From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Matt Blaze makes a point that I have been saying for a while now:
Don't get me wrong, as a security specialist, the NSA's Tailored Access Operations (TAO) scare...schneier From Schneier on Security | January 7, 2014 at 09:22 AM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
FEEDTROUGH
(TS//SI//REL) FEEDTROUGH is a persistence technique for two software...schneier From Schneier on Security | January 6, 2014 at 02:28 PM
For decades, I've said that good security is a combination of protection, detection, and response. In 1999, when I formed Counterpane Internet Security, I focused...schneier From Schneier on Security | January 6, 2014 at 07:18 AM
There are more source documents from the recent Spiegel story on the NSA than I realized. Here is what I think is the complete list:
"Tailored Access Operations...schneier From Schneier on Security | January 3, 2014 at 03:23 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog is IRONCHEF:
IRONCHEF
(TS//SI//REL) IRONCHEF provides access persistence to...schneier From Schneier on Security | January 3, 2014 at 01:20 PM
It has amazed me that the NSA doesn't seem to do any cost/benefit analyses on any of its surveillance programs. This seems particularly important for bulk surveillance...schneier From Schneier on Security | January 3, 2014 at 07:10 AM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog is DEITYBOUNCE:
DEITYBOUNCE
(TS//SI//REL) DEITYBOUNCE provides software application...schneier From Schneier on Security | January 2, 2014 at 04:25 PM
I don't know what to think about this:
Around 1:00 AM on April 16, at least one individual (possibly two) entered two different manholes at the PG&E Metcalf power...schneier From Schneier on Security | January 2, 2014 at 07:40 AM
Der Spiegel has a good article on the NSA's Tailored Access Operations unit: basically, its hackers. The article also has more details on how QUANTUM -- particularly...schneier From Schneier on Security | December 31, 2013 at 08:31 AM
Joseph Stiglitz has an excellent essay on the value of trust, and the lack of it in today's society.
Trust is what makes contracts, plans and everyday transactions...schneier From Schneier on Security | December 30, 2013 at 10:55 AM
Frozen squid makes him happy.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | December 27, 2013 at 05:14 PM
"Talking to Vula" is the story of a 1980s secret communications channel between black South African leaders and others living in exile in the UK. The system used...schneier From Schneier on Security | December 26, 2013 at 07:44 AM
Fascinating report from Citizen Lab on the use of malware in the current Syrian conflict (EFF summary and Wired article).schneier From Schneier on Security | December 24, 2013 at 07:54 AM
On Friday, Reuters reported that RSA entered a secret contract to make DUAL_EC_PRNG the default random number generator in the BSAFE toolkit. DUA_EC_PRNG is now...schneier From Schneier on Security | December 23, 2013 at 07:26 AM
Minecraft parody.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | December 20, 2013 at 05:21 PM
The Register reported that I am leaving BT at the end of the year. It quoted BT as saying:
We hired Bruce because of his thought leadership in security and as...schneier From Schneier on Security | December 20, 2013 at 03:31 PM
Last week, Eben Moglen and I had a conversation about NSA surveillance. Audio and video are online.schneier From Schneier on Security | December 20, 2013 at 07:30 AM
This is neat:
Here, we describe a new acoustic cryptanalysis key extraction attack, applicable to GnuPG's current implementation of RSA. The attack can extract...schneier From Schneier on Security | December 19, 2013 at 07:29 AM