From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Earlier this month, Joanna Rutkowska implemented the "evil maid" attack against TrueCrypt. The same kind of attack should work against any whole-disk encryption...schneier From Schneier on Security | October 23, 2009 at 09:49 AM
James Bamford -- author of The Shadow Factory: The NSA from 9/11 to the Eavesdropping on America writes about the NSA's new data center in Utah as he reviews another...schneier From Schneier on Security | October 22, 2009 at 11:10 AM
According to the Telegraph:
Mr Ballmer said: "We got some uneven reception when [Vista] first launched in large part because we made some design decisions to improve...schneier From Schneier on Security | October 21, 2009 at 12:46 PM
From the Courier-Mail:
A man who established a sophisticated network of peepholes and cameras to spy on his flatmates has escaped a jail sentence after police...schneier From Schneier on Security | October 21, 2009 at 09:15 AM
Story here. Basically, a woman posts a horrible story of how she was mistreated by the TSA, and the TSA responds by releasing the video showing that she was lying...schneier From Schneier on Security | October 20, 2009 at 03:42 PM
All it takes is a computer that can track every card:
The anti-card-counter system uses cameras to watch players and keep track of the actual "count" of the cards...schneier From Schneier on Security | October 20, 2009 at 11:16 AM
Nice article summing up six years of Microsoft Patch Tuesdays:
The total number of flaws disclosed and patched by the software maker so far this year stands at...schneier From Schneier on Security | October 19, 2009 at 08:38 PM
"Fugitive caught after updating his status on Facebook." It's easy to say "so dumb," and it would be true, but what's interesting is how people just don't think...schneier From Schneier on Security | October 19, 2009 at 12:55 PM
A few years ago, a company began to sell a liquid with identification codes suspended in it. The idea was that you would paint it on your stuff as proof of ownership...schneier From Schneier on Security | October 16, 2009 at 01:56 PM
Good article:
Zachary's offense? [He's six years old.] Taking a camping utensil that can serve as a knife, fork and spoon to school. He was so excited about recently...schneier From Schneier on Security | October 15, 2009 at 12:34 PM
I'm just going to quote without comment:
About the file:
the text message file encrypted with a symmetric key combine 3 modes
1st changing the original text...schneier From Schneier on Security | October 13, 2009 at 07:55 PM
Good essay: "Malware to crimeware: How far have they gone, and how do we catch up?" ;login:, August 2009:
I have survived over a decade of advances in delivery...schneier From Schneier on Security | October 13, 2009 at 12:15 PM
I wrote about this in 2004. This is an improved product:
While paints blocking lower frequencies have been available for some time, Mr Ohkoshi's technology is...schneier From Schneier on Security | October 12, 2009 at 06:47 PM