From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This is a succinct explanation of how the secrecy of the FISA court undermines trust.
Surveillance types make a distinction between secrecy of laws, secrecy of...schneier From Schneier on Security | July 23, 2013 at 02:00 PM
Marc Rotenberg of EPIC explains why he is suing the NSA in the Supreme Court.
And USA Today has a back and forth on the topic. schneier From Schneier on Security | July 23, 2013 at 07:21 AM
I generally don't like stories about Snowden as a person, because they distract from the real story of the NSA surveillance programs, but this article on the costs...schneier From Schneier on Security | July 22, 2013 at 02:04 PM
This is interesting:
If I know that you have committed a violent act, and you know that I have committed a violent act, we each have information on each otherAbstract...schneier From Schneier on Security | July 22, 2013 at 07:36 AM
The wood sculpture is part of an art exhibit at the VanDusen Botanical Garden in Vancouver.schneier From Schneier on Security | July 19, 2013 at 05:12 PM
For a change, here's a good idea by the TSA:
TSA has just issued a Request for Information (RFI) to prospective vendors who could develop and supply such randomizers...schneier From Schneier on Security | July 19, 2013 at 03:45 PM
One of the assurances I keep hearing about the U.S. government's spying on American citizens is that it's only used in cases of terrorism. Terrorism is, of course...schneier From Schneier on Security | July 19, 2013 at 10:40 AM
Edward Snowden has set up a dead man's switch. He's distributed encrypted copies of his document trove to various people, and has set up some sort of automatic...schneier From Schneier on Security | July 18, 2013 at 09:37 AM
On the subject of the recent Washington Post Snowden document, the DHS sent this e-mail out to at least some of its employees:
From: xxxxx
Sent: Thursday, July...schneier From Schneier on Security | July 17, 2013 at 03:45 PM
Good article on the longstanding practice of secretly tapping undersea cables.
This is news right now because of a new Snowden document.schneier From Schneier on Security | July 17, 2013 at 01:03 PM
Interesting essay on the impossibility of being entirely lawful all the time, the balance that results from the difficulty of law enforcement, and the societalwithout...schneier From Schneier on Security | July 16, 2013 at 01:35 PM
I haven't heard much about the Privacy and Civil Liberties Oversight Board. They recently held hearings regarding the Snowden documents.
This particular comment...schneier From Schneier on Security | July 16, 2013 at 08:11 AM
A political history of walls: Roman walls such as Hadrian's Wall, the Great Wall of China, the Berlin Wall, and the wall between Mexico and the U.S. Moral: they...schneier From Schneier on Security | July 15, 2013 at 08:03 AM
I have been awarded a fellowship at the Berkman Center for Internet and Society at Harvard University, for the 2013–2014 academic year. I'm excited about this;...schneier From Schneier on Security | July 13, 2013 at 07:30 PM
This is really interesting research.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | July 12, 2013 at 05:49 PM
This is a really interesting article about something I never even thought about before: how games ("F2P" means "free to play") trick players into paying for stuff...schneier From Schneier on Security | July 12, 2013 at 07:37 AM
We don't know what they mean, but there are a bunch of NSA code names on LinkedIn profiles.
ANCHORY, AMHS, NUCLEON, TRAFFICTHIEF, ARCMAP, SIGNAV, COASTLINE, DISHFIRE...schneier From Schneier on Security | July 11, 2013 at 07:36 AM
Nice history of Project SHAMROCK, the NSA's illegal domestic surveillance program from the 1970s. It targeted telegrams.schneier From Schneier on Security | July 10, 2013 at 02:19 PM
This is really interesting. It starts by talking about a "cant" dictionary of 16th-century thieves' argot, and ends up talking about secret languages in general...schneier From Schneier on Security | July 10, 2013 at 06:55 AM