From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Not a lot of details:
ElcomSoft research shows that image metadata and image data are processed independently with a SHA-1 hash function. There are two 160-bit...schneier From Schneier on Security | May 3, 2011 at 12:54 PM
Earlier this month, the FBI seized control of the Coreflood botnet and shut it down:
According to the filing, ISC, under law enforcement supervision, planned to...schneier From Schneier on Security | May 2, 2011 at 10:30 AM
This is a surprise. My TED talk made it to the website. It's a surprise because I didn't speak at TED. I spoke last year at a regional TED event, TEDxPSU. And...schneier From Schneier on Security | April 29, 2011 at 07:45 PM
Good paper: "Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy," by Jerry Brito and Tate Watkins.
Over the past two years there has...schneier From Schneier on Security | April 28, 2011 at 11:56 AM
It's standard sociological theory that a group experiences social solidarity in response to external conflict. This paper studies the phenomenon in the Unitednew...schneier From Schneier on Security | April 27, 2011 at 02:10 PM
As I've written before, I run an open WiFi network. It's stories like these that may make me rethink that.
The three stories all fall along the same theme: a...schneier From Schneier on Security | April 26, 2011 at 11:59 AM
Clever:
Khan and his colleagues have written software that ensures clusters of a file, rather than being positioned at the whim of the disc drive controller chip...schneier From Schneier on Security | April 25, 2011 at 10:24 AM
Okay, this is a little weird:
This year's Earth Day will again include the celebrated "squid printing" activity with two big, beautiful Pacific Humboldt squidagain...schneier From Schneier on Security | April 22, 2011 at 09:30 PM
The CIA has just declassified six (1, 2, 3, 4, 5, and 6) documents about World War I security techniques. (The media is reporting they're CIA documents, but the...schneier From Schneier on Security | April 21, 2011 at 11:38 AM
A criminal gang is stealing truckloads of food:
Late last month, a gang of thieves stole six tractor-trailer loads of tomatoes and a truck full of cucumbers from...schneier From Schneier on Security | April 20, 2011 at 11:52 AM
Interesting blog post on the security costs for the $50B Air Force bomber program -- estimated to be $8B. This isn't all computer security, but the original article...schneier From Schneier on Security | April 20, 2011 at 11:31 AM
Increasingly, chains of evidence include software steps. It's not just the RIAA suing people -- and getting it wrong -- based on automatic systems to detect and...schneier From Schneier on Security | April 19, 2011 at 11:47 AM
We know it's prevalent, but there's some new information:
Secret U.S. State Department cables, obtained by WikiLeaks and made available to Reuters by a third party...schneier From Schneier on Security | April 18, 2011 at 02:33 PM
Back in 1998, I wrote:
Anyone, from the most clueless amateur to the best cryptographer, can create an algorithm that he himself can't break.
In 2004, Cory Doctorow...schneier From Schneier on Security | April 15, 2011 at 06:45 PM
In Japan, lots of people -- especially older people -- keep their life savings in cash in their homes. (The country's banks pay very low interest rates, so the...schneier From Schneier on Security | April 15, 2011 at 11:49 AM
One of the things I am writing about in my new book is how security equilibriums change. They often change because of technology, but they sometimes change because...schneier From Schneier on Security | April 14, 2011 at 11:36 AM