From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
On September 30, 2001, I published a special issue of Crypto-Gram discussing the terrorist attacks. I wrote about the novelty of the attacks, airplane security...schneier From Schneier on Security | September 11, 2009 at 02:47 PM
File deletion is all about control. This used to not be an issue. Your data was on your computer, and you decided when and how to delete a file. You could use the...schneier From Schneier on Security | September 10, 2009 at 11:08 AM
The BBC has a video demonstration of a 16-ounce bottle of liquid blowing a hole in the side of a plane.
I know no more details other than what's in the video.
...schneier From Schneier on Security | September 9, 2009 at 05:25 PM
Three of the UK liquid bombers were convicted Monday. NSA-intercepted e-mail was introduced as evidence in the trial:
The e-mails, several of which have been ...schneier From Schneier on Security | September 9, 2009 at 03:10 PM
Interesting video:
A new class of global actors is playing an increasingly important role in globalization: smugglers, warlords, guerrillas, terrorists, gangs,...schneier From Schneier on Security | September 8, 2009 at 03:06 PM
Very interesting hour-long interview.
Australian-born David Kilcullen was the senior advisor to US General David Petraeus during his time in Iraq, advising on...Bruce Schneier From Schneier on Security | September 7, 2009 at 11:04 AM
Blog post from Ed Felten:
Usually when the threat model mentions subpoenas, the bigger threats in reality come from malicious intruders or insiders. The biggest...schneier From Schneier on Security | September 4, 2009 at 11:18 AM
If there's actually a cult out there, I want to hear about it. In an essay by that name, John Viega writes about the dangers of relying on Applied Cryptography...schneier From Schneier on Security | September 3, 2009 at 06:56 PM
Access control is difficult in an organizational setting. On one hand, every employee needs enough access to do his job. On the other hand, every time you giverole...schneier From Schneier on Security | September 3, 2009 at 05:54 PM
Blog post from Steve Bellovin:
It is vital that the keystream values (a) be truly random and (b) never be reused. The Soviets got that wrong in the 1940s; as a...schneier From Schneier on Security | September 3, 2009 at 12:20 PM
Good article, which basically says that our policies are based more on fear than on reality.
On cyber-terrorism:
So why is there so much concern about schneier From Schneier on Security | September 2, 2009 at 12:40 PM
Interesting:
So how many bits are in this instance of H1N1? The raw number of bits, by my count, is 26,022; the actual number of coding bits approximately 25,054...schneier From Schneier on Security | September 1, 2009 at 06:13 PM
Fascinating story of a 16-year-old blind phone phreaker.
One afternoon, not long after Proulx was swatted, Weigman came home to find his mother talking to what...schneier From Schneier on Security | September 1, 2009 at 11:23 AM
A recent report has concluded that the London's surveillance cameras have solved one crime per thousand cameras per year.
David Davis MP, the former shadow home...schneier From Schneier on Security | August 31, 2009 at 10:59 AM
Weird:
The U.S. Federal Bureau of Investigation is trying to figure out who is sending laptop computers to state governors across the U.S., including West Virginia...schneier From Schneier on Security | August 28, 2009 at 05:27 PM