From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Google secures photos using public but unguessable URLs: So why is that public URL more secure than it looks? The short answer is that the URL is working as a password...Bruce Schneier From Schneier on Security | July 20, 2015 at 06:25 AM
I may have posted this short video before, but if I did, I can't find it. It's four years old, but still pretty to watch. As usual, you can also use this squid...Bruce Schneier From Schneier on Security | July 17, 2015 at 05:09 PM
Micah Lee has a good tutorial on installing and using secure chat. To recap: We have installed Orbot and connected to the Tor network on Android, and we have installed...Bruce Schneier From Schneier on Security | July 17, 2015 at 07:35 AM
The ProxyHam project (and associated Def Con talk) has been canceled under mysterious circumstances. No one seems to know anything, and conspiracy theories abound...Bruce Schneier From Schneier on Security | July 16, 2015 at 12:00 PM
If you subscribe to my monthly e-mail newsletter, Crypto-Gram, you need to read this. Sometime between now and the August issue, the Crypto-Gram mailing list will...Bruce Schneier From Schneier on Security | July 15, 2015 at 03:15 AM
This is interesting: We can learn a lot about the potential for safety failures at US nuclear plants from the July 29, 2012, incident in which three religious activists...Bruce Schneier From Schneier on Security | July 14, 2015 at 06:53 AM
Interesting article on the NSA's use of multi-beam antennas for surveillance. Certainly smart technology; it can eavesdrop on multiple targets per antenna. I'm...Bruce Schneier From Schneier on Security | July 13, 2015 at 04:01 PM
A cute series of knitted plushies. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | July 10, 2015 at 05:29 PM
India is cracking down on people who use technology to cheat on exams: Candidates have been told to wear light clothes with half-sleeves, and shirts that do not...Bruce Schneier From Schneier on Security | July 10, 2015 at 01:44 PM
Recently, WikiLeaks began publishing over half a million previously secret cables and other documents from the Foreign Ministry of Saudi Arabia. It's a huge trove...Bruce Schneier From Schneier on Security | July 10, 2015 at 05:35 AM
Monday a group of cryptographers and security experts released a major paper outlining the risks of government-mandated back-doors in encryption products: Keys...Bruce Schneier From Schneier on Security | July 9, 2015 at 07:31 AM
This is an interesting story of a reviewer who had her reviewer deleted because Amazon believed she knew the author personally. Leaving completely aside the ethics...Bruce Schneier From Schneier on Security | July 8, 2015 at 07:36 AM
Read this: Hacking Team asked its customers to shut down operations, but according to one of the leaked files, as part of Hacking Team's "crisis procedure," it...Bruce Schneier From Schneier on Security | July 7, 2015 at 06:44 PM
I've been reading through the 48 classified documents about the NSA's XKEYSCORE system released by the Intercept last week. From the article: The NSA's XKEYSCORE...Bruce Schneier From Schneier on Security | July 7, 2015 at 07:38 AM
Someone hacked the cyberweapons arms manufacturer Hacking Team and posted 400 GB of internal company data. Hacking Team is a pretty sleazy company, selling surveillance...Bruce Schneier From Schneier on Security | July 6, 2015 at 01:53 PM
On Friday, WikiLeaks published three summaries of NSA intercepts of German government communications. To me, the most interesting thing is not the intercept analyses...Bruce Schneier From Schneier on Security | July 6, 2015 at 06:13 AM
Long article about a very lucrative squid-fishing industry that involves bribing the Cambodian Navy. As usual, you can also use this squid post to talk about the...Bruce Schneier From Schneier on Security | July 3, 2015 at 05:39 PM
It's the Internet, which means there must be cute animal videos on this blog. But this one is different. Watch a mother rabbit beat up a snake to protect her children...Bruce Schneier From Schneier on Security | July 3, 2015 at 01:13 PM
This is really clever: Enigma's technique -- what cryptographers call "secure multiparty computation" -- works by mimicking a few of the features of bitcoin's decentralized...Bruce Schneier From Schneier on Security | July 3, 2015 at 07:38 AM