From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Beautiful photo of a three-inch-long squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read...Bruce Schneier From Schneier on Security | February 15, 2019 at 05:24 PM
Lessons learned in reconstructing the World War II-era SIGSALY voice encryption system....Bruce Schneier From Schneier on Security | February 15, 2019 at 07:33 AM
It's only a prototype, but this USB cable has an embedded Wi-Fi controller. Whoever controls that Wi-Fi connection can remotely execute commands on the attached...Bruce Schneier From Schneier on Security | February 14, 2019 at 07:53 AM
I had not heard about this case before. Zurich Insurance has refused to pay Mondelez International's claim of $100 million in damages from NotPetya. It claims it...Bruce Schneier From Schneier on Security | February 13, 2019 at 07:32 AM
In his 2008 white paper that first proposed bitcoin, the anonymous Satoshi Nakamoto concluded with: "We have proposed a system for electronic transactions without...Bruce Schneier From Schneier on Security | February 12, 2019 at 07:25 AM
The Hawaiian Bobtail Squid's genome is half again the size of a human's. Other facts: The Hawaiian bobtail squid has two different symbiotic organs, and researchers...Bruce Schneier From Schneier on Security | February 8, 2019 at 05:37 PM
Gregory C. Allen at the Center for a New American Security has a new report with some interesting analysis and insights into China's AI strategy, commercial, government...Bruce Schneier From Schneier on Security | February 7, 2019 at 09:15 AM
In Gmail addresses, the dots don't matter. The account "[email protected]" maps to the exact same address as "[email protected]" and "b.r.u.c.e.schneier...Bruce Schneier From Schneier on Security | February 6, 2019 at 11:24 AM
Zcash just fixed a vulnerability that would have allowed "infinite counterfeit" Zcash. Like all the other blockchain vulnerabilities and updates, this demonstrates...Bruce Schneier From Schneier on Security | February 5, 2019 at 03:59 PM
The Wired headline sums it up nicely -- "Facebook Hires Up Three of Its Biggest Privacy Critics": In December, Facebook hired Nathan White away from the digital...Bruce Schneier From Schneier on Security | February 4, 2019 at 12:07 PM
Nice recipe. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here...Bruce Schneier From Schneier on Security | February 1, 2019 at 05:38 PM
Our work in cybersecurity is inexorably intertwined with public policy and -- more generally -- the public interest. It's obvious in the debates on encryption...Bruce Schneier From Schneier on Security | February 1, 2019 at 10:48 AM
A year ago, the Norwegian Consumer Council published an excellent security analysis of children's GPS-connected smart watches. The security was terrible. Not only...Bruce Schneier From Schneier on Security | January 31, 2019 at 11:30 AM
The security is terrible: In a very short limited amount of time, three vulnerabilities have been discovered: Wifi credentials of the user have been recovered (stored...Bruce Schneier From Schneier on Security | January 30, 2019 at 11:00 AM
This is kind of a crazy iPhone vulnerability: it's possible to call someone on FaceTime and listen on their microphone -- and see from their camera -- before they...Bruce Schneier From Schneier on Security | January 29, 2019 at 02:12 PM
The Japanese government is going to run penetration tests against all the IoT devices in their country, in an effort to (1) figure out what's insecure, and (2)...Bruce Schneier From Schneier on Security | January 28, 2019 at 02:40 PM
Interesting. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here...Bruce Schneier From Schneier on Security | January 25, 2019 at 05:18 PM
Last week, I evaluated the security of a recent GCHQ backdoor proposal for communications systems. Furthering the debate, Nate Cardozo and Seth Schoen of EFF explain...Bruce Schneier From Schneier on Security | January 25, 2019 at 07:08 AM
They have advantages: Pigeons are certainly no substitute for drones, but they provide a low-visibility option to relay information. Considering the storage capacity...Bruce Schneier From Schneier on Security | January 24, 2019 at 07:38 AM
This is interesting: To prevent the problems of customer binding, and losing business when darknet markets go down, merchants have begun to leave the specialized...Bruce Schneier From Schneier on Security | January 23, 2019 at 07:20 AM