From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Squids used to have shells. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...Bruce Schneier From Schneier on Security | May 11, 2018 at 05:17 PM
New research: "Leaving on a jet plane: the trade in fraudulently obtained airline tickets:" Abstract: Every day, hundreds of people fly on airline tickets that...Bruce Schneier From Schneier on Security | May 11, 2018 at 07:24 AM
Earlier this month, the Pentagon stopped selling phones made by the Chinese companies ZTE and Huawei on military bases because they might be used to spy on their...Bruce Schneier From Schneier on Security | May 10, 2018 at 10:11 AM
This article says that the Virginia Beach police are looking to buy encrypted radios. Virginia Beach police believe encryption will prevent criminals from listening...Bruce Schneier From Schneier on Security | May 9, 2018 at 10:42 AM
This survey and report is not surprising: The survey of nearly forty Republican and Democratic campaign operatives, administered through November and December 2017...Bruce Schneier From Schneier on Security | May 8, 2018 at 10:07 AM
Last month, Wired published a long article about Ray Ozzie and his supposed new scheme for adding a backdoor in encrypted devices. It's a weird article. It paints...Bruce Schneier From Schneier on Security | May 7, 2018 at 10:32 AM
The next major war will be super weird. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my...Bruce Schneier From Schneier on Security | May 4, 2018 at 05:18 PM
Micah Lee ran a two-year experiment designed to detect whether or not his laptop was ever tampered with. The results are inconclusive, but demonstrate how difficult...Bruce Schneier From Schneier on Security | May 4, 2018 at 07:19 AM
Interesting symmetric cipher: LC4: Abstract: ElsieFour (LC4) is a low-tech cipher that can be computed by hand; but unlike many historical ciphers, LC4 is designed...Bruce Schneier From Schneier on Security | May 3, 2018 at 07:42 AM
This is interesting: Creating these defenses is the goal of NIST's lightweight cryptography initiative, which aims to develop cryptographic algorithm standards...Bruce Schneier From Schneier on Security | May 2, 2018 at 07:40 AM
Researchers at Princeton University have released IoT Inspector, a tool that analyzes the security and privacy of IoT devices by examining the data they send across...Bruce Schneier From Schneier on Security | May 1, 2018 at 07:32 AM
Researchers have disclosed a massive vulnerability in the VingCard eletronic lock system, used in hotel rooms around the world: With a $300 Proxmark RFID card reading...Bruce Schneier From Schneier on Security | April 30, 2018 at 07:02 AM
This bizarre contorted squid might be a new species, or a previously known species exhibiting a new behavior. No one knows. As usual, you can also use this squid...Bruce Schneier From Schneier on Security | April 27, 2018 at 05:37 PM
This seems like an absolute disaster: The very short version is that a UK bank, TSB, which had been merged into and then many years later was spun out of Lloyds...Bruce Schneier From Schneier on Security | April 27, 2018 at 07:00 AM
The ISO has rejected two symmetric encryption algorithms: SIMON and SPECK. These algorithms were both designed by the NSA and made public in 2013. They are optimized...Bruce Schneier From Schneier on Security | April 25, 2018 at 07:54 AM
"Do Not Disturb" is a Macintosh app that send an alert when the lid is opened. The idea is to detect computer tampering. Wire article: Do Not Disturb goes a step...Bruce Schneier From Schneier on Security | April 24, 2018 at 07:04 AM
Russia has banned the secure messaging app Telegram. It's making an absolute mess of the ban -- blocking 16 million IP addresses, many belonging to the Amazon and...Bruce Schneier From Schneier on Security | April 23, 2018 at 03:15 PM
This acoustic technology identifies individuals by their ear shapes. No information about either false positives or false negatives....Bruce Schneier From Schneier on Security | April 23, 2018 at 08:48 AM