism...Bruce Schneier From Schneier on Security | December 9, 2015 at 02:48 PM
Interesting essay about how Israel regulates encryption: ...the Israeli encryption control mechanisms operate without directly legislating any form of encryption...Bruce Schneier From Schneier on Security | December 8, 2015 at 08:25 AM
Clever: The way forced authorisation fraud works is that the retailer sets up the terminal for a transaction by inserting the customer's card and entering the amount...Bruce Schneier From Schneier on Security | December 7, 2015 at 06:35 AM
I don't know if you've been following the story of the boats full of corpses that have been found in Japanese waters: Over the past two months, at least 12 wooden...Bruce Schneier From Schneier on Security | December 4, 2015 at 05:22 PM
BlackBerry has chosen to shut down operations in Pakistan rather than provide the government with backdoor access to encrypted communications. Pakistan is a relatively...Bruce Schneier From Schneier on Security | December 4, 2015 at 07:40 AM
Phil Rogaway has written an excellent paper titled "The Moral Character of Cryptography Work." In it, he exhorts cryptographers to consider the morality of their...Bruce Schneier From Schneier on Security | December 3, 2015 at 03:49 PM
Back in September, I announced my intention to survey the world market of cryptographic products. The goal is to compile a list of both free and commercial encryption...Bruce Schneier From Schneier on Security | December 3, 2015 at 08:55 AM
This article demonstrates that security is less important than functionality. When asked about their preference if they needed to choose between IT security and...Bruce Schneier From Schneier on Security | December 2, 2015 at 07:14 AM
Someone opened a LifeLock account in his ex-wife's name, and used the service to track her bank accounts, credit cards, and other financial activities. The article...Bruce Schneier From Schneier on Security | December 1, 2015 at 06:41 AM
This New Yorker article traces the history of privacy from the mid 1800s to today: As a matter of historical analysis, the relationship between secrecy and privacy...Bruce Schneier From Schneier on Security | November 30, 2015 at 01:47 PM
Algebraic Eraser is a public-key key-agreement protocol that's patented and being pushed by a company for the Internet of Things, primarily because it is efficient...Bruce Schneier From Schneier on Security | November 30, 2015 at 07:05 AM
She's calling it an octopus, but it's a squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | November 27, 2015 at 05:19 PM
Roger Grimes has written an interesting paper: "Implementing a Data-Driven Computer Security Defense." His thesis is that most organizations don't match their defenses...Bruce Schneier From Schneier on Security | November 27, 2015 at 07:45 AM
Newly declassified: "A History of U.S. Communications Security (Volumes I and II)," the David G. Boak Lectures, National Security Agency (NSA), 1973. (The document...Bruce Schneier From Schneier on Security | November 25, 2015 at 08:06 AM
In 2011, the Bush administration authorized -- almost certainly illegally -- the NSA to conduct bulk electronic surveillance on Americans: phone calls, e-mails,...Bruce Schneier From Schneier on Security | November 24, 2015 at 02:37 PM
In 2013, in the early days of the Snowden leaks, Harvard Law School professor and former Assistant Attorney General Jack Goldsmith reflected on the increase in...Bruce Schneier From Schneier on Security | November 24, 2015 at 07:32 AM
There hasn't been that much written about surveillance and big data being used to manipulate voters. In Data and Goliath, I wrote: Unique harms can arise from the...Bruce Schneier From Schneier on Security | November 23, 2015 at 01:52 PM
Divers are counting them: Squid gather and mate with as many partners as possible, then die, in an annual ritual off Rapid Head on the Fleurieu Peninsula, south...Bruce Schneier From Schneier on Security | November 20, 2015 at 05:30 PM
Reputation is a social mechanism by which we come to trust one another, in all aspects of our society. I see it as a security mechanism. The promise and threat...Bruce Schneier From Schneier on Security | November 20, 2015 at 08:04 AM