From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
It's been long known that individual analog devices have their own fingerprints. Decades ago, individual radio transmitters were identifiable and trackable. Now...Bruce Schneier From Schneier on Security | April 30, 2014 at 02:42 PM
Good essay on the Quantified Toilet hoax, and the difference between public surveillance and private self-surveillance....Bruce Schneier From Schneier on Security | April 30, 2014 at 09:58 AM
This is interesting: Touch ID takes a 88x88 500ppi scan of your finger and temporarily sends that data to a secure cache located near the RAM, after the data is...Bruce Schneier From Schneier on Security | April 29, 2014 at 07:47 AM
Handycipher is a new pencil-and-paper symmetric encryption algorithm. I'd bet a gazillion dollars that it's not secure, although I haven't done the cryptanalysis...Bruce Schneier From Schneier on Security | April 28, 2014 at 07:45 AM
It's called "Tentacles." As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | April 25, 2014 at 05:17 PM
Interesting essay about how Google's lack of transparency is hurting their trust: The reality is that Google's business is and has always been about mining as much...Bruce Schneier From Schneier on Security | April 24, 2014 at 07:45 AM
Surveillance is getting cheaper and easier: Two artists have revealed Conversnitch, a device they built for less than $100 that resembles a lightbulb or lamp and...Bruce Schneier From Schneier on Security | April 23, 2014 at 03:33 PM
Interesting research on the security of code written in different programming languages. We don't know whether the security is a result of inherent properties of...Bruce Schneier From Schneier on Security | April 23, 2014 at 08:59 AM
Good essay: To repeat, Heartbleed is a common mode failure. We would not know about it were it not open source (Good). That it is open source has been shown to...Bruce Schneier From Schneier on Security | April 22, 2014 at 09:21 AM
Good information: Russian law gives Russia’s security service, the FSB, the authority to use SORM (“System for Operative Investigative Activities”) to collect,...Bruce Schneier From Schneier on Security | April 21, 2014 at 06:55 AM
Good news from Malaysia: The Terengganu International Squid Jigging Festival (TISJF) will be continued and become an annual event as one of the state's main tourism...Bruce Schneier From Schneier on Security | April 18, 2014 at 05:27 PM
There's a new study looking at the metaphors we use to describe surveillance. Over 62 days between December and February, we combed through 133 articles by 105...Bruce Schneier From Schneier on Security | April 18, 2014 at 03:49 PM
This is a crazy overreaction: A 19-year-old man was caught on camera urinating in a reservoir that holds Portland's drinking water Wednesday, according to city...Bruce Schneier From Schneier on Security | April 18, 2014 at 08:00 AM
Nice article on the Tails stateless operating system. I use it. Initially I would boot my regular computer with Tails on a USB stick, but I went out and bought...Bruce Schneier From Schneier on Security | April 17, 2014 at 02:51 PM
I previously posted that I am writing a book on security and power. Here are some title suggestions: Permanent Record: The Hidden Battles to Capture Your Data and...Bruce Schneier From Schneier on Security | April 16, 2014 at 11:01 AM
Here's my upcoming speaking schedule for April and May: Stanford Law School on April 15. Brown University in Providence, RI -- two times -- on April 24. The Global...Bruce Schneier From Schneier on Security | April 15, 2014 at 10:31 AM
Here are three articles about me from the last month. Also these three A/V links....Bruce Schneier From Schneier on Security | April 15, 2014 at 10:29 AM
Recently, Matthew Green has been leading an independent project to audit TrueCrypt. Phase I, a source code audit by iSEC Partners, is complete. Next up is Phase...Bruce Schneier From Schneier on Security | April 15, 2014 at 07:56 AM