From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In the Internet age, we have no choice but to entrust our data with private companies: e-mail providers, service providers, retailers, and so on. We realize that...Bruce Schneier From Schneier on Security | December 5, 2014 at 07:45 AM
The Denver police are using olfactometers to measure the concentration of cannabis in the air. I haven't found any technical information about these devices, their...Bruce Schneier From Schneier on Security | December 4, 2014 at 04:43 PM
This talk (and paper) describe a lattice-based public-key algorithm called Soliloquy developed by GCHQ, and a quantum-computer attack on it. News article....Bruce Schneier From Schneier on Security | December 4, 2014 at 10:53 AM
Interesting essay on the future of speech recognition, microphone miniaturization, and the future ubiquity of auditory surveillance....Bruce Schneier From Schneier on Security | December 2, 2014 at 04:53 PM
This is a really good analysis of how the NSA/GCHQ spying programs actually work. It's nice that we finally have enough documents public that we can start putting...Bruce Schneier From Schneier on Security | December 1, 2014 at 07:41 AM
Squid Bikes is a California brand. Article from Velo News. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...Bruce Schneier From Schneier on Security | November 28, 2014 at 05:53 PM
Interesting paper: "Security Collapse of the HTTPS Market." From the conclusion: Recent breaches at CAs have exposed several systemic vulnerabilities and market...Bruce Schneier From Schneier on Security | November 28, 2014 at 07:54 AM
This is an interesting paper -- the full version is behind a paywall -- about how we as humans can motivate people to cooperate with future generations. Abstract...Bruce Schneier From Schneier on Security | November 27, 2014 at 09:32 AM
A new story based on the Snowden documents and published in the German newspaper Süddeutsche Zeitung shows how the GCHQ worked with Cable & Wireless -- acquired...Bruce Schneier From Schneier on Security | November 26, 2014 at 02:29 PM
This is a creepy story. The FBI wanted access to a hotel guest's room without a warrant. So agents broke his Internet connection, and then posed as Internet technicians...Bruce Schneier From Schneier on Security | November 26, 2014 at 07:50 AM
Regin is another military-grade surveillance malware (tech details from Symantec and Kaspersky). It seems to have been in operation between 2008 and 2011. The Intercept...Bruce Schneier From Schneier on Security | November 25, 2014 at 07:57 AM
Nice article on some of the security assumptions we rely on in cryptographic algorithms....Bruce Schneier From Schneier on Security | November 24, 2014 at 03:45 PM
Jim Sanborn has given he world another clue to the fourth cyphertext in his Kryptos sculpture at the CIA headquarters. Older posts on Kryptos....Bruce Schneier From Schneier on Security | November 24, 2014 at 07:54 AM
Tales of cephalopod behavior, including octopuses, squid, cuttlefish and nautiluses. Cephalopod Cognition, published by Cambridge University Press, is currently...Bruce Schneier From Schneier on Security | November 21, 2014 at 05:52 PM
Reuters is reporting that in 2009, several senior NSA officials objected to the NSA call-records collection program. The now-retired NSA official, a longtime code...Bruce Schneier From Schneier on Security | November 20, 2014 at 03:46 PM
Citadel is the first piece of malware I know of that specifically steals master passwords from password managers. Note that my own Password Safe is a target....Bruce Schneier From Schneier on Security | November 20, 2014 at 10:53 AM
Announcing Let's Encrypt, a new free certificate authority. This is a joint project of EFF, Mozilla, Cisco, Akamai, and the University of Michigan. This is an absolutely...Bruce Schneier From Schneier on Security | November 18, 2014 at 02:01 PM
Whatapp is now offering end-to-end message encryption: Whatsapp will integrate the open-source software Textsecure, created by privacy-focused non-profit Open Whisper...Bruce Schneier From Schneier on Security | November 18, 2014 at 02:01 PM
The NSA recently declassified a report on the Eurocrypt '92 conference. Honestly, I share some of the writer's opinions on the more theoretical stuff. I know it's...Bruce Schneier From Schneier on Security | November 18, 2014 at 11:57 AM
New article on the NSA's efforts to control academic cryptographic research in the 1970s. It includes new interviews with public-key cryptography inventor Martin...Bruce Schneier From Schneier on Security | November 17, 2014 at 10:19 PM