From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Imagine the government passed a law requiring all citizens to carry a tracking device. Such a law would immediately be found unconstitutional. Yet we all carryenormous...schneier From Schneier on Security | August 5, 2013 at 07:02 AM
I like watches with no numbers.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | August 2, 2013 at 06:59 PM
The Guardian discusses a new secret NSA program: XKeyscore. It's the desktop system that allows NSA agents to spy on anyone over the Internet in real time. It...schneier From Schneier on Security | August 2, 2013 at 04:20 PM
Good review of the strengths and weaknesses of Cryptography Engineering and Applied Cryptography.
Best -- at least to me -- is the list of things missing, which...schneier From Schneier on Security | August 2, 2013 at 03:28 PM
Searching on Google for a pressure cooker and backpacks got one family investigated by the police. More stories and comments.
This seems not to be the NSA eavesdropping...schneier From Schneier on Security | August 2, 2013 at 09:03 AM
Richard Bejtlich and Thomas Rid (author of the excellent book Cyber War Will Not Take Place) debate the cyberwar threat on the Economist website.
schneier From Schneier on Security | August 1, 2013 at 04:54 PM
The UK has banned researchers from revealing details of security vulnerabilities in car locks. In 2008, Phillips brought a similar suit against researchers who...schneier From Schneier on Security | August 1, 2013 at 07:37 AM
This is what happens when you're a security writer and you piss off the wrong people: they conspire to have heroin mailed to you, and then to tip off the police...schneier From Schneier on Security | July 31, 2013 at 07:25 AM
Research on why some neighborhoods feel safer:
Salesses and collaborators Katja Schechtner and César A. Hidalgo built an online comparison tool using Google Street...schneier From Schneier on Security | July 30, 2013 at 02:44 PM
This is a really clever social engineering attack against a bank-card holder:
It all started, according to the police, on the Saturday night where one of this...schneier From Schneier on Security | July 30, 2013 at 08:33 AM
The Obama Administration has a comprehensive "insider threat" program to detect leakers from within government. This is pre-Snowden. Not surprisingly, the combination...schneier From Schneier on Security | July 29, 2013 at 07:28 AM
It's "Sparky the Giant Squid."
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. schneier From Schneier on Security | July 26, 2013 at 05:27 PM
We interrupt this blog for some important inter-agency rivalry.
The fourth part is still uncracked, though.
Older links.schneier From Schneier on Security | July 26, 2013 at 02:19 PM
This is an interesting, if slightly disturbing, result:
In one experiment, we had subjects read two government policy papers from 1995, one from the State Department...schneier From Schneier on Security | July 26, 2013 at 07:25 AM
We're starting to see Internet companies talk about the mechanics of how the US government spies on their users. Here, a Utah ISP owner describes his experiences...schneier From Schneier on Security | July 25, 2013 at 01:27 PM
The story of people who poach and collect rare eggs, and the people who hunt them down.
Securing wildlife against poachers is a difficult problem, especially when...schneier From Schneier on Security | July 25, 2013 at 07:46 AM
Former NSA director Michael Hayden lists three effects of the Snowden documents:
"...the undeniable operational effect of informing adversaries of American intelligence's...schneier From Schneier on Security | July 24, 2013 at 03:52 PM
In an effort to lock the barn door after the horse has escaped, the NSA is implementing two-man control for sysadmins:
NSA chief Keith Alexander said his agency...schneier From Schneier on Security | July 24, 2013 at 07:18 AM
This is a succinct explanation of how the secrecy of the FISA court undermines trust.
Surveillance types make a distinction between secrecy of laws, secrecy of...schneier From Schneier on Security | July 23, 2013 at 02:00 PM
Marc Rotenberg of EPIC explains why he is suing the NSA in the Supreme Court.
And USA Today has a back and forth on the topic. schneier From Schneier on Security | July 23, 2013 at 07:21 AM