From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The article is in the context of the big Facebook lawsuit, but the part about identifying people by their writing style is interesting:
Recently, a team of computer...schneier From Schneier on Security | August 3, 2011 at 11:08 AM
Eventually, it will work. You'll be able to wear a camera that will automatically recognize someone walking towards you, and a microphone that will automatically...schneier From Schneier on Security | August 2, 2011 at 06:33 PM
Embedded system vulnerabilities in prisons:
Some of the same vulnerabilities that the Stuxnet superworm used to sabotage centrifuges at a nuclear plant in Iran...schneier From Schneier on Security | August 2, 2011 at 11:23 AM
It's a power-analysis attack, which makes it much harder to defend against. And since the attack model is an engineer trying to reverse-engineer the chip, it's...schneier From Schneier on Security | August 1, 2011 at 05:29 PM
Interesting paper: "Science Fiction Prototyping and Security Education: Cultivating Contextual and Societal Thinking in Computer Security Education and Beyond,"...schneier From Schneier on Security | August 1, 2011 at 11:03 AM
A 25-foot (or maybe 23-foot) giant squid was caught off the coast of Florida.
Also, I'm going to try something new. Let's use this weekly squid post to talk...schneier From Schneier on Security | July 29, 2011 at 09:22 PM
Interesting:
Security researcher Charlie Miller, widely known for his work on Mac OS X and Apple's iOS, has discovered an interesting method that enables him to...schneier From Schneier on Security | July 29, 2011 at 04:31 PM
ShareMeNot is a Firefox add-on for preventing tracking from third-party buttons (like the Facebook "Like" button or the Google "+1" button) until the user actually...schneier From Schneier on Security | July 28, 2011 at 07:02 PM
Good analysis:
Companies would be better off if they all provided meaningful privacy protections for consumers, but privacy is a collective action problem for...schneier From Schneier on Security | July 28, 2011 at 11:27 AM
Matt Blaze analyzes the 2010 U.S. Wiretap Report.
In 2000, government policy finally reversed course, acknowledging that encryption needed to become a critical...schneier From Schneier on Security | July 27, 2011 at 07:10 PM
Good article:
Halderman argued that secure software tends to come from companies that have a culture of taking security seriously. But it's hard to mandate, or...schneier From Schneier on Security | July 27, 2011 at 11:44 AM
In this demonstration, researchers photographed keys from 200 feet away and then made working copies. From the paper:
The access control provided by a physical...schneier From Schneier on Security | July 26, 2011 at 06:28 PM
No indication about how well it works:
The smartphone-based scanner, named Mobile Offender Recognition and Information System, or MORIS, is made by BI2 Technologies...schneier From Schneier on Security | July 26, 2011 at 11:51 AM
Sometimes too much security isn't good.
After observing children on playgrounds in Norway, England and Australia, Dr. Sandseter identified six categories of risky...schneier From Schneier on Security | July 25, 2011 at 06:06 PM
This is clever:
A few miles away across the Rio Grande, the FBI determined that Chavez and Gomez were using lookouts to monitor the SENTRI Express Lane at the...schneier From Schneier on Security | July 25, 2011 at 10:59 AM
Freakonomics asks: "Why has there been such a spike in hacking recently? Or is it merely a function of us paying closer attention and of institutions being more...schneier From Schneier on Security | July 21, 2011 at 11:07 AM
This is interesting:
As we work to protect our users and their information, we sometimes discover unusual patterns of activity. Recently, we found some unusual...schneier From Schneier on Security | July 20, 2011 at 11:23 AM
The police arrested sixteen suspected members of the Anonymous hacker group.
Whatever you may think of their politics, the group committed crimes and their members...schneier From Schneier on Security | July 19, 2011 at 07:50 PM