From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The Brazilian television show "Fantastico" has exposed an NSA training presentation that discusses how the agency runs man-in-the-middle attacks on the Internet...schneier From Schneier on Security | September 13, 2013 at 07:23 AM
I'm quoted (also here) as using this analogy to explain how IT companies will be damaged by the news that they've been collaborating with the NSA:
"How would it...schneier From Schneier on Security | September 12, 2013 at 02:34 PM
Ed Felten has an excellent essay on the damage caused by the NSA secretly breaking the security of Internet systems:
In security, the worst case -- the thing you...schneier From Schneier on Security | September 12, 2013 at 07:05 AM
This blog post is well worth reading, and not just because Johns Hopkins University asked him to remove it, and then backed down a few hours later. schneier From Schneier on Security | September 11, 2013 at 12:53 PM
When Apple bought AuthenTec for its biometrics technology -- reported as one of its most expensive purchases -- there was a lot of speculation about how the company...schneier From Schneier on Security | September 11, 2013 at 07:43 AM
The TSA does not have to tell the truth:
Can the TSA (or local governments as directed by the TSA) lie in response to a FOIA request?
Sure, no problem! Evenclassified...schneier From Schneier on Security | September 10, 2013 at 07:55 AM
Big-government secrets require a lot of secret-keepers. As of October 2012, almost 5m people in the US have security clearances, with 1.4m at the top-secret level...schneier From Schneier on Security | September 9, 2013 at 02:30 PM
People commented about a point I made in a recent essay:
In the months after 9/11, so many people chose to drive instead of fly that the resulting deaths dwarfed...schneier From Schneier on Security | September 9, 2013 at 07:20 AM
The incomplete specimen weighs over 160 lbs. And here's a map of squid spottings.
As usual, you can also use this squid post to talk about the security stories...schneier From Schneier on Security | September 6, 2013 at 05:50 PM
I've recently seen two articles speculating on the NSA's capability, and practice, of spying on members of Congress and other elected officials. The evidence is...schneier From Schneier on Security | September 6, 2013 at 12:08 PM
The latest Snowden document is the US intelligence "black budget." There's a lot of information in the few pages the Washington Post decided to publish, including...schneier From Schneier on Security | September 6, 2013 at 07:30 AM
The new Snoden revelations are explosive. Basically, the NSA is able to decrypt most of the Internet. They're doing it primarily by cheating, not by mathematics...schneier From Schneier on Security | September 5, 2013 at 03:46 PM
Money reduces trust in small groups, but increases it in larger groups. Basically, the introduction of money allows society to scale.
The team devised an experiment...schneier From Schneier on Security | September 5, 2013 at 02:57 PM
I keep getting alerts of new issues, but there are rarely articles I find interesting.schneier From Schneier on Security | September 5, 2013 at 01:13 PM
I jacked a visitor's badge from the Eisenhower Executive Office Building in Washington, DC, last month. The badges are electronic; they're enabled when you check...schneier From Schneier on Security | September 5, 2013 at 09:32 AM
NIST's John Kelsey gave an excellent talk on the history, status, and future of the SHA-3 hashing standard. The slides are online.schneier From Schneier on Security | September 4, 2013 at 01:08 PM
Bessemer Venture Partners partner David Cowan has an interesting article on the opportunities for cloud security companies.
Richard Stiennnon, an industry analyst...schneier From Schneier on Security | September 4, 2013 at 08:02 AM