From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
It's a common fraud on sites like eBay: buyers falsely claim that they never received a purchased item in the mail. Here's a paper on defending against this fraud...Bruce Schneier From Schneier on Security | January 21, 2015 at 07:31 AM
At a CATO surveillance event last month, Ben Wittes talked about inherent presidential powers of surveillance with this hypothetical: "What should Congress have...Bruce Schneier From Schneier on Security | January 20, 2015 at 07:24 AM
Late last year, in a criminal case involving export violations, the US government disclosed a mysterious database of telephone call records that it had queried...Bruce Schneier From Schneier on Security | January 19, 2015 at 01:42 PM
Appelbaum, Poitras and others have another NSA aticle with an enormous Snowden document dump on Der Spiegel, giving details on a variety of offensive NSA cyberoperations...Bruce Schneier From Schneier on Security | January 18, 2015 at 08:42 AM
Classic song written by Arthur Scammell and performed by Hank Snow. As usual, you can also use this squid post to talk about the security stories in the news that...Bruce Schneier From Schneier on Security | January 16, 2015 at 05:44 PM
For its "Top Influencers in Security You Should Be Following in 2015" blog post, TripWire asked me: "If you could have one infosec-related superpower, what would...Bruce Schneier From Schneier on Security | January 16, 2015 at 02:46 PM
I have long said that driving a car is the most dangerous thing regularly do in our lives. Turns out deaths due to automobiles are declining, while deaths due to...Bruce Schneier From Schneier on Security | January 16, 2015 at 07:59 AM
An excellent idea: 311 for encryption. RSA, DSA, and ECDSA must be 3.4 ounces (100bits) or less per container; must be in 1 quart-sized, clear, plastic, zip-top...Bruce Schneier From Schneier on Security | January 15, 2015 at 02:22 PM
Thousands of articles have called the December attack against Sony Pictures a wake-up call to industry. Regardless of whether the attacker was the North Korean...Bruce Schneier From Schneier on Security | January 15, 2015 at 07:44 AM
It's called SnoopSnitch: SnoopSnitch is an app for Android devices that analyses your mobile radio traffic to tell if someone is listening in on your phone conversations...Bruce Schneier From Schneier on Security | January 14, 2015 at 02:23 PM
In the wake of the Paris terrorist shootings, David Cameron has said that he wants to ban encryption in the UK. Here's the quote: "If I am prime minister I will...Bruce Schneier From Schneier on Security | January 13, 2015 at 03:52 PM
Good essay. Worry about Ebola (or anything) manifests physically as what's known as a fight, flight, or freeze response. Biological systems ramp up or down to focus...Bruce Schneier From Schneier on Security | January 13, 2015 at 08:54 AM
This is an interesting historical use of viking runes as a secret code. Yes, the page is all in Finnish. But scroll to the middle. There's a picture of the Stockholm...Bruce Schneier From Schneier on Security | January 12, 2015 at 02:58 PM
A worldwide survey of writers affiliated with PEN shows a significant level of self-censoring. From the press release: The report's revelations, based on a survey...Bruce Schneier From Schneier on Security | January 12, 2015 at 07:41 AM
This just in: the threat of being eaten doesn't deter dumpling squid from having sex. As usual, you can also use this squid post to talk about the security stories...Bruce Schneier From Schneier on Security | January 9, 2015 at 06:46 PM
The FBI has provided more evidence: Speaking at a Fordham Law School cybersecurity conference Wednesday, Comey said that he has "very high confidence" in the FBI's...Bruce Schneier From Schneier on Security | January 9, 2015 at 07:24 AM
Good information on how Internet Explorer, Chrome, and Firefox store user passwords....Bruce Schneier From Schneier on Security | January 8, 2015 at 06:50 PM
This sort of thing is still very rare, but I fear it will become more common: ...hackers had struck an unnamed steel mill in Germany. They did so by manipulating...Bruce Schneier From Schneier on Security | January 8, 2015 at 04:16 PM