From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
See:
Last week, Metro Transit Police received a report from a rider about suspicious behavior at the L'Enfant Plaza station and on an Orange Line train to Vienna...schneier From Schneier on Security | December 27, 2010 at 12:12 PM
Interesting:
PlugBot is a hardware bot. It's a covert penetration testing device designed for use during physical penetration tests. PlugBot is a tiny computer...schneier From Schneier on Security | December 24, 2010 at 07:14 PM
Interesting interview with Viviane Reding, the vice president of the EU Justice Commission and head of privacy regulation:
The basic values in Europe are that...schneier From Schneier on Security | December 23, 2010 at 12:59 PM
He's more realistic than one normally hears:
So if they get through all those defenses, they get to Reagan [National Airport] over here, and they've got an underwear...schneier From Schneier on Security | December 22, 2010 at 06:27 PM
Good commentary:
I've said before and I'll say again, there are lots of possible approaches to threat modeling, and they all involve tradeoffs. I've commentedthe...schneier From Schneier on Security | December 22, 2010 at 01:15 PM
I've written a lot on the "War on Photography," where normal people are harassed as potential terrorists for taking pictures of things in public. This article...schneier From Schneier on Security | December 21, 2010 at 07:39 PM
Cyber War: The Next Threat to National Security and What to do About It by Richard Clarke and Robert Knake, HarperCollins, 2010.
Cyber War is a fast and enjoyable...schneier From Schneier on Security | December 21, 2010 at 01:23 PM
Interesting article from IEEE Spectrum:
During two years of deliberation by the National Academy's forensic science committee (of which I was a member), a troubling...schneier From Schneier on Security | December 20, 2010 at 05:48 PM
Impressive:
Designed for a class project while getting her degree at the Industrial Design Department at the University of Washington, Kaylene Kau has not only...schneier From Schneier on Security | December 17, 2010 at 10:48 PM
From the Journal of Transporation Security, "An evaluation of airport x-ray backscatter units based on image characteristics," by Leon Kaufman and Joseph W. Carlson...schneier From Schneier on Security | December 17, 2010 at 08:13 PM
It has been accused of it.
I doubt this is true. One, it's a very risky thing to do. And two, there are more than enough exploitable security vulnerabilities...schneier From Schneier on Security | December 17, 2010 at 04:49 PM
They can be used to scam Amazon Marketplace merchants:
What happens once our scammer is armed with his fake receipt? Well, many sellers on Amazon will ask you...schneier From Schneier on Security | December 17, 2010 at 12:28 PM
There’s really no such thing as security in the abstract. Security can only be defined in relation to something else. You’re secure from something or against something...Schneier From Schneier on Security | December 16, 2010 at 02:23 PM
They're causing problems:
A white bank robber in Ohio recently used a "hyper-realistic" mask manufactured by a small Van Nuys company to disguise himself as a...schneier From Schneier on Security | December 14, 2010 at 07:12 PM