From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
On a NIST-sponsored hash function mailing list, Jesse Walker (from Intel; also a member of the Skein team) did some back-of-the-envelope calculations to estimate...schneier From Schneier on Security | October 5, 2012 at 06:24 PM
The folks at F-Secure have plotted ZeroAccess infections across the U.S. and across Europe. It's interesting to see, but I'm curious to see the data normalized...schneier From Schneier on Security | October 5, 2012 at 12:44 PM
NIST has just announced that Keccak has been selected as SHA-3.
It's a fine choice. I'm glad that SHA-3 is nothing like the SHA-2 family; something completely...schneier From Schneier on Security | October 2, 2012 at 09:50 PM
Among other findings in this CBO report:
Funding for homeland security has dropped somewhat from its 2009 peak of $76 billion, in inflation-adjusted terms; funding...schneier From Schneier on Security | October 2, 2012 at 02:41 PM
This story sounds pretty scary:
Developed by Robert Templeman at the Naval Surface Warfare Center in Indiana and a few buddies from Indiana University, PlaceRader...schneier From Schneier on Security | October 1, 2012 at 11:52 AM
A proposal to replace cryptography's Alice and Bob with Sita and Rama:
Any book on cryptography invariably involves the characters Alice and Bob. It is always...schneier From Schneier on Security | September 27, 2012 at 02:10 PM
Kay Hamacher and Stefan Katzenbeisser, "Public Security: Simulations Need to Replace Conventional Wisdom," New Security Paradigms Workshop, 2011.
Abstract: Is...schneier From Schneier on Security | September 26, 2012 at 12:11 PM
NIST is about to announce the new hash algorithm that will become SHA-3. This is the result of a six-year competition, and my own Skein is one of the five remaining...schneier From Schneier on Security | September 24, 2012 at 11:59 AM
Pretty photo of firefly squid beached along a coast. I've written about firefly squid before.
As usual, you can also use this squid post to talk about the security...schneier From Schneier on Security | September 21, 2012 at 09:30 PM
I usually don't post reviews of Liars and Outliers -- they're all here -- but I am particularly proud of this one.schneier From Schneier on Security | September 21, 2012 at 08:29 PM
Interesting article on how the NSA is approaching risk in the era of cool consumer devices. There's a discussion of the president's network-disabled iPad, and...schneier From Schneier on Security | September 20, 2012 at 11:02 AM
An analysis of 3.4 million four-digit PINs. ("1234" is the most common: 10.7% of all PINs. The top 20 PINs are 26.8% of the total. "8068" is the least common...schneier From Schneier on Security | September 19, 2012 at 05:31 PM