From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
As part of an ongoing series of classified NSA target list and raw intercepts, WikiLeaks published details of the NSA's spying on UN Secretary General Ban Ki-Moon...Bruce Schneier From Schneier on Security | March 1, 2016 at 01:55 PM
I have written two posts on the case, and at the bottom of those essays are lots of links to other essays written by other people. Here are more links. If you read...Bruce Schneier From Schneier on Security | March 1, 2016 at 07:47 AM
Today, IBM announced its intention to purchase my company, Resilient Systems. (Yes, the rumors were basically true.) I think this is a great development for Resilient...Bruce Schneier From Schneier on Security | February 29, 2016 at 12:08 PM
Research paper: Gavin J.D. Smith, "Surveillance, Data and Embodiment: On the Work of Being Watched," Body and Society, January 2016. Abstract: Today's bodies are...Bruce Schneier From Schneier on Security | February 29, 2016 at 07:17 AM
Engineers have invented a wave energy converter that works in the same way that squid propel themselves through the water. As usual, you can also use this squid...Bruce Schneier From Schneier on Security | February 26, 2016 at 05:49 PM
New Research: Rebecca Lipman, "Online Privacy and the Invisible Market for Our Data." The paper argues that notice and consent doesn't work, and suggests how is...Bruce Schneier From Schneier on Security | February 26, 2016 at 01:22 PM
Law Professor Karen Levy writes about the rise of surveillance in our most intimate activities -- love, sex, romance -- and how it affects those activities. This...Bruce Schneier From Schneier on Security | February 26, 2016 at 08:33 AM
In the conversation about zero-day vulnerabilities and whether "good" governments should disclose or hoard vulnerabilities, one of the critical variables is independent...Bruce Schneier From Schneier on Security | February 25, 2016 at 02:14 PM
Encryption keeps you safe. Encryption protects your financial details and passwords when you bank online. It protects your cell phone conversations from eavesdroppers...Bruce Schneier From Schneier on Security | February 25, 2016 at 07:40 AM
Brian Krebs has a really weird story about the build-in eavesdropping by the Chinese-made Foscam security camera: Imagine buying an internet-enabled surveillance...Bruce Schneier From Schneier on Security | February 24, 2016 at 01:05 PM
Interesting research: Michael Kearns, Aaron Roth, Zhiewi Steven Wu, and Grigory Yaroslavtsev, "Private algorithms for the protected in social network search," PNAS...Bruce Schneier From Schneier on Security | February 24, 2016 at 07:05 AM
For the past month or so, Forbes has been blocking browsers with ad blockers. Today, I tried to access a Wired article and the site blocked me for the same reason...Bruce Schneier From Schneier on Security | February 23, 2016 at 01:18 PM
Four researchers have demonstrated a TEMPEST attack against a laptop, recovering its keys by listening to its electrical emanations. The cost for the attack hardware...Bruce Schneier From Schneier on Security | February 23, 2016 at 06:49 AM
Earlier this week, a federal magistrate ordered Apple to assist the FBI in hacking into the iPhone used by one of the San Bernardino shooters. Apple will fight...Bruce Schneier From Schneier on Security | February 22, 2016 at 07:58 AM
Fascinating story. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | February 19, 2016 at 05:17 PM
I saw two related stories today. The first is about high-denomination currency. The EU is considering dropping its 500-euro note, on the grounds that only criminals...Bruce Schneier From Schneier on Security | February 19, 2016 at 07:34 AM
It's a teenager: British police have arrested a teenager who allegedly was behind a series of audacious -- and, for senior U.S. national security officials, embarrassing...Bruce Schneier From Schneier on Security | February 18, 2016 at 07:02 AM
A judge has ordered that Apple bypass iPhone security in order for the FBI to attempt a brute-force password attack on an iPhone 5c used by one of the San Bernardino...Bruce Schneier From Schneier on Security | February 17, 2016 at 03:15 PM
Trust is a complex social phenomenon, captured very poorly by the binary nature of Internet trust systems. This paper proposes a social consensus system of trust...Bruce Schneier From Schneier on Security | February 17, 2016 at 06:18 AM