From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In the short story "A Wayside Comedy," published in 1888 in Under the Deodars, Kipling wrote:
You must remember, though you will not understand, that all lawsmy...schneier From Schneier on Security | August 16, 2012 at 06:52 PM
This is an analysis of Apple's disk encryption program, FileVault 2, that first appeared in the Lion operating system. Short summary: they couldn't break it....schneier From Schneier on Security | August 16, 2012 at 11:49 AM
Good post, not because it picks on Tesco but because it's filled with good advice on how not to do it wrong.schneier From Schneier on Security | August 15, 2012 at 07:23 PM
Excellent blog post by Valerie Aurora about sexual harassment at the DefCon hackers conference. Aside from the fact that this is utterly reprehensible behavior...schneier From Schneier on Security | August 15, 2012 at 01:57 PM
Liars and Outliers has been out since late February, and while it's selling great, I'd like it to sell better. So I have a special offer for my regular readers...schneier From Schneier on Security | August 15, 2012 at 10:59 AM
In Liars and Outliers, I talk a lot about social norms and when people follow them. This research uses survival data from shipwrecks to measure it.
The authors...schneier From Schneier on Security | August 14, 2012 at 06:16 PM
I'm late writing about this one. Cryptocat is a web-based encrypted chat application. After Wired published a pretty fluffy profile on the program and its author...schneier From Schneier on Security | August 14, 2012 at 11:00 AM
This is kind of a rambling essay on the need to spend more on infrastructure, but I was struck by this paragraph:
Here's a news flash: There are some events that...schneier From Schneier on Security | August 13, 2012 at 05:41 PM
Stuart Baker calls them "proxy talks" because they're not government to government, but it's a start.schneier From Schneier on Security | August 13, 2012 at 11:57 AM
The sex life of the dumpling squid.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | August 10, 2012 at 09:02 PM
Sure, stories like this are great fun, but I don't think it's much of a security concern. Terrorists can't build a plot around random occasional security failures...schneier From Schneier on Security | August 10, 2012 at 10:51 AM
This is the latest in the arms race between spoofing GPS signals and detecting spoofed GPS signals.
Unfortunately, the countermeasures all seem to be patent pending...schneier From Schneier on Security | August 9, 2012 at 11:32 AM
They were able to hack into government websites:
The gang’s USP, and the reason it could charge up to 10,000 yuan (£1,000) per certificate, was that it could hack...schneier From Schneier on Security | August 8, 2012 at 06:04 PM
A hacker can social-engineer his way into your cloud storageand delete everything you have.
It turns out, a billing address and the last four digits of a credit...schneier From Schneier on Security | August 8, 2012 at 11:31 AM
Ohio State University Law Professor Peter Swire testifies before Congress on the inadequacy of industry self-regulation to protect privacy.schneier From Schneier on Security | August 7, 2012 at 06:45 PM
Interesting article on using risk-limiting auditing in determining if an election's results are likely to be valid. The risk, in this case, is in the chance of...schneier From Schneier on Security | August 7, 2012 at 12:14 PM
Some things never change. Thirteen years ago, Mudge and I published a paper breaking Microsoft's PPTP protocol and the MS-CHAP authentication system. I haven't...schneier From Schneier on Security | August 6, 2012 at 04:22 PM