From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This is neat. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | April 17, 2015 at 05:31 PM
The Congressional Research Service has released a report on the no-fly list and current litigation that it violates due process....Bruce Schneier From Schneier on Security | April 17, 2015 at 07:54 AM
Fans attending Major League Baseball games are being greeted in a new way this year: with metal detectors at the ballparks. Touted as a counterterrorism measure...Bruce Schneier From Schneier on Security | April 15, 2015 at 07:58 AM
Paul Krugman argues that we'll give up our privacy because we want to emulate the rich, who are surrounded by servants who know everything about them: Consider...Bruce Schneier From Schneier on Security | April 14, 2015 at 07:32 AM
Citizen Lab has issued a report on China's "Great Cannon" attack tool, used in the recent DDoS attack against GitHub. We show that, while the attack infrastructure...Bruce Schneier From Schneier on Security | April 13, 2015 at 10:15 AM
John Mueller suggests an alternative to the FBI's practice of encouraging terrorists and then arresting them for something they would have never have planned on...Bruce Schneier From Schneier on Security | April 10, 2015 at 11:38 AM
Researchers found voting-system flaws in New South Wales, and were attacked by voting officials and the company that made the machines....Bruce Schneier From Schneier on Security | April 9, 2015 at 07:45 AM
The Southern Poverty Law Center warns of the rise of lone-wolf terrorism. From a security perspective, lone wolves are much harder to prevent because there is no...Bruce Schneier From Schneier on Security | April 8, 2015 at 11:21 AM
Here's an article on making secret phone calls with cell phones. His step-by-step instructions for making a clandestine phone call are as follows: Analyze your...Bruce Schneier From Schneier on Security | April 7, 2015 at 10:32 AM
Giant squid caught on video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | April 3, 2015 at 05:17 PM
Wow. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | April 3, 2015 at 05:16 PM
The security audit of the TrueCrypt code has been completed (see here for the first phase of the audit), and the results are good. Some issues were found, but nothing...Bruce Schneier From Schneier on Security | April 3, 2015 at 02:14 PM
Nice idea, but I would like it to work for other browsers and other e-mail programs....Bruce Schneier From Schneier on Security | April 1, 2015 at 02:13 PM
It's April 1, and time for another Movie-Plot Threat Contest. This year, the theme is Crypto Wars II. Strong encryption is evil, because it prevents the police...Bruce Schneier From Schneier on Security | April 1, 2015 at 07:33 AM
Pew Research has a new survey on Americans' privacy habits in a post-Snowden world. The 87% of those who had heard at least something about the programs were asked...Bruce Schneier From Schneier on Security | March 31, 2015 at 03:54 PM