From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A rural New Hampshire library decided to install Tor on their computers and allow anonymous Internet browsing. The Department of Homeland pressured them to stop...Bruce Schneier From Schneier on Security | September 16, 2015 at 02:40 PM
A Texas 9th-grader makes an electronic clock and brings it to school. Teachers immediately become stupid and call the police: The bell rang at least twice, he said...Bruce Schneier From Schneier on Security | September 16, 2015 at 11:09 AM
President Obama won't stay at the Waldorf Astoria Hotel in New York because of security concerns. The hotel "was bought last year by Chinese investors with deep...Bruce Schneier From Schneier on Security | September 16, 2015 at 07:05 AM
When the National Security Administration (NSA) -- or any government agency -- discovers a vulnerability in a popular computer system, should it disclose it or...Bruce Schneier From Schneier on Security | September 15, 2015 at 07:38 AM
Ashley Madison encrypted users' passwords using the bcrypt function. It's a secure password-encryption function, but two implemention programming mistakes allows...Bruce Schneier From Schneier on Security | September 14, 2015 at 07:26 AM
Interesting research. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | September 11, 2015 at 05:13 PM
In 1999, Lance Hoffman, David Balenson, and others published a survey of non-US cryptographic products. The point of the survey was to illustrate that there was...Bruce Schneier From Schneier on Security | September 11, 2015 at 03:08 PM
Last month, a Kentucky man shot down a drone that was hovering near his backyard. WDRB News reported that the camera drone's owners soon showed up at the home of...Bruce Schneier From Schneier on Security | September 11, 2015 at 07:45 AM
Chess player caught cheating at a tournament: I kept on looking at him. He was always sitting down, he never got up. It was very strange; we are taking about hours...Bruce Schneier From Schneier on Security | September 10, 2015 at 01:30 PM
The New York Times is reporting that Apple encryption is hampering an FBI investigation: In an investigation involving guns and drugs, the Justice Department obtained...Bruce Schneier From Schneier on Security | September 10, 2015 at 07:00 AM
It's not just humans who dislike the small flying objects. YouTube has videos of drones being stared at quizzically by a moose, harassed by a raven, attacked by...Bruce Schneier From Schneier on Security | September 9, 2015 at 02:30 PM
Most of us get to be thoroughly relieved that our emails weren't in the Ashley Madison database. But don't get too comfortable. Whatever secrets you have, even...Bruce Schneier From Schneier on Security | September 9, 2015 at 09:42 AM
Someone recently noticed a Washington Post story on the TSA that originally contained a detailed photograph of all the TSA master keys. It's now blurred out of...Bruce Schneier From Schneier on Security | September 8, 2015 at 07:02 AM
Interesting debate, surprisingly civil. Alexander seemed to have been okay with Snowden revealing surveillance based on Section 215: "If he had taken the one court...Bruce Schneier From Schneier on Security | September 7, 2015 at 10:14 AM
Using squid teeth as a model, researchers have created "the first material that heals itself in water." Paper from Nature. As usual, you can also use this squid...Bruce Schneier From Schneier on Security | September 4, 2015 at 05:07 PM
This coming Thursday, I'll be talking with Larry Poneman about cyber-resilience and the results of a new survey he's releasing. Join us here. The event is sponsored...Bruce Schneier From Schneier on Security | September 4, 2015 at 03:19 PM
Interesting research: "An Analysis of China's 'Great Cannon.'" Abstract: On March 16th, 2015, the Chinese censorship apparatus employed a new tool, the "Great Cannon"...Bruce Schneier From Schneier on Security | September 4, 2015 at 09:16 AM
Several times I've mentioned Peter Swire's concept of "the declining half-life of secrets." He's finally written it up: The nature of secrets is changing. Secrets...Bruce Schneier From Schneier on Security | September 3, 2015 at 09:43 AM
This Washington Post article uses the history of the L0pht to talk about the broader issues of Internet security....Bruce Schneier From Schneier on Security | September 2, 2015 at 08:04 AM