From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
There's speculation that the FBI is responsible for an exploit that compromised the Tor anonymity service. Note that Tor nodes installed or updated after June...schneier From Schneier on Security | August 6, 2013 at 02:42 PM
Last month, I wrote about the potential for mass surveillance mission creep: the tendency for the vast NSA surveillance apparatus to be used for other, lesser,already...schneier From Schneier on Security | August 6, 2013 at 07:16 AM
Imagine the government passed a law requiring all citizens to carry a tracking device. Such a law would immediately be found unconstitutional. Yet we all carryenormous...schneier From Schneier on Security | August 5, 2013 at 07:02 AM
I like watches with no numbers.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | August 2, 2013 at 06:59 PM
The Guardian discusses a new secret NSA program: XKeyscore. It's the desktop system that allows NSA agents to spy on anyone over the Internet in real time. It...schneier From Schneier on Security | August 2, 2013 at 04:20 PM
Good review of the strengths and weaknesses of Cryptography Engineering and Applied Cryptography.
Best -- at least to me -- is the list of things missing, which...schneier From Schneier on Security | August 2, 2013 at 03:28 PM
Searching on Google for a pressure cooker and backpacks got one family investigated by the police. More stories and comments.
This seems not to be the NSA eavesdropping...schneier From Schneier on Security | August 2, 2013 at 09:03 AM
Richard Bejtlich and Thomas Rid (author of the excellent book Cyber War Will Not Take Place) debate the cyberwar threat on the Economist website.
schneier From Schneier on Security | August 1, 2013 at 04:54 PM
The UK has banned researchers from revealing details of security vulnerabilities in car locks. In 2008, Phillips brought a similar suit against researchers who...schneier From Schneier on Security | August 1, 2013 at 07:37 AM
This is what happens when you're a security writer and you piss off the wrong people: they conspire to have heroin mailed to you, and then to tip off the police...schneier From Schneier on Security | July 31, 2013 at 07:25 AM
Research on why some neighborhoods feel safer:
Salesses and collaborators Katja Schechtner and César A. Hidalgo built an online comparison tool using Google Street...schneier From Schneier on Security | July 30, 2013 at 02:44 PM
This is a really clever social engineering attack against a bank-card holder:
It all started, according to the police, on the Saturday night where one of this...schneier From Schneier on Security | July 30, 2013 at 08:33 AM
The Obama Administration has a comprehensive "insider threat" program to detect leakers from within government. This is pre-Snowden. Not surprisingly, the combination...schneier From Schneier on Security | July 29, 2013 at 07:28 AM
It's "Sparky the Giant Squid."
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. schneier From Schneier on Security | July 26, 2013 at 05:27 PM
We interrupt this blog for some important inter-agency rivalry.
The fourth part is still uncracked, though.
Older links.schneier From Schneier on Security | July 26, 2013 at 02:19 PM
This is an interesting, if slightly disturbing, result:
In one experiment, we had subjects read two government policy papers from 1995, one from the State Department...schneier From Schneier on Security | July 26, 2013 at 07:25 AM
We're starting to see Internet companies talk about the mechanics of how the US government spies on their users. Here, a Utah ISP owner describes his experiences...schneier From Schneier on Security | July 25, 2013 at 01:27 PM
The story of people who poach and collect rare eggs, and the people who hunt them down.
Securing wildlife against poachers is a difficult problem, especially when...schneier From Schneier on Security | July 25, 2013 at 07:46 AM
Former NSA director Michael Hayden lists three effects of the Snowden documents:
"...the undeniable operational effect of informing adversaries of American intelligence's...schneier From Schneier on Security | July 24, 2013 at 03:52 PM
In an effort to lock the barn door after the horse has escaped, the NSA is implementing two-man control for sysadmins:
NSA chief Keith Alexander said his agency...schneier From Schneier on Security | July 24, 2013 at 07:18 AM