From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
People intent on preventing a Moscow-style terrorist attack against the New York subway system are proposing a range of expensive new underground security measures...schneier From Schneier on Security | April 7, 2010 at 01:52 PM
In January, Facebook Chief Executive, Mark Zuckerberg, declared the age of privacy to be over. A month earlier, Google Chief Eric Schmidt expressed a similar sentiment...schneier From Schneier on Security | April 6, 2010 at 12:47 PM
This seems like science fiction to me:
The camera uses the same "red eye" effect of from camera flashes to project it hundreds of meters, allowing it to identify...schneier From Schneier on Security | April 5, 2010 at 06:30 PM
It'll protect your secrets from your kid sister, unless she's smarter than that.
Looks cool, though.
schneier From Schneier on Security | April 2, 2010 at 05:30 PM
This is a little hokey, but better them than the NSA:
The National Cybersecurity Awareness Campaign Challenge Competition is designed to solicit ideas from industry...schneier From Schneier on Security | April 2, 2010 at 11:14 AM
Is MI5 playing a joke on us?
Female homicide bombers are being fitted with exploding breast implants which are almost impossible to detect, British spies havecould...schneier From Schneier on Security | April 1, 2010 at 06:33 PM
Once upon a time, men and women throughout the land lived in fear. This caused them to do foolish things that made them feel better temporarily, but didn't make...schneier From Schneier on Security | April 1, 2010 at 11:24 AM
The New York Times has an article about cameras in the subways. The article is all about how horrible it is that the cameras don't work:
Moreover, nearly half...schneier From Schneier on Security | March 31, 2010 at 06:24 PM
Information technology is increasingly everywhere, and it's the same technologies everywhere. The same operating systems are used in corporate and government computers...schneier From Schneier on Security | March 31, 2010 at 11:54 AM
According to new research:
The researchers found that subjects assigned leadership roles were buffered from the negative effects of lying. Across all measures,...schneier From Schneier on Security | March 30, 2010 at 06:59 PM
Nice essay:
Of course, we know why he's really there. He's really there so that if the bridge is destroyed by terrorists, the authorities can appear on the television...schneier From Schneier on Security | March 30, 2010 at 11:06 AM
The amazing story of Gerald Blanchard.
Thorough as ever, Blanchard had spent many previous nights infiltrating the bank to do recon or to tamper with the locks...schneier From Schneier on Security | March 29, 2010 at 06:48 PM
A potential new forensic:
To determine how similar a person's fingertip bacteria are to bacteria left on computer keys, the team took swabs from three computer...schneier From Schneier on Security | March 29, 2010 at 12:15 PM
Eerily accurate:
Catchy one-liner ("interesting," with link):
In this part of the blog post, Bruce quotes something from the article he links to in the catchy...schneier From Schneier on Security | March 26, 2010 at 06:16 PM
Modern photocopy machines contain hard drives that often have scans of old documents.
This matters when an office disposes of an old copier. It also matters if...schneier From Schneier on Security | March 26, 2010 at 04:27 PM
Nice paper: "Side-Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow," by Shuo Chen, Rui Wang, XiaoFeng Wang, and Kehuan Zhang.
Abstract.explains...schneier From Schneier on Security | March 26, 2010 at 12:18 PM