From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The Syrian Electronic Army attacked again this week, compromising the websites of the New York Times, Twitter, the Huffington Post, and others.
Political hacking...schneier From Schneier on Security | September 3, 2013 at 02:45 PM
We're afraid of risk. It's a normal part of life, but we're increasingly unwilling to accept it at any level. So we turn to technology to protect us. The problem...schneier From Schneier on Security | September 3, 2013 at 07:41 AM
The moral is that NSA surveillance overreach has been going on for a long, long time.schneier From Schneier on Security | September 2, 2013 at 07:40 AM
Pretty.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | August 30, 2013 at 05:40 PM
I don't like stories about the personalities in the Snowden affair, because it detracts from the NSA and the policy issues. But I'm a sucker for operational security...schneier From Schneier on Security | August 30, 2013 at 02:54 PM
If there's any confirmation that the U.S. government has commandeered the Internet for worldwide surveillance, it is what happened with Lavabit earlier this month...schneier From Schneier on Security | August 30, 2013 at 07:12 AM
Assume it's really true that the NSA has no idea what documents Snowden took, and that they wouldn't even know he'd taken anything if he hadn't gone public. The...schneier From Schneier on Security | August 29, 2013 at 02:13 PM
New paper on the FTC and its actions to protect privacy:
Abstract: One of the great ironies about information privacy law is that the primary regulation of privacy...schneier From Schneier on Security | August 29, 2013 at 01:28 PM
This research project by Brandon Wiley -- the tool is called "Dust" -- looks really interesting. Here's the description of his Defcon talk:
Abstract: The greatest...schneier From Schneier on Security | August 28, 2013 at 08:07 AM
There's an article from Wednesday's Wall Street Journal that gives more details about the NSA's data collection efforts.
The system has the capacity to reach roughly...schneier From Schneier on Security | August 27, 2013 at 02:19 PM
Last Sunday, David Miranda was detained while changing planes at London Heathrow Airport by British authorities for nine hours under a controversial British law...schneier From Schneier on Security | August 27, 2013 at 07:39 AM
Ever since Edward Snowden walked out of a National Security Agency facility in May with electronic copies of thousands of classified documents, the finger-pointing...schneier From Schneier on Security | August 26, 2013 at 02:19 PM
Orin Kerr envisions what the ECPA should look like today:
Abstract: In 1986, Congress enacted the Electronic Communications Privacy Act (ECPA) to regulate government...schneier From Schneier on Security | August 26, 2013 at 08:02 AM
Interesting:
Structural colors rely exclusively on the density and shape of the material rather than its chemical properties. The latest research from the UCSB...schneier From Schneier on Security | August 23, 2013 at 05:00 PM
Interesting paper: "The Banality of Security: The Curious Case of Surveillance Cameras," by Benjamin Goold, Ian Loader, and Angélica Thumala (full paper is behind...schneier From Schneier on Security | August 23, 2013 at 02:23 PM
Last weekend, a Texas couple apparently discovered that the electronic baby monitor in their children's bedroom had been hacked. According to a local TV station...schneier From Schneier on Security | August 23, 2013 at 07:00 AM
There have been a bunch of articles about an information theory paper with vaguely sensational headlines like "Encryption is less secure than we thought" and "Research...schneier From Schneier on Security | August 21, 2013 at 08:01 AM
Not much surprising in this new survey.
Many teens ages 12-17 report that they usually figure out how to manage content sharing and privacy settings on their own...schneier From Schneier on Security | August 20, 2013 at 08:10 AM