From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
It's an acoustic bluegrass band.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | February 10, 2012 at 10:04 PM
Interesting paper: Paul J. Freitas (2012), "Passenger aviation security, risk management, and simple physics," Journal of Transportation Security.
Abstract: Since...schneier From Schneier on Security | February 9, 2012 at 12:10 PM
The error rate for hand-counted ballots is about two percent.
All voting systems have nonzero error rates. This doesn't surprise technologists, but does surprise...schneier From Schneier on Security | February 7, 2012 at 11:53 AM
In 2005, I wrote an essay called "The Failure of Two-Factor Authentication," where I predicted that attackers would get around multi-factor authentication systems...schneier From Schneier on Security | February 6, 2012 at 07:23 PM
It's called Squid.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | February 3, 2012 at 10:18 PM
Reuters discovered the information:
The VeriSign attacks were revealed in a quarterly U.S. Securities and Exchange Commission filing in October that followed new...schneier From Schneier on Security | February 3, 2012 at 04:49 PM
Really good article on the huge incarceration rate in the U.S., its causes, its effects, and its value:
Over all, there are now more people under "correctional...schneier From Schneier on Security | February 2, 2012 at 03:04 PM
Brian C. Kalt (2012), "The Idaho Loophole," Georgetown Law Journal, Vol. 93, No. 2.
Abstract: This article argues that there is a 50-square-mile swath of Idaho...schneier From Schneier on Security | February 1, 2012 at 12:05 PM
The storyline:
TSA screener finds two pipes in passenger's bags.
Screener determines that they're not a threat.
Screener confiscates them anyway, because of...schneier From Schneier on Security | January 31, 2012 at 11:03 PM
Some errors in forensic science may be the result of the biases of the medical examiners:
Though they cannot prove it, Dr Dror and Dr Hampikian suspect the difference...schneier From Schneier on Security | January 31, 2012 at 05:13 PM
According to my publisher, the book was printed last week and the warehouse is shipping orders to booksellers today. Amazon is likely to start shipping books on...schneier From Schneier on Security | January 30, 2012 at 07:59 PM
Does this story make sense to anyone?
The Department of Homeland Security flagged him as a potential threat when he posted an excited tweet to his pals about his...schneier From Schneier on Security | January 30, 2012 at 04:52 PM
This was pretty good, I thought:
However, it may be difficult to write military doctrine for many aspects of cyberconflict that are truly revolutionary. Here are...schneier From Schneier on Security | January 30, 2012 at 12:02 PM
Interesting article from the New York Times on password sharing as a show of affection.
"It's a sign of trust," Tiffany Carandang, a high school senior in Sandiscusses...schneier From Schneier on Security | January 27, 2012 at 12:39 PM
Readers of this blog will know that I like the works of Max Abrams, and regularly blog them. He has a new paper (full paper behind paywall) in Defence and Peace...schneier From Schneier on Security | January 26, 2012 at 04:36 PM