From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Turns out there's a lot of vulnerable systems out there:
Many of the two terabytes (2,000 gigabytes) worth of replies Moore received from 310 million IPs indicated...schneier From Schneier on Security | April 30, 2013 at 11:11 AM
Max Abrahms has two sensible essays.
Probably the ultimate in security theater: Williams-Sonoma stops selling pressure cookers "out of respect." They say it's...schneier From Schneier on Security | April 29, 2013 at 03:27 PM
This is a fantastic Lego model of a space kraken attacking a Star Wars Super Star Destroyer.
As usual, you can also use this squid post to talk about the security...schneier From Schneier on Security | April 26, 2013 at 09:05 PM
The Internet anonymity service Tor needs people who are willing to run bridges. It's a goodness for the world; do it if you can.schneier From Schneier on Security | April 26, 2013 at 12:19 PM
A 92-year-old World War II Bletchley Park codebreaker has had a set of commemorative stamps issued in his honor.schneier From Schneier on Security | April 25, 2013 at 07:37 PM
Encouraging poll data says that maybe Americans are starting to have realistic fears about terrorism, or at least are refusing to be terrorized.
Good essay byapologizes...schneier From Schneier on Security | April 25, 2013 at 11:42 AM
Pretty good video. Ellen makes fun of the "Internet Password Minder," which is -- if you think about it -- only slightly different than Password Safe.schneier From Schneier on Security | April 24, 2013 at 06:06 PM
I've talked about plant security systems, both here and in Beyond Fear. Specifically, I've talked about tobacco plants that call air strikes against insects...schneier From Schneier on Security | April 24, 2013 at 11:51 AM
PhotographyIsNotACrime.com points out the obvious: after years of warning us that photography is suspicious, the police were happy to accept all of those amateur...schneier From Schneier on Security | April 23, 2013 at 05:34 PM
I commented in this article on the repeal of the transparency provisions of the STOCK Act:
Passed in 2012 after a 60 Minutes report on insider trading practices...schneier From Schneier on Security | April 23, 2013 at 12:10 PM
Hopefully this advice is superfluous for my audience, but it's so well written it's worth reading nonetheless:
7. SO, the bottom line is this: If you are in a...schneier From Schneier on Security | April 21, 2013 at 03:48 PM
I generally give the police a lot of tactical leeway in times like this. The very armed and very dangerous suspects warranted extraordinary treatment. They were...schneier From Schneier on Security | April 20, 2013 at 01:19 PM
Earlier this month I spent a week at the Berkman Center for Internet and Society, talking to people about power, security, technology, and threats (details here...schneier From Schneier on Security | April 19, 2013 at 06:40 PM
It's the first on this page. Apparently this is the finished version of the design I blogged about last year.
As usual, you can also use this squid post to talk...schneier From Schneier on Security | April 19, 2013 at 06:35 PM
This article, from some internal NSA publication, is about Lambros Callimahos, who taught an intensive 18-week course on cryptology for many years and died in 1977...schneier From Schneier on Security | April 19, 2013 at 11:47 AM
This clever piece of malware evades forensic examination by deleting its own components.schneier From Schneier on Security | April 18, 2013 at 04:36 PM
I rewrote my "refuse to be terrorized" essay for the Atlantic. David Rothkoph (author of the great book Power, Inc.) wrote something similar, and so did John Cole...schneier From Schneier on Security | April 16, 2013 at 02:19 PM
We're learning a lot about how the FBI eavesdrops on cell phones from a recent court battle.schneier From Schneier on Security | April 16, 2013 at 11:37 AM