From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The FBI wants a new law that will make it easier to wiretap the Internet. Although its claim is that the new law will only maintain the status quo, it's reallyeverything...schneier From Schneier on Security | June 4, 2013 at 05:44 PM
Someday I need to write an essay on the security risks of secret algorithms that become part of our infrastructure. This paper gives one example of that. Could...schneier From Schneier on Security | June 4, 2013 at 11:19 AM
New paper from the Harvard Law Review by Daniel Solove: "Privacy Self-Management and the Consent Dilemma":
Privacy self-management takes refuge in consent. It...schneier From Schneier on Security | June 3, 2013 at 11:15 AM
The translated version of a Spanish menu contains the entry "squids in his (her, your) ink."
As usual, you can also use this squid post to talk about the security...schneier From Schneier on Security | May 31, 2013 at 09:39 PM
Interesting article on a greatly increased aspect of surveillance: "the ordinary citizen who by chance finds himself in a position to record events of great public...schneier From Schneier on Security | May 31, 2013 at 11:07 AM
This, by Judge Kozinski, is from a Federal court ruling about false statements and First Amendment protection
Saints may always tell the truth, but for mortals...schneier From Schneier on Security | May 30, 2013 at 11:31 AM
This article wonders if we are:
Yet for pretty much the first time there has been a considerable amount of media commentary seeking to put terrorism in context...schneier From Schneier on Security | May 29, 2013 at 04:22 PM
From his Facebook page:
An illustration of how the news are largely created, bloated and magnified by journalists. I have been in Lebanon for the past 24h, and...schneier From Schneier on Security | May 28, 2013 at 05:52 PM
Terrorism causes fear, and we overreact to that fear. Our brains aren't very good at probability and risk analysis. We tend to exaggerate spectacular, strange and...schneier From Schneier on Security | May 28, 2013 at 10:09 AM
How does he know this?
Chris Cosentino, the Bay Area’s "Offal Chef" at Incanto in San Francisco and PIGG at Umamicatessen in Los Angeles, opted for the most intimidating...schneier From Schneier on Security | May 24, 2013 at 09:54 PM
The research in G. Giguère and B.C. Love, "Limits in decision making arise from limits in memory retrieval," Proceedings of the National Academy of Sciences v.Abstract...schneier From Schneier on Security | May 24, 2013 at 05:17 PM
Interesting report from the From the Pew Internet and American Life Project:
Teens are sharing more information about themselves on their social media profiles...schneier From Schneier on Security | May 24, 2013 at 01:40 PM
This post by Aleatha Parker-Wood is very applicable to the things I wrote in Liars & Outliers:
A lot of fundamental social problems can be modeled as a disconnection...schneier From Schneier on Security | May 23, 2013 at 02:18 PM
This 127-page report was just published by the UK Defence Academy. I have not read it yet, but it looks really interesting.
Executive Summary: This report presents...schneier From Schneier on Security | May 22, 2013 at 05:05 PM
For a while now, I have been thinking about what civil disobedience looks like in the Internet Age. Certainly DDOS attacks, and politically motivated hacking in...schneier From Schneier on Security | May 22, 2013 at 11:24 AM
The Internet has turned into a massive surveillance tool. We're constantly monitored on the Internet by hundreds of companies -- both familiar and unfamiliar. Everything...schneier From Schneier on Security | May 21, 2013 at 11:15 AM
All of the anti-counterfeiting features of the new Canadian $100 bill are resulting in people not bothering to verify them.
The fanfare about the security features...schneier From Schneier on Security | May 20, 2013 at 11:34 AM
Technically, it's a cuttlefish and not a squid. But it's still nice art. I posted a photo of a real striped pyjama squid way back in 2006.
As usual, you can...schneier From Schneier on Security | May 17, 2013 at 09:57 PM
In the episode that aired on May 9th, about eight or nine minutes in, there's a scene with a copy of Applied Cryptography prominently displayed on the coffee table...schneier From Schneier on Security | May 17, 2013 at 07:59 PM
Here is a new lock that you can control via Bluetooth and an iPhone app.
That's pretty cool, and I can imagine all sorts of reasons to get one of those. But I'm...schneier From Schneier on Security | May 16, 2013 at 01:45 PM