From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
How unique is your browser? Can you be tracked simply by its characteristics? The EFF is trying to find out. Their site Panopticlick will measure the characteristics...schneier From Schneier on Security | January 29, 2010 at 09:29 AM
Today is World Privacy Day. (I know; it's odd to me, too.) You can celebrate by signing on to the Madrid Privacy Declaration, either as an individual or as an...schneier From Schneier on Security | January 28, 2010 at 12:21 PM
Still experimental:
The team propose using a particle accelerator to alternately smash ionised hydrogen molecules and deuterium ions into targets of carbon and...schneier From Schneier on Security | January 27, 2010 at 12:53 PM
This seems like a bad idea:
Police in the UK are planning to use unmanned spy drones, controversially deployed in Afghanistan, for the "routine" monitoring of...schneier From Schneier on Security | January 26, 2010 at 01:16 PM
The notion that U.S. intelligence should have "connected the dots," and caught Abdulmutallab, isn't going away. This is a typical example:
So you'd need comeresponds...schneier From Schneier on Security | January 25, 2010 at 01:09 PM
CNN.com just published an essay of mine on China's hacking of Google, an update of this essay.
schneier From Schneier on Security | January 24, 2010 at 02:43 PM
The video is worth watching, even if you don't speak German. The scanner caught a subject's cell phone and Swiss Army knife -- and the microphone he was wearing...schneier From Schneier on Security | January 22, 2010 at 01:28 PM
Interesting:
The bluestreak cleaner wrasse (Labroides dimidiatus) operates an underwater health spa for larger fish. It advertises its services with bright colours...schneier From Schneier on Security | January 20, 2010 at 07:26 PM
I don't know if this is real, but it seems perfectly reasonable that all of Facebook is stored in a huge database that someone with the proper permissions can access...schneier From Schneier on Security | January 19, 2010 at 03:59 PM
Interesting story:
The phone's ringer is a pretty simple thing: there's a coil, a magnet and a hammer controlled by the magnet that hits the gongs when there is...schneier From Schneier on Security | January 19, 2010 at 12:03 PM
Interesting:
Any facility executive involved in the design of a new building would agree that security is one important goal for the new facility. These days,...schneier From Schneier on Security | January 18, 2010 at 07:34 PM
I'm not sure what I can add to this: politically motivated attacks against Gmail from China. I've previously written about hacking from China. Shishir Nagaraja...schneier From Schneier on Security | January 18, 2010 at 06:39 PM
Clever ruse:
When he went to court for hearings, he could see the system was flawed. He would arrive on the twelfth floor in handcuffs and attached at the waist...schneier From Schneier on Security | January 18, 2010 at 12:57 PM
President Obama, in his speech last week, rightly focused on fixing the intelligence failures that resulted in Umar Farouk Abdulmutallab being ignored, rather than...schneier From Schneier on Security | January 16, 2010 at 01:13 PM