From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Lt. Gen. Keith Alexander, the current Director of NSA, has been nominated to head the US Cyber Command. Last week Alexander appeared before the Senate Armed Services...schneier From Schneier on Security | April 19, 2010 at 06:26 PM
In 2006, writing about future threats on privacy, I described a life recorder:
A "life recorder" you can wear on your lapel that constantly records is still abeen...schneier From Schneier on Security | April 19, 2010 at 11:30 AM
CCTV cameras in Moscow have been accused of streaming prerecorded video instead of live images.
What I can't figure out is why? To me, it seems easier for the...schneier From Schneier on Security | April 16, 2010 at 05:46 PM
Last weekend I was in New York, and saw posters on the subways warning people about real guns painted to look like toys. And today I find these pictures from the...schneier From Schneier on Security | April 16, 2010 at 11:28 AM
Interesting study: "Patients, Pacemakers, and Implantable Defibrillators: Human Values and Security for Wireless Implantable Medical Devices," Tamara Denning,Abstract...schneier From Schneier on Security | April 15, 2010 at 06:55 PM
This idea, by Stuart Schechter at Microsoft Research, is -- I think -- clever:
Abstract: Implantable medical devices, such as implantable cardiac defibrillators...schneier From Schneier on Security | April 15, 2010 at 11:43 AM
Fifteen years ago, Matt Blaze wrote an Afterword to my book Applied Cryptography. Here are his current thoughts on that piece of writing.
schneier From Schneier on Security | April 14, 2010 at 06:30 PM
Chris Hoofnagle has a new paper: "Internalizing Identity Theft." Basically, he shows that one of the problems is that lenders extend credit even when credit applications...schneier From Schneier on Security | April 14, 2010 at 11:57 AM
John Adams argues that our irrationality about comparative risks depends on the type of risk:
With "pure" voluntary risks, the risk itself, with its associated...schneier From Schneier on Security | April 13, 2010 at 06:18 PM
Nice analysis by John Mueller and Mark G. Stewart:
There is a general agreement about risk, then, in the established regulatory practices of several developed...schneier From Schneier on Security | April 13, 2010 at 08:54 AM
Says Matt Blaze:
A decade ago, I observed that commercial certificate authorities protect you from anyone from whom they are unwilling to take money. That turns...schneier From Schneier on Security | April 12, 2010 at 06:32 PM
An NYU student has been reverse-engineering facial recognition algorithms to devise makeup patterns to confuse face recognition software.
schneier From Schneier on Security | April 12, 2010 at 11:08 AM
Last month at the RSA Conference, I gave a talk titled "Security, Privacy, and the Generation Gap." It was pretty good, but it was the first time I gave that talk...schneier From Schneier on Security | April 9, 2010 at 05:55 PM
New cryptanalysis of the proprietrary encryption algorithm used in the Digital Enhanced Cordless Telecommunications (DECT) standard for cordless phones.
Abstract...schneier From Schneier on Security | April 8, 2010 at 06:05 PM
Air marshals are being arrested faster than air marshals are making arrests.
Actually, there have been many more arrests of Federal air marshals than that story...schneier From Schneier on Security | April 8, 2010 at 11:22 AM
Any ideas?
At a news conference at the National Press Club, WikiLeaks said it had acquired the video from whistle-blowers in the military and viewed it after breaking...schneier From Schneier on Security | April 7, 2010 at 06:37 PM