From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I'm not really worried about mistakes like this. Sure, a gun slips through occasionally, and a knife slips through even more often. (I'm sure the TSA doesn't catch...schneier From Schneier on Security | January 14, 2011 at 05:03 PM
Interesting reading, mostly for the probable effects of a terrorist-sized nuclear bomb.
A terrorist bomb is likely to be relatively small -- possibly only a fraction...schneier From Schneier on Security | January 14, 2011 at 01:07 PM
Johannesburg installed hundreds of networked traffic lights on its streets. The lights use a cellular modem and a SIM card to communicate.
Those lights introduced...schneier From Schneier on Security | January 13, 2011 at 06:54 PM
Here's a U.S. Army threat assessment of forged law-enforcement credentials.
The authors bought a bunch of fake badges:
Between November 2009 and March 2010, undercover...schneier From Schneier on Security | January 13, 2011 at 02:00 PM
Turns out you can make money by manipulating the network latency.
cPacket has developed a proof of concept showing that these side-channel attacks can be usedthis...schneier From Schneier on Security | January 12, 2011 at 12:59 PM
This will be nothing new to readers of this blog, but it's nice to read other people saying it too.
schneier From Schneier on Security | January 11, 2011 at 01:47 PM
Interesting:
So the train of logic is:
anything that can be called an "assassination" is inherently political;
very often the "politics" are obscure, personal...schneier From Schneier on Security | January 10, 2011 at 01:04 PM
It's an oil field:
Brazil's state-run Petrobras confirmed Wednesday that oil fields recently discovered offshore contained 8.3 billion barrels of recoverable crude...schneier From Schneier on Security | January 7, 2011 at 10:08 PM
Good essay:
Nineteenth-century anarchists promoted what they called the "propaganda of the deed," that is, the use of violence as a symbolic action to make a larger...schneier From Schneier on Security | January 7, 2011 at 12:30 PM
Sony used an ECDSA signature scheme to protect the PS3. Trouble is, they didn't pay sufficient attention to their random number generator.
schneier From Schneier on Security | January 6, 2011 at 11:52 AM
It's easy and cheap:
Speaking at the Chaos Computer Club (CCC) Congress in Berlin on Tuesday, a pair of researchers demonstrated a start-to-finish means of eavesdropping...schneier From Schneier on Security | January 5, 2011 at 12:20 PM
This feels very creepy and police-state-like. What on earth could WalMart be worried about?
schneier From Schneier on Security | January 4, 2011 at 03:34 PM
Watch the video.
What valuable security lessons does this teach?
EDITED TO ADD (1/3): And why aren't the polar bears destroying the hidden cameras that are...schneier From Schneier on Security | January 3, 2011 at 03:07 PM
DoD awarded a $6M grant to study squid skin:
"Our internal nickname for this project is 'squid skin,' but it is really about fundamental research," said Naomi...schneier From Schneier on Security | December 31, 2010 at 10:08 PM
This is new:
Adm. James Winnefeld told The Associated Press Friday that the Transportation Security Administration is "always trying to think ahead." Winnefeld...schneier From Schneier on Security | December 29, 2010 at 05:09 PM
Funny:
The data we collect is strictly anonymous, unless you've been kind enough to give us your name, email address, or other identifying information. And even...schneier From Schneier on Security | December 27, 2010 at 07:04 PM