From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
It's a clever hack, but an old problem: the authentication in these sorts of normal operations isn't good enough to prevent abuse.
schneier From Schneier on Security | March 8, 2011 at 12:35 PM
"American Cryptography During the Cold War 1945-1989; Book IV: Cryptologic Rebirth 1981-1989." Document was first declassified in 2009. Here are some newly declassified...schneier From Schneier on Security | March 7, 2011 at 12:47 PM
Fascinating research summarized in The Economist. Basically, detecting dogs respond to unconscious cues from their handlers, and generate false alarms becausebomb...schneier From Schneier on Security | March 4, 2011 at 01:07 PM
Pickpockets in America are dying out. This is the bit I found interesting:
And perhaps most important, the centuries-old apprenticeship system underpinning organized...schneier From Schneier on Security | March 3, 2011 at 12:35 PM
"Reliably Erasing Data From Flash-Based Solid State Drives," by Michael Wei, Laura M. Grupp, Frederick E. Spada, and Steven Swanson.
Abstract: Reliably erasing...schneier From Schneier on Security | March 1, 2011 at 12:29 PM
One of the effects of writing a book is that I don't have the time to devote to other writing. So while I've been wanting to write about Anonymous vs HBGary, I...schneier From Schneier on Security | February 28, 2011 at 09:13 AM
This is a really good piece by Paul Roberts on Anonymous vs. HBGary: not the tactics or the politics, but what HBGary demonstrates about the IT security industry...schneier From Schneier on Security | February 25, 2011 at 12:14 PM
From Reason:
Know thy enemy is an ancient principle of warfare. And if America had
heeded it, it might have refrained from a full-scale "war" on terrorism whose...schneier From Schneier on Security | February 24, 2011 at 12:44 PM
Interesting story about a con man who conned the U.S. government, and how the government is trying to hide its dealings with him.
For eight years, government officials...schneier From Schneier on Security | February 22, 2011 at 01:21 PM
Interesting:
Squid can hear, scientists have confirmed. But they don't detect the changes in pressure associated with sound waves, like we do. They have another...schneier From Schneier on Security | February 18, 2011 at 10:17 PM
Not an electronic wallet, a physical one:
Virtually indestructible, the dunhill Biometric Wallet will open only with touch of your fingerprint.
It can be linked...schneier From Schneier on Security | February 18, 2011 at 07:45 PM
NIST has just defined two new versions of SHA-512. They're SHA-512/224 and SHA-512/256: 224- and 256-bit truncations of SHA-512 with a new IV. They've done this...schneier From Schneier on Security | February 18, 2011 at 12:22 PM
Recently declassified: "Historical Study: The National Security Agency Scientific Advisory Board 1952schneier From Schneier on Security | February 17, 2011 at 02:38 PM
Interesting article from Wired: "How a Remote Town in Romania Has Become Cybercrime Central."
schneier From Schneier on Security | February 16, 2011 at 12:26 PM
Roger Grimes has an article describing "the seven types of malicious hackers." I generally like taxonomies, and this one is pretty good.
He says the seven types...schneier From Schneier on Security | February 15, 2011 at 07:11 PM