From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Nice essay:
The biological world is also open source in the sense that threats are always present, largely unpredictable, and always changing. Because of this,...schneier From Schneier on Security | June 27, 2013 at 07:34 AM
Interesting article on the history of, and the relationship between, secrecy and privacy
As a matter of historical analysis, the relationship between secrecy and...schneier From Schneier on Security | June 26, 2013 at 05:35 PM
Ron Beckstrom gives a talk (video and transcript) about "Mutually Assured Destruction," "Mutually Assured Disruption," and "Mutually Assured Dependence."
schneier From Schneier on Security | June 25, 2013 at 11:24 AM
Pretty scary -- and cool.
Remember, it's not any one thing that's worrisome; it's everything together.schneier From Schneier on Security | June 24, 2013 at 10:31 AM
It's not good.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
schneier From Schneier on Security | June 21, 2013 at 09:28 PM
Today, the United States is conducting offensive cyberwar actions around the world.
More than passively eavesdropping, we're penetrating and damaging foreign networks...schneier From Schneier on Security | June 21, 2013 at 04:43 PM
Lessons from Japan's response to Aum Shinrikyo:
Yet what's as remarkable as Aum's potential for mayhem is how little of it, on balance, they actually caused. Don't...schneier From Schneier on Security | June 21, 2013 at 11:25 AM
This article, on the cozy relationship between the commercial personal-data industry and the intelligence industry, has new information on the security of Skype...schneier From Schneier on Security | June 20, 2013 at 07:42 PM
A fine piece: "A Love Letter to the NSA Agent who is Monitoring my Online Activity."
A similar sentiment is expressed in this video.schneier From Schneier on Security | June 20, 2013 at 05:19 PM
Companies allow US intelligence to exploit vulnerabilities before it patches them:
Microsoft Corp. (MSFT), the world's largest software company, provides intelligence...schneier From Schneier on Security | June 20, 2013 at 11:04 AM
I have signed a petition calling on the NSA to "suspend its domestic surveillance program pending public comment." This is what's going on:
In a request today...schneier From Schneier on Security | June 19, 2013 at 07:18 PM
On his blog, Scott Adams suggests that it might be possible to identify sociopaths based on their interactions on social media.
My hypothesis is that scienceknow...schneier From Schneier on Security | June 19, 2013 at 04:19 PM
John Mueller and Mark Stewart ask the important questions about the NSA surveillance programs: why were they secret, what have they accomplished, and what do they...schneier From Schneier on Security | June 19, 2013 at 11:24 AM
Facebook (here), Apple (here), and Yahoo (here) have all released details of US government requests for data. They each say that they've turned over user datamuch...schneier From Schneier on Security | June 18, 2013 at 09:00 PM
In an excellent essay about privacy and secrecy, law professor Daniel Solove makes an important point. There are two types of NSA secrecy being discussed. It's...schneier From Schneier on Security | June 18, 2013 at 04:02 PM
Interesting speculation that the NSA is storing everyone's phone calls, and not just metadata. Definitely worth reading.
I expressed skepticism about this just...schneier From Schneier on Security | June 18, 2013 at 11:57 AM
This finally explains what John Ellis was talking about in "The Possibility of Non-Secret Encryption" when he dropped a tantalizing hint about wartime work at Bell...schneier From Schneier on Security | June 17, 2013 at 05:47 PM