From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This is cool:
The idea is simple. Psychologists have known for some years that it is almost impossible to speak when your words are replayed to you with a delay...schneier From Schneier on Security | March 12, 2012 at 11:35 AM
Yet another impressive Humboldt squid feat:
"We've seen them make really impressive dives up to a kilometre and a half deep, swimming straight through a zone where...schneier From Schneier on Security | March 9, 2012 at 10:01 PM
This essay uses the interesting metaphor of the man-in-the-middle attacker to describe cloud providers like Facebook and Google. Basically, they get in the middle...schneier From Schneier on Security | March 8, 2012 at 12:50 PM
The NSA has released its specification for a secure Android.
One of the interesting things it's requiring is that all data be tunneled through a secure VPN:
Inter...schneier From Schneier on Security | March 7, 2012 at 07:35 PM
Security is a tradeoff, a balancing act between attacker and defender. Unfortunately, that balance is never static. Changes in technology affect both sides. Society...schneier From Schneier on Security | March 7, 2012 at 12:14 PM
According to this document, received by EPIC under the Freedom of Information Act, the U.S. Department of Homeland Security is combing through the gazillions of...schneier From Schneier on Security | March 6, 2012 at 07:22 PM
Last week was the big RSA Conference in San Francisco: something like 20,000 people. From what I saw, these were the major themes on the show floor:
Companies...schneier From Schneier on Security | March 5, 2012 at 07:30 PM
Some squid can see aspects of light that are invisible to humans, including polarized light.
As usual, you can also use this squid post to talk about the security...schneier From Schneier on Security | March 2, 2012 at 10:41 PM
My big idea is a big question. Every cooperative system contains parasites. How do we ensure that society's parasites don't destroy society's systems?
It's all...schneier From Schneier on Security | March 2, 2012 at 04:11 PM
Great movie-plot threat:
Financial institutions depend on timing that is accurate to the microsecond on a global scale so that stock exchanges in, say, London...schneier From Schneier on Security | March 2, 2012 at 12:11 PM
The ACLU filed a FOIA request for a bunch of cables that Wikileaks had already released complete versions of. This is what happened:
The agency released redacted...schneier From Schneier on Security | March 1, 2012 at 07:32 PM
Good essay. Nothing I haven't said before, but it's good to hear it from someone with a widely different set of credentials than I have.schneier From Schneier on Security | February 29, 2012 at 01:11 PM
I was asked to talk about five books related to privacy.
You're best known as a security expert but our theme today is "trust". How would you describe the connection...schneier From Schneier on Security | February 27, 2012 at 06:30 PM
A U.S. Federal Court aruled that it is unconstitutional for the police to force someone to decrypt their laptop computer:
Thursdayschneier From Schneier on Security | February 27, 2012 at 11:49 AM
There's a new study that shows that squid are faster in the air than in the water.
Squid of many species have been seen to 'fly' using the same jet-propulsion...schneier From Schneier on Security | February 24, 2012 at 10:08 PM