From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Peter Swire, law professor and one of the members of the President's review group on the NSA, writes about intelligence reform and the USA FREEDOM Act....Bruce Schneier From Schneier on Security | June 16, 2015 at 07:59 AM
Encrypting your Windows hard drives is trivially easy; choosing which program to use is annoyingly difficult. I still use Windows -- yes, I know, don't even start...Bruce Schneier From Schneier on Security | June 15, 2015 at 08:17 AM
On April 1, I announced the Eighth Movie-Plot Threat Contest: I want a movie-plot threat that shows the evils of encryption. (For those who don't know, a movie-plot...Bruce Schneier From Schneier on Security | June 13, 2015 at 01:11 PM
How dead squid is made to dance when soy sauce is poured on it. As usual, you can also use this squid post to talk about the security stories in the news that I...Bruce Schneier From Schneier on Security | June 12, 2015 at 05:41 PM
It's Iaido, not sword fighting, but still. Of course, the two didn't battle each other, but competed in Iaido tests like cutting mats and flowers in various cross...Bruce Schneier From Schneier on Security | June 12, 2015 at 02:38 PM
The Washington Post has a good two part story on the history of insecurity of the Internet....Bruce Schneier From Schneier on Security | June 12, 2015 at 12:45 PM
Kaspersky Labs has discovered and publicized details of a new nation-state surveillance malware system, called Duqu 2.0. It's being attributed to Israel. There's...Bruce Schneier From Schneier on Security | June 12, 2015 at 07:18 AM
Earlier this week, I was at the eighth Workshop on Security and Human Behavior. This is a small invitational gathering of people studying various aspects of the...Bruce Schneier From Schneier on Security | June 11, 2015 at 02:47 PM
News that the Transportation Security Administration missed a whopping 95% of guns and bombs in recent airport security "red team" tests was justifiably shocking...Bruce Schneier From Schneier on Security | June 11, 2015 at 07:10 AM
Cloud computing is the future of computing. Specialization and outsourcing make society more efficient and scalable, and computing isn't any different. But why...Bruce Schneier From Schneier on Security | June 10, 2015 at 04:27 PM
Let me start by describing two approaches to the cloud. Most of the students I meet at Harvard University live their lives in the cloud. Their e-mail, documents...Bruce Schneier From Schneier on Security | June 10, 2015 at 12:27 PM
Yes. No. Yes. Maybe. Yes. Okay, it's complicated. The economics of cloud computing are compelling. For companies, the lower operating costs, the lack of capital...Bruce Schneier From Schneier on Security | June 10, 2015 at 07:43 AM
This is interesting research: "How Near-Miss Events Amplify or Attenuate Risky Decision Making," Catherine H. Tinsley, Robin L. Dillon, and Matthew A. Cronin. In...Bruce Schneier From Schneier on Security | June 9, 2015 at 09:15 AM
Interesting paper by Julie Cohen: Abstract: The dialogue between law and Surveillance Studies has been complicated by a mutual misrecognition that is both theoretical...Bruce Schneier From Schneier on Security | June 8, 2015 at 01:48 PM
Interesting research: "We Can Track You If You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones": Abstract: Motion sensors (e.g., accelerometers)...Bruce Schneier From Schneier on Security | June 8, 2015 at 07:09 AM
Legends of giant squid go back centuries: In his book "The Search for the Giant Squid" marine biologist Richard Ellis notes that "There is probably no apparition...Bruce Schneier From Schneier on Security | June 5, 2015 at 05:51 PM
The news media is buzzing about how the US military identified the location of an ISIS HQ because someone there took a photo and posted it. Quoting Air Force General...Bruce Schneier From Schneier on Security | June 5, 2015 at 03:38 PM
The latest story from the Snowden documents, co-published by The New York Times and ProPublica, shows that the NSA is operating a signature-based intrusion detection...Bruce Schneier From Schneier on Security | June 5, 2015 at 08:43 AM
New research: In "Brainprint," a newly published study in academic journal Neurocomputing, researchers from Binghamton University observed the brain signals of...Bruce Schneier From Schneier on Security | June 4, 2015 at 11:36 AM
Monday night, EPIC -- that's the Electronic Privacy Information Center -- had its annual Champions of Freedom Dinner. I tell you this for two reasons. One, I received...Bruce Schneier From Schneier on Security | June 3, 2015 at 05:31 PM