From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
There's one piece of blowback that isn't being discussed -- aside from the fact that Snowden killed the chances of a liberal arts major getting a job at the DoD...schneier From Schneier on Security | June 17, 2013 at 11:13 AM
It's a novel behavior.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | June 14, 2013 at 09:53 PM
On April 1, I announced the Sixth Annual Movie Plot Threat Contest:
I want a cyberwar movie-plot threat. (For those who don't know, a movie-plot threat is a scare...schneier From Schneier on Security | June 14, 2013 at 05:20 PM
This paper (full paper behind paywall) -- from Environment International (2009) -- does a good job of separating fact from fiction:
Abstract: In recent yearsThis...schneier From Schneier on Security | June 14, 2013 at 12:15 PM
Ray Wang makes an important point about trust and our data:
This is the paradox. The companies contending to win our trust to manage our digital identities all...schneier From Schneier on Security | June 13, 2013 at 09:06 PM
Facebook regularly abuses the privacy of its users. Google has stopped supporting its popular RSS feeder. Apple prohibits all iPhone apps that are political orGame...schneier From Schneier on Security | June 13, 2013 at 04:34 PM
Here's a quick list of some of my older writings that are related to the current NSA spying documents:
"The Internet Is a Surveillance State ," 2013.
The importance...schneier From Schneier on Security | June 13, 2013 at 11:09 AM
Edward Snowden broke the law by releasing classified information. This isn't under debate; it's something everyone with a security clearance knows. It's written...schneier From Schneier on Security | June 12, 2013 at 11:16 AM
Interesting.
Crazy as these theories are, those propagating them are not -- they’re quite normal, in fact. But recent scientific research tells us this much: if...schneier From Schneier on Security | June 11, 2013 at 05:30 PM
Ignore the sensationalist headline. This article is a good summary of the need for trust in IT, and provides some ideas for how to enable more of it.
Virtually...schneier From Schneier on Security | June 11, 2013 at 11:21 AM
Yesterday, we learned that the NSA received all calling records from Verizon customers for a three-month period starting in April. That's everything except themetadata...schneier From Schneier on Security | June 10, 2013 at 11:12 AM
A squid comic about the importance of precise language in security warnings.
As usual, you can also use this squid post to talk about the security stories in the...schneier From Schneier on Security | June 7, 2013 at 09:35 PM
In this podcast interview, I talk about security, power, and the various things I have been thinking about recently.schneier From Schneier on Security | June 7, 2013 at 07:22 PM
Ars Technica gave three experts a 16,000-entry encrypted password file, and asked them to break them. The winner got 90% of them, the loser 62% -- in a few hours...schneier From Schneier on Security | June 7, 2013 at 11:41 AM
This study claims "terrorism has cost Pakistan around 33.02% of its real national income" between the years 1973 and 2008, or about 1% per year.
The St. Louis$100...schneier From Schneier on Security | June 6, 2013 at 10:58 AM
I'm at the Sixth Interdisciplinary Workshop on Security and Human Behavior (SHB 2013). This year we're in Los Angeles, at USC -- hosted by CREATE.
My description...schneier From Schneier on Security | June 5, 2013 at 12:20 PM
The FBI wants a new law that will make it easier to wiretap the Internet. Although its claim is that the new law will only maintain the status quo, it's reallyeverything...schneier From Schneier on Security | June 4, 2013 at 05:44 PM
Someday I need to write an essay on the security risks of secret algorithms that become part of our infrastructure. This paper gives one example of that. Could...schneier From Schneier on Security | June 4, 2013 at 11:19 AM