From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This is an interesting article about a new breed of malware that also hijack's the victim's phone text messaging system, to intercept one-time passwords sent via...schneier From Schneier on Security | June 28, 2013 at 06:31 AM
This quote is from the Spring 1997 issue of CRYPTOLOG, the internal NSA newsletter. The writer is William J. Black, Jr., the Director's Special Assistant for Information...schneier From Schneier on Security | June 27, 2013 at 12:49 PM
Nice essay:
The biological world is also open source in the sense that threats are always present, largely unpredictable, and always changing. Because of this,...schneier From Schneier on Security | June 27, 2013 at 07:34 AM
Interesting article on the history of, and the relationship between, secrecy and privacy
As a matter of historical analysis, the relationship between secrecy and...schneier From Schneier on Security | June 26, 2013 at 05:35 PM
Ron Beckstrom gives a talk (video and transcript) about "Mutually Assured Destruction," "Mutually Assured Disruption," and "Mutually Assured Dependence."
schneier From Schneier on Security | June 25, 2013 at 11:24 AM
Pretty scary -- and cool.
Remember, it's not any one thing that's worrisome; it's everything together.schneier From Schneier on Security | June 24, 2013 at 10:31 AM
It's not good.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
schneier From Schneier on Security | June 21, 2013 at 09:28 PM
Today, the United States is conducting offensive cyberwar actions around the world.
More than passively eavesdropping, we're penetrating and damaging foreign networks...schneier From Schneier on Security | June 21, 2013 at 04:43 PM
Lessons from Japan's response to Aum Shinrikyo:
Yet what's as remarkable as Aum's potential for mayhem is how little of it, on balance, they actually caused. Don't...schneier From Schneier on Security | June 21, 2013 at 11:25 AM
This article, on the cozy relationship between the commercial personal-data industry and the intelligence industry, has new information on the security of Skype...schneier From Schneier on Security | June 20, 2013 at 07:42 PM
A fine piece: "A Love Letter to the NSA Agent who is Monitoring my Online Activity."
A similar sentiment is expressed in this video.schneier From Schneier on Security | June 20, 2013 at 05:19 PM
Companies allow US intelligence to exploit vulnerabilities before it patches them:
Microsoft Corp. (MSFT), the world's largest software company, provides intelligence...schneier From Schneier on Security | June 20, 2013 at 11:04 AM
I have signed a petition calling on the NSA to "suspend its domestic surveillance program pending public comment." This is what's going on:
In a request today...schneier From Schneier on Security | June 19, 2013 at 07:18 PM
On his blog, Scott Adams suggests that it might be possible to identify sociopaths based on their interactions on social media.
My hypothesis is that scienceknow...schneier From Schneier on Security | June 19, 2013 at 04:19 PM
John Mueller and Mark Stewart ask the important questions about the NSA surveillance programs: why were they secret, what have they accomplished, and what do they...schneier From Schneier on Security | June 19, 2013 at 11:24 AM
Facebook (here), Apple (here), and Yahoo (here) have all released details of US government requests for data. They each say that they've turned over user datamuch...schneier From Schneier on Security | June 18, 2013 at 09:00 PM
In an excellent essay about privacy and secrecy, law professor Daniel Solove makes an important point. There are two types of NSA secrecy being discussed. It's...schneier From Schneier on Security | June 18, 2013 at 04:02 PM