From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Here are two essays trying to understand NSA malware and how it works, in light of the enormous number of documents released by Speigel recently....Bruce Schneier From Schneier on Security | February 11, 2015 at 07:33 AM
In January, the National Academies of Science (NAS) released a report on the bulk collection of signals intelligence. Basically, a year previously President Obama...Bruce Schneier From Schneier on Security | February 9, 2015 at 05:20 PM
The Washington Department of Fish and Wildlife explains how to fish for squid. As usual, you can also use this squid post to talk about the security stories in...Bruce Schneier From Schneier on Security | February 6, 2015 at 06:58 PM
In the latest article based on the Snowden documents, the Intercept is reporting that the NSA and GCHQ are piggy-backing on the work of hackers: In some cases,...Bruce Schneier From Schneier on Security | February 6, 2015 at 10:41 AM
Werner Koch, who has been maintaining the GPG email encryption program since 1997, is going broke and considering quitting. Updates to the article say that, because...Bruce Schneier From Schneier on Security | February 5, 2015 at 08:50 PM
Interesting paper: "There's No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams," by Marie Vasek and Tyler Moore. Abstract...Bruce Schneier From Schneier on Security | February 4, 2015 at 08:48 AM
In an interview this week, President Obama said that terrorism does not pose an existential threat: What I do insist on is that we maintain a proper perspective...Bruce Schneier From Schneier on Security | February 3, 2015 at 07:15 AM
Seems that a Texas school has suspended a 9-year-old for threatening another student with a replica One Ring. (Yes, that One Ring.) I've written about this sort...Bruce Schneier From Schneier on Security | February 2, 2015 at 01:50 PM
In Colombia: The team began experimenting with Morse code using various percussion instruments and a keyboard. They learned that operators skilled in Morse code...Bruce Schneier From Schneier on Security | February 2, 2015 at 08:01 AM
No mention of the species, but the photo is a depressing one. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...Bruce Schneier From Schneier on Security | January 30, 2015 at 05:40 PM
This was supposed to be a secret until the middle of February, but we've been found out. We already have European customers; this is our European office. And, by...Bruce Schneier From Schneier on Security | January 30, 2015 at 03:57 PM
Here's a story of a fake bank in China -- a real bank, not an online bank -- that stole $32m from depositors over a year. Pro tip: real banks never offer 2%/week...Bruce Schneier From Schneier on Security | January 30, 2015 at 07:49 AM
Another story from the Snowden documents: According to the documents, the LEVITATION program can monitor downloads in several countries across Europe, the Middle...Bruce Schneier From Schneier on Security | January 29, 2015 at 07:26 AM
I missed this paper when it was first published in 2012: "Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks" Abstract...Bruce Schneier From Schneier on Security | January 28, 2015 at 08:00 AM
In the latest example of a military technology that has secretly been used by the police, we have radar guns that can see through walls....Bruce Schneier From Schneier on Security | January 27, 2015 at 02:08 PM
Here's an IDEA-variant with a 128-bit block length. While I think it's a great idea to bring IDEA up to a modern block length, the paper has none of the cryptanalysis...Bruce Schneier From Schneier on Security | January 27, 2015 at 07:24 AM
Remember back in 2013 when the then-director of the NSA Keith Alexander claimed that Section 215 bulk telephone metadata surveillance stopped "fifty-four different...Bruce Schneier From Schneier on Security | January 26, 2015 at 06:51 AM
Today, as part of a Harvard computer science symposium, I had a public conversation with Edward Snowden. The topics were largely technical, ranging from cryptography...Bruce Schneier From Schneier on Security | January 23, 2015 at 05:58 PM
Giggling Squid is a Thai restaurant chain in the UK. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...Bruce Schneier From Schneier on Security | January 23, 2015 at 05:22 PM
Last year, two Swiss artists programmed a Random Botnot Shopper, which every week would spend $100 in bitcoin to buy a random item from an anonymous Internet black...Bruce Schneier From Schneier on Security | January 23, 2015 at 05:55 AM