From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Iran blocks Tor, and Tor releases a workaround on the same day.
How did the filter work technically? Tor tries to make its traffic look like a web browser talking...schneier From Schneier on Security | September 26, 2011 at 09:31 AM
There's evidence of indiscriminate fertilization in deep-sea squid. They mate with any other squid the encounter, male or female.
This unusual behaviour, they...schneier From Schneier on Security | September 23, 2011 at 09:28 PM
It's the Browser Exploit Against SSL/TLS Tool, or BEAST:
The tool is based on a blockwise-adaptive chosen-plaintext attack, a man-in-the-middle approach that injects...schneier From Schneier on Security | September 23, 2011 at 06:37 PM
On Monday I participated a panel at the Information Systems Forum in Berlin. The moderator asked us what the top three emerging threats were in cyberspace. I...schneier From Schneier on Security | September 23, 2011 at 11:17 AM
This proposal is worth thinking about.
Clause 1. If you deliver software with complete and buildable source code and a license that allows disabling any functionality...schneier From Schneier on Security | September 23, 2011 at 10:22 AM
The long-standing ANZUS military treaty now includes cyberspace attacks:
According to Reuters, the decision was made in discussions between the two countries this...schneier From Schneier on Security | September 22, 2011 at 12:09 PM
Risks of teen driving:
For more than a decade, California and other states have kept their newest teen drivers on a tight leash, restricting the hours when they...schneier From Schneier on Security | September 21, 2011 at 11:58 AM
The interesting thing about this attack is how it abuses a variety of different security systems.
Investigations revealed that the syndicate members had managed...schneier From Schneier on Security | September 20, 2011 at 11:36 AM
As you'd expect, it's not very good:
But this measure [Turnitin] captures only the most flagrant form of plagiarism, where passages are copied from one document...schneier From Schneier on Security | September 19, 2011 at 11:35 AM
I've already written how it is possible to detect words and phrases in encrypted VoIP calls. Turns out it's possible to detect speakers as well:
Abstract: Most...schneier From Schneier on Security | September 16, 2011 at 05:31 PM
It's an easy attack. Register a domain that's like your target except for a typo. So it would be countrpane.com instead of counterpane.com, or mailcounterpane...schneier From Schneier on Security | September 16, 2011 at 10:22 AM
New paper: Dengpan Liu, Yonghua Ji, and Vijay Mookerjee (2011), "Knowledge Sharing and Investment Decisions in Information Security," Decision Support Systems,...schneier From Schneier on Security | September 15, 2011 at 05:45 PM
It's been a long hard year, but the book is almost finished. It's certainly the most difficult book I've ever written, mostly because I've had to learn academic...schneier From Schneier on Security | September 15, 2011 at 11:52 AM
This is an interesting study on cultural differences in risk tolerance.
The Cultures of Risk Tolerance
Abstract: This study explores the links between culture...schneier From Schneier on Security | September 14, 2011 at 07:02 PM
There's a lot here that's worth watching. He talks about expanding behavioral detection. He talks about less screening for "trusted travelers."
So, what do the...schneier From Schneier on Security | September 14, 2011 at 11:55 AM
I've written about this before: the human brain just isn't suited to finding rare anomalies in a screening situation.
The Role of the Human Operator in Image-Based...schneier From Schneier on Security | September 13, 2011 at 06:46 PM
I've been posting about a lot of academic articles of late, because that's what I'm reading. Here's another.
Clinton M. Jenkin (2006), Risk Perception and Terrorism...schneier From Schneier on Security | September 13, 2011 at 11:38 AM