From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I don't see a lot written about security seals, despite how common they are. This article is a very basic overview of the technologies.schneier From Schneier on Security | February 4, 2013 at 07:43 PM
Interesting:
"It's really hard for the government to censor things when they don't understand the made-up words or meaning behind the imagery," said Kevin Lee,...schneier From Schneier on Security | February 4, 2013 at 12:39 PM
Webpage says that it's "the most effective lightweight, portable anchor around."
As usual, you can also use this squid post to talk about the security stories...schneier From Schneier on Security | February 1, 2013 at 10:40 PM
The Washington Post has the story:
The move, requested by the head of the Defense Department's Cyber Command, is part of an effort to turn an organization that...schneier From Schneier on Security | February 1, 2013 at 06:36 PM
Jared Diamond has an op-ed in the New York Times where he talks about how we overestimate rare risks and underestimate common ones. Nothing new here -- I and others...schneier From Schneier on Security | February 1, 2013 at 12:08 PM
Dan Farmer has an interesting paper (long version here; short version here) discussing the Baseboard Management Controller on your computer's motherboard:
The ...schneier From Schneier on Security | January 31, 2013 at 07:28 PM
All disruptive technologies upset traditional power balances, and the Internet is no exception. The standard story is that it empowers the powerless, but that's...schneier From Schneier on Security | January 31, 2013 at 01:09 PM
Back in 1999 when I formed Counterpane Internet Security, Inc., I popularized the notion that security was a combination of people, process, and technology. Back...schneier From Schneier on Security | January 30, 2013 at 06:20 PM
Lately I've been thinking a lot about power and the Internet, and what I call the feudal model of IT security that is becoming more and more pervasive. Basically...schneier From Schneier on Security | January 30, 2013 at 12:51 PM
I have written about complexity and security for over a decade now (for example, this from 1999). Here's the results of a survey that confirms this:
Results showed...schneier From Schneier on Security | January 29, 2013 at 12:32 PM
This story exemplifies everything that's wrong with our see-something-say-something war on terror: a perfectly innocent person on an airplane, a random person identifying...schneier From Schneier on Security | January 28, 2013 at 07:25 PM
This is fascinating:
Intuitively we understand that people surrounded by violence are more likely to be violent themselves. This isn't just some nebulous phenomenon...schneier From Schneier on Security | January 28, 2013 at 12:07 PM
Just the thing. (Note that this is different than the previous squid USB drive I blogged about.)
As usual, you can also use this squid post to talk about the...schneier From Schneier on Security | January 25, 2013 at 10:15 PM
This interview was conducted last month, at an artificial intelligence conference at Oxford. schneier From Schneier on Security | January 25, 2013 at 08:47 PM
Janesville, Wisconsin, has published information about repeated drunk driving offenders since 2010. The idea is that the public shame will reduce future incidents...schneier From Schneier on Security | January 25, 2013 at 01:03 PM
It's called stylometry, and it's based on the analysis of things like word choice, sentence structure, syntax and punctuation. In one experiment, researchers were...schneier From Schneier on Security | January 24, 2013 at 07:33 PM
Interesting:
The genetic data posted online seemed perfectly anonymous - strings of billions of DNA letters from more than 1,000 people. But all it took was some...schneier From Schneier on Security | January 24, 2013 at 12:48 PM
Ever since the launch of Kim Dotcom's file-sharing service, I have been asked about the unorthodox encryption and security system.
I have not reviewed it, andthis...schneier From Schneier on Security | January 23, 2013 at 06:55 PM
There has been an enormous amount written about the suicide of Aaron Swartz. This is primarily a collection of links, starting with those that use his death to...schneier From Schneier on Security | January 23, 2013 at 12:14 PM