From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The whitelist/blacklist debate is far older than computers, and it's instructive to recall what works where. Physical security works generally on a whitelist model...schneier From Schneier on Security | January 28, 2011 at 02:20 PM
As the article says, it doesn't get any more ironic than that.
More importantly, it demonstrates how hard it is to keep secrets in the age of the Internet.
...schneier From Schneier on Security | January 27, 2011 at 12:22 PM
This is a bit surreal:
Additional steps are needed to prepare Broadway theaters in New York City for a potential WMD attack or other crisis, a New York state legislature...schneier From Schneier on Security | January 26, 2011 at 07:42 PM
It's amazing how many security cameras are on the Internet, accessible by anyone.
And it's not just for viewing; a lot of these cameras can be reprogrammed by...schneier From Schneier on Security | January 26, 2011 at 12:28 PM
A group of students at the Chinese University in Hong Kong have figured out how to store data in bacteria. The article talks about how secure it is, and the students...schneier From Schneier on Security | January 25, 2011 at 07:40 PM
According to this study, REAL-ID has not only been cheaper to implement than the states estimated, but also helpful in reducing fraud.
States are finding that...schneier From Schneier on Security | January 25, 2011 at 12:16 PM
At the Black Hat conference lasts week, Jamie Schwettmann and Eric Michaud presented some great research on hacking tamper-evident seals.
Jamie Schwettmann and...schneier From Schneier on Security | January 24, 2011 at 07:20 PM
This safecracking robot tries every possible combination, one after another:
Combination space optimization is the key. By exploiting of the mechanical tolerances...schneier From Schneier on Security | January 24, 2011 at 12:15 PM
This screen shot is from the movie "Good Time Max." 17 minutes and 52 seconds into the movie, it shows Blowfish being used as an encryption algorithm.
schneier From Schneier on Security | January 21, 2011 at 08:36 PM
A new report from the OECD says the threat of cyberwar has been grossly exaggerated. (Hey, that's what I said.)
There are lots of news articles.
Also worth...schneier From Schneier on Security | January 21, 2011 at 05:59 PM
Interesting research:
We looked at the standard legal documents issued by the certificate authorities or "CAs," including exemplar Subscriber Agreements (agreements...schneier From Schneier on Security | January 21, 2011 at 11:31 AM
Research paper from Mark Stewart and John Mueller:
The Transportation Security Administration (TSA) has been deploying Advanced Imaging Technologies (AIT) that...schneier From Schneier on Security | January 20, 2011 at 07:39 PM
This week, the U.S. Supreme Court will hear arguments about whether or not corporations have the same rights to "personal privacy" that individuals do.
Thisbrief...schneier From Schneier on Security | January 20, 2011 at 12:44 PM
He's not in it for the money:
Mr. Landis...has been one of the most prolific forgers American museums have encountered in years, writing, calling and presenting...schneier From Schneier on Security | January 19, 2011 at 01:02 PM
This would make a great movie:
Rep. Dan Burton, R-Ind., renewed his call for the installation of an impenetrable, see-through security shield around the viewing...schneier From Schneier on Security | January 18, 2011 at 12:29 PM
This long New York Times article includes some interesting revelations. The article claims that Stuxnet was a joint Israeli-American project, and that its effectiveness...schneier From Schneier on Security | January 17, 2011 at 06:31 PM
I wrote a lot last year about the assassination of Mahmoud al-Mabhouh in Dubai. There's a new article by an Israeli investigative journalist that tells the story...schneier From Schneier on Security | January 17, 2011 at 11:47 AM
Last week, I spoke at an airport security conference hosted by EPIC: The Stripping of Freedom: A Careful Scan of TSA Security Procedures. Here's the video of my...schneier From Schneier on Security | January 14, 2011 at 08:11 PM