From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
News has been bubbling about an announcement by Google that it's starting to experiment with public-key cryptography that's resistant to cryptanalysis by a quantum...Bruce Schneier From Schneier on Security | July 12, 2016 at 01:53 PM
I have written before on the vulnerabilities equities process (VEP): the system by which the US government decides whether to disclose and fix a computer vulnerability...Bruce Schneier From Schneier on Security | July 11, 2016 at 01:15 PM
Interesting paper: "Anonymization and Risk," by Ira S. Rubinstein and Woodrow Hartzog: Abstract: Perfect anonymization of data sets has failed. But the process...Bruce Schneier From Schneier on Security | July 11, 2016 at 07:31 AM
It's chromatic aberration. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | July 8, 2016 at 05:09 PM
Adam Conover interviewed me on his podcast. If you remember, I was featured on his "Adam Ruins Everything" TV episode on security....Bruce Schneier From Schneier on Security | July 8, 2016 at 01:08 PM
Two researchers have discovered over 100 Tor nodes that are spying on hidden services. Cory Doctorow explains: These nodes -- ordinary nodes, not exit nodes --...Bruce Schneier From Schneier on Security | July 8, 2016 at 08:01 AM
BBC has the story. The confusion is that a scan of a passport is much easier to forge than an actual passport. This is a truly hard problem: how do you give people...Bruce Schneier From Schneier on Security | July 7, 2016 at 02:27 PM
Interesting research: "Characterizing and Avoiding Routing Detours Through Surveillance States," by Anne Edmundson, Roya Ensafi, Nick Feamster, and Jennifer Rexford...Bruce Schneier From Schneier on Security | July 7, 2016 at 07:47 AM
The New York Times wrote a good piece comparing airport security around the world, and pointing out that moving the security perimeter doesn't make any difference...Bruce Schneier From Schneier on Security | July 6, 2016 at 10:45 AM
Interesting research: Debora Halbert, "Intellectual property theft and national security: Agendas and assumptions": Abstract: About a decade ago, intellectual property...Bruce Schneier From Schneier on Security | July 5, 2016 at 11:54 AM
Funny: The Department of Canine Security urges dogs to remain on high alert and employ the tactic of See Something, Say Something. Remember to bark upon spotting...Bruce Schneier From Schneier on Security | July 4, 2016 at 08:40 PM
Here's a Corpse Reviver #2 variant with squid ink. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...Bruce Schneier From Schneier on Security | July 1, 2016 at 05:34 PM
Peter Maas interviewed the former NSA official who wrote the infamous "I Hunt Sysadmins" memo. It's interesting, but I wanted to hear less of Peter Maas -- I already...Bruce Schneier From Schneier on Security | June 29, 2016 at 07:29 AM
Interesting research: Mark G. Stewart and John Mueller, "Risk-based passenger screening: risk and economic assessment of TSA PreCheck increased security at reduced...Bruce Schneier From Schneier on Security | June 28, 2016 at 03:10 PM
This could go badly: "People You May Know are people on Facebook that you might know," a Facebook spokesperson said. "We show you people based on mutual friends...Bruce Schneier From Schneier on Security | June 28, 2016 at 07:56 AM
There's an app that allows people to submit photographs of hotel rooms around the world into a centralized database. The idea is that photographs of victims of...Bruce Schneier From Schneier on Security | June 27, 2016 at 07:05 AM
Interesting: There is one feature of the squid that is not transparent and which could act as a signal to prey the eyes. However, the squid has a developed protection...Bruce Schneier From Schneier on Security | June 24, 2016 at 05:39 PM
Stories of burglars using social media to figure out who's on vacation are old hat. Now financial investigators are using social media to find hidden wealth....Bruce Schneier From Schneier on Security | June 24, 2016 at 07:29 AM