From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Female squid exhibit sexually dimorphic tunable leucophores and iridocytes. Just so you know.
Here's the story in more accessible language.
As usual, you can...schneier From Schneier on Security | October 25, 2013 at 10:08 PM
Thomas Rid, Cyber War Will Not Take Place, Oxford University Press, 2013.
Cyber war is possibly the most dangerous buzzword of the Internet era. The fear-inducing...schneier From Schneier on Security | October 25, 2013 at 10:26 AM
Interesting paper: Max Abrahms, "The Credibility Paradox: Violence as a Double-Edged Sword in International Politics," International Studies Quarterly, 2013:
...schneier From Schneier on Security | October 25, 2013 at 07:30 AM
DARPA is looking for a fully-automated network defense system:
What if computers had a "check engine" light that could indicate new, novel security problems? What...schneier From Schneier on Security | October 24, 2013 at 09:45 AM
This is from a Snowden document released by Le Monde:
General Term Descriptions:
HIGHLANDS: Collection from Implants
VAGRANT: Collection of Computer Screens
MAGNETIC...schneier From Schneier on Security | October 23, 2013 at 11:03 AM
The news story about the guy who left dry ice bombs in restricted areas of LAX is really weird.
I can't get worked up over it, though. Dry ice bombs are a harmless...schneier From Schneier on Security | October 23, 2013 at 06:35 AM
SlashDot asks the question:
I'm a big fan of Bruce Schneier, but just to play devil's advocate, let's say, hypothetically, that Schneier is actually in cahoots...schneier From Schneier on Security | October 22, 2013 at 12:32 PM
We already know the NSA wants to eavesdrop on the Internet. It has secret agreements with telcos to get direct access to bulk Internet traffic. It has massive systems...schneier From Schneier on Security | October 22, 2013 at 07:15 AM
Historically, surveillance was difficult and expensive.
Over the decades, as technology advanced, surveillance became easier and easier. Today, we find ourselves...schneier From Schneier on Security | October 21, 2013 at 07:05 AM
Several versions of D-Link router firmware contain a backdoor. Just set the browser's user agent string to "xmlset_roodkcableoj28840ybtide," and you're in. (Hint...schneier From Schneier on Security | October 18, 2013 at 01:03 PM
There seems to be a bunch of research into uniquely identifying cell phones through unique analog characteristics of the various embedded sensors. These sortsSlashdot...schneier From Schneier on Security | October 18, 2013 at 07:37 AM
Ed Felten makes a strong argument that a court order is exactly the same thing as an insider attack:
To see why, consider two companies, which we'll call Lavabit...schneier From Schneier on Security | October 17, 2013 at 01:50 PM
SecureDrop is an open-source whistleblower support system, originally written by Aaron Swartz and now run by the Freedom of the Press Foundation. The first instance...schneier From Schneier on Security | October 17, 2013 at 08:15 AM
The new iPhone has a motion sensor chip, and that opens up new opportunities for surveillance:
The M7 coprocessors introduce functionality that some may instinctively...schneier From Schneier on Security | October 16, 2013 at 08:33 AM
A new Snowden document shows that the NSA is harvesting contact lists -- e-mail address books, IM buddy lists, etc. -- from Google, Yahoo, Microsoft, Facebook,...schneier From Schneier on Security | October 15, 2013 at 02:37 PM
It's hard not to poke fun at this press release for Safeslinger, a new cell phone security app from Carnegie Mellon.
"SafeSlinger provides you with the confidence...schneier From Schneier on Security | October 15, 2013 at 01:37 PM
New paper: "Physical-Layer Cryptography Through Massive MIMO."
Abstract: We propose the new technique of physical-layer cryptography based on using a massive MIMO...schneier From Schneier on Security | October 15, 2013 at 07:27 AM
New paper: "Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust, by Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien...schneier From Schneier on Security | October 14, 2013 at 02:06 PM
In one of the documents recently released by the NSA as a result of an EFF lawsuit, there's discussion of a specific capability of a call records database to identify...schneier From Schneier on Security | October 14, 2013 at 07:37 AM