From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
There is a lot of buzz on the the Internet about a talk at the Hack-in-the Box conference by Hugo Teso, who claims he can hack in to remotely control an airplane's...schneier From Schneier on Security | April 12, 2013 at 03:50 PM
Ed Felten has a really good blog post about the externalities that the recent Spamhaus DDOS attack exploited:
The attackers' goal was to flood Spamhaus or itswriting...schneier From Schneier on Security | April 10, 2013 at 05:46 PM
The last cryptanalyst at the Battle of Midway, Rear Admiral Donald "Mac" Showers, USN-Ret, passed away 19 October 2012. His interment at Arlington National Cemetery...schneier From Schneier on Security | April 10, 2013 at 11:40 AM
A real-world one-way function:
Alice and Bob procure the same edition of the white pages book for a particular town, say Cambridge. For each letter Alice wants...schneier From Schneier on Security | April 9, 2013 at 06:49 PM
Interesting article from the New Yorker.
I'm often asked what I think about bitcoins. I haven't analyzed the security, but what I have seen looks good. The real...schneier From Schneier on Security | April 9, 2013 at 11:05 AM
I hadn't heard of this term before, but it's an interesting one. The excerpt below is from an interview with Rebecca Solnit, author of A Paradise Built in Hell...schneier From Schneier on Security | April 8, 2013 at 06:30 PM
Interesting article about the perception of hackers in popular culture, and how the government uses the general fear of them to push for more power:
But theseoverzealous...schneier From Schneier on Security | April 8, 2013 at 11:34 AM
Page 18 of this thesis explains that squid fishing is done at night, and the lighting is so bright shows up in the satellite surveys of planetary lighting. This...schneier From Schneier on Security | April 5, 2013 at 09:08 PM
The U.S. Drug Enforcement Agency has complained (in a classified report, not publicly) that Apple's iMessage end-to-end encryption scheme can't be broken. On the...schneier From Schneier on Security | April 5, 2013 at 06:05 PM
Xkcd had a Skein collision competition. The contest is over -- Carnegie Mellon University won, with 384 (out of 1024) mismatched bits -- but it's explained here...schneier From Schneier on Security | April 5, 2013 at 11:35 AM
Whether it's Syria using Facebook to help identify and arrest dissidents or China using its "Great Firewall" to limit access to international news throughout the...schneier From Schneier on Security | April 3, 2013 at 12:29 PM
It's back, after a two-year hiatus. Terrorism is boring; cyberwar is in. Cyberwar, and its kin: cyber Pearl Harbor, cyber 9/11, cyber Armageddon. (Or make up...schneier From Schneier on Security | April 1, 2013 at 05:38 PM
I'm starting to think about my next book, which will be about power and the Internet -- from the perspective of security. My objective will be to describe current...schneier From Schneier on Security | April 1, 2013 at 11:07 AM
Really:
An unexploded bomb was found inside a squid when the fish was slaughtered at a fish market in Guangdong province.
Oddly enough, this doesn't seem to be...schneier From Schneier on Security | March 29, 2013 at 09:19 PM
Interesting article, "The Dangers of Surveillance," by Neil M. Richards, Harvard Law Review, 2013. From the abstract:
....We need a better account of the dangers...schneier From Schneier on Security | March 29, 2013 at 05:25 PM
This is a really clever attack on the RC4 encryption algorithm as used in TLS.
We have found a new attack against TLS that allows an attacker to recover a limited...schneier From Schneier on Security | March 29, 2013 at 11:59 AM
This is a story about a physicist who got taken in by an imaginary Internet girlfriend and ended up being arrested in Argentina for drug smuggling. Readers of...schneier From Schneier on Security | March 28, 2013 at 01:36 PM