From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I'm at the Tenth Workshop on Economics of Information Security (WEIS 2011) , at George Mason University. Most of the papers are online, and Ross Anderson is liveblogging...schneier From Schneier on Security | June 15, 2011 at 06:19 PM
Worth reading: Morgan Leigh Manning, "Less than Picture Perfect: The Legal Relationship between Photographers' Rights and Law Enforcement," Tennessee Law Review...schneier From Schneier on Security | June 14, 2011 at 06:45 PM
Last night, at the Third EPIC Champion of Freedom Awards Dinner, we gave an award to Susie Castillo, whose blog post and video of her treatment in the hands of...schneier From Schneier on Security | June 14, 2011 at 12:54 PM
I've been asked this question by countless reporters in the past couple of weeks. Here's a good explanation. Shorter answer: it's easy to spoof source destination...schneier From Schneier on Security | June 13, 2011 at 11:52 AM
Patrick Gray on why we secretly love LulzSec, and Robert Cringely on why we openly hate RSA.
schneier From Schneier on Security | June 10, 2011 at 05:59 PM
Interesting:
Iscon's patented, thermo-conductive technology combines infrared (IR) and heat transfer, for high-resolution imaging without using any radiation....schneier From Schneier on Security | June 10, 2011 at 11:14 AM
Interesting research: Kirill Levchenko, et al. (2010), "Click Trajectories -- End-to-End Analysis of the Spam Value Chain," IEEE Symposium on Security and Privacy...schneier From Schneier on Security | June 9, 2011 at 06:53 PM
I have no idea if this is true:
In some cases, popular illegal forums used by cyber criminals as marketplaces for stolen identities and credit card numbers have...schneier From Schneier on Security | June 8, 2011 at 08:46 PM
Here's a new law that won't work:
State lawmakers in country music's capital have passed a groundbreaking measure that would make it a crime to use a friend's...schneier From Schneier on Security | June 7, 2011 at 10:32 AM
MI6 hacked into an online al-Qaeda magazine and replaced bomb-making instructions with a cupcake recipe.
It's a more polite hack than subtly altering the recipe...schneier From Schneier on Security | June 6, 2011 at 07:59 PM
Redaction failures are so common that I stopped blogging about them years ago. This is the first analysis I have seen of technical redaction failures. And here's...schneier From Schneier on Security | June 6, 2011 at 12:06 PM
Neat:
The rebuild team had only a few photographs, partial circuit diagrams and the fading memories of a few original Tunny operators to go on. Nonetheless a team...schneier From Schneier on Security | June 3, 2011 at 06:49 PM
At first glance, this seems like a particularly dumb opening line of an article:
Open-source software may not sound compatible with the idea of strong cybersecurity...schneier From Schneier on Security | June 2, 2011 at 05:11 PM
Reporters have been calling me pretty much constantly about this story, but I can't figure out why in the world this is news. Attacks from China -- old news; attacks...schneier From Schneier on Security | June 2, 2011 at 02:48 PM
In Applied Cryptography, I wrote about the "Chess Grandmaster Problem," a man-in-the-middle attack. Basically, Alice plays chess remotely with two grandmasters...schneier From Schneier on Security | June 2, 2011 at 12:32 PM