From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I spend a lot of time in my book Liars and Outliers on cooperating versus defecting. Cooperating is good for the group at the expense of the individual. Defecting...Bruce Schneier From Schneier on Security | July 29, 2016 at 01:23 PM
Russia was behind the hacks into the Democratic National Committee's computer network that led to the release of thousands of internal emails just before the party's...Bruce Schneier From Schneier on Security | July 29, 2016 at 07:29 AM
Disaster stories involving the Internet of Things are all the rage. They feature cars (both driven and driverless), the power grid, dams, and tunnel ventilation...Bruce Schneier From Schneier on Security | July 28, 2016 at 06:51 AM
Andrew "bunnie" Huang and Edward Snowden have designed a smartphone case that detects unauthorized transmissions by the phone. Paper. Three news articles. Looks...Bruce Schneier From Schneier on Security | July 27, 2016 at 02:09 PM
Interesting law journal paper: "Intelligence Legalism and the National Security Agency's Civil Liberties Gap," by Margo Schlanger: Abstract: This paper examines...Bruce Schneier From Schneier on Security | July 27, 2016 at 07:47 AM
Amazingly enough, the preponderance of the evidence points to Russia as the source of the DNC leak. I was going to summarize the evidence, but Thomas Rid did a...Bruce Schneier From Schneier on Security | July 26, 2016 at 02:40 PM
Here's the story of how it was done. First, a fake ad on torrent listings linked the site to a Latvian bank account, an e-mail address, and a Facebook page. Using...Bruce Schneier From Schneier on Security | July 26, 2016 at 07:42 AM
The Economist has an article on the potential hacking of the global financial system, both for profit or to cause mayhem. It's reasonably balanced. So how might...Bruce Schneier From Schneier on Security | July 25, 2016 at 07:10 AM
A post-mortem of a stranded sperm whale shows that he had recently eaten squid. As usual, you can also use this squid post to talk about the security stories in...Bruce Schneier From Schneier on Security | July 22, 2016 at 05:14 PM
Good essay pointing out the absurdity of comparing cyber weapons with nuclear weapons. On the surface, the analogy is compelling. Like nuclear weapons, the most...Bruce Schneier From Schneier on Security | July 22, 2016 at 12:08 PM
Old, but interesting. The document was published by DARPA in 1973, and approved for release in 2007. It examines the role of deception on strategic warning systems...Bruce Schneier From Schneier on Security | July 21, 2016 at 10:54 AM
Two researchers are working on a system to detect spoofed messages sent to automobiles by fingerprinting the clock skew of the various computer components within...Bruce Schneier From Schneier on Security | July 20, 2016 at 08:26 AM
I think the best hacks are the ones that are obvious once they're explained, but no one has thought of them before. Here's an example: Instagram ($2000), Google...Bruce Schneier From Schneier on Security | July 19, 2016 at 07:21 AM
This is a piece of near-future fiction about a cyberattack on New York, including hacking of cars, the water system, hospitals, elevators, and the power grid. Although...Bruce Schneier From Schneier on Security | July 18, 2016 at 07:27 AM
Looks like a tasty recipe. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | July 15, 2016 at 10:16 PM
This week, I have joined the board of directors of the Tor Project. Slashdot thread. Hacker News thread....Bruce Schneier From Schneier on Security | July 15, 2016 at 02:32 PM
Interesting analysis: Abstract: Objectives -- Informed by situational crime prevention (SCP) this study evaluates the effectiveness of the "West Bank Barrier" that...Bruce Schneier From Schneier on Security | July 14, 2016 at 06:58 AM
While we're on the subject of terrible 9th Circuit Court rulings: The U.S. Court of Appeals for the 9th Circuit has handed down a very important decision on the...Bruce Schneier From Schneier on Security | July 13, 2016 at 03:10 PM
In a truly terrible ruling, the US 9th Circuit Court ruled that using someone else's password with their permission but without the permission of the site owner...Bruce Schneier From Schneier on Security | July 13, 2016 at 12:07 PM