From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The book is selling well. (Signed copies are still available on the website.) All the online stores have it, and most bookstores as well. It is available inavailable...schneier From Schneier on Security | February 24, 2012 at 09:18 PM
The new movie Safe House features the song "No Church in the Wild," by Kanye West, which includes this verse:
I live by you, desire
I stand by you, walk through...schneier From Schneier on Security | February 24, 2012 at 07:37 PM
Interesting:
When Kenneth G. Lieberthal, a China expert at the Brookings Institution, travels to that country, he follows a routine that seems straight from a...schneier From Schneier on Security | February 24, 2012 at 01:06 PM
We can now conclusively link Stuxnet to the centrifuge structure at the Natanz nuclear enrichment lab in Iran. Watch this new video presentation from Ralph Langner...schneier From Schneier on Security | February 23, 2012 at 06:29 PM
According to a report by Juniper, mobile malware is increasing dramatically.
In 2011, we saw unprecedented growth of mobile malware attacks with a 155 percentstory...schneier From Schneier on Security | February 23, 2012 at 12:27 PM
Research paper: "A birthday present every eleven wallets? The security of customer-chosen banking PINs," by Joseph Bonneau, Sören Preibusch, and Ross Anderson:...schneier From Schneier on Security | February 21, 2012 at 01:36 PM
Marissa A. Ramsier, Andrew J. Cunningham, Gillian L. Moritz, James J. Finneran, Cathy V. Williams, Perry S. Ong, Sharon L. Gursky-Doyen, and Nathaniel J. Dominy...schneier From Schneier on Security | February 20, 2012 at 12:30 PM
Beautiful sculpture.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | February 17, 2012 at 10:37 PM
Self-domestication happens when the benefits of cooperation outweigh the costs:
But why and how could natural selection tame the bonobo? One possible narrative...schneier From Schneier on Security | February 17, 2012 at 10:21 AM
From the abstract of the paper:
In this paper, we analyze the encryption systems used in the two existing (and competing) satphone standards, GMR-1 and GMR-2....schneier From Schneier on Security | February 16, 2012 at 06:22 PM
There's some excellent research (paper, news articles) surveying public keys in the wild. Basically, the researchers found that a small fraction of them (27,000...schneier From Schneier on Security | February 16, 2012 at 12:51 PM
Geotagged images of children:
Joanne Kuzma of the University of Worcester, England, has analyzed photos that clearly show children's faces on the photo sharing...schneier From Schneier on Security | February 15, 2012 at 07:11 PM
This writer wrestles with the costs and benefits of tighter controls on pseudoephedrine, a key chemical used to make methamphetamine:
Now, personally, I sincerely...schneier From Schneier on Security | February 15, 2012 at 01:09 PM
Adam Shostack explains to Verisign that trust requires transparency.
This is a lesson Path should have learned.schneier From Schneier on Security | February 14, 2012 at 01:12 PM
Liars and Outliers is available. Amazon and Barnes & Noble have ben shipping the book since the beginning of the month. Both the Kindle and the Nook versionsordered...schneier From Schneier on Security | February 13, 2012 at 08:53 PM
Last month, a U.S. court demanded that a defendent surrender the encryption key to a laptop so the police could examine it. Now it seems that she's forgotten the...schneier From Schneier on Security | February 13, 2012 at 11:20 AM