From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
By two teenagers:
Mikalah uses Facebook but when she goes to log out, she deactivates her Facebook account. She knows that this doesnschneier From Schneier on Security | December 1, 2010 at 07:27 PM
In 2003, a group of security experts -- myself included -- published a paper saying that 1) software monocultures are dangerous and 2) Microsoft, being the largest...schneier From Schneier on Security | December 1, 2010 at 11:55 AM
Jeffrey Rosen opines:
Although the Supreme Court hasn't evaluated airport screening technology, lower courts have emphasized, as the U.S. Court of Appeals forThe...schneier From Schneier on Security | November 30, 2010 at 06:09 PM
I agree with Glenn Greenwald. I don't know if it's an actual terrorist that the FBI arrested, or if it's another case of entrapment.
All of the information about...schneier From Schneier on Security | November 30, 2010 at 11:54 AM
From a study on zoo security:
Among other measures, the scientists recommend not allowing animals to walk freely within the zoo grounds, and ensuring there is...schneier From Schneier on Security | November 29, 2010 at 06:32 PM
Total cost for the Yemeni printer cartridge bomb plot: $4200.
"Two Nokia mobiles, $150 each, two HP printers, $300 each, plus shipping, transportation and other...schneier From Schneier on Security | November 29, 2010 at 12:52 PM
At Woods Hole:
It is known now, through the work of Mooney and others, that the squid hearing system has some similarities and some differences compared to human...schneier From Schneier on Security | November 26, 2010 at 10:58 PM
I have been thinking a lot about security against psychopaths. Or, at least, how we have traditionally secured social systems against these sorts of people, and...schneier From Schneier on Security | November 26, 2010 at 07:52 PM
Interesting story of the withdrawal of the A5/2 encryption algorithm from GSM phones.
schneier From Schneier on Security | November 26, 2010 at 11:51 AM
Good. It was always a dumb idea:
The color-coded threat levels were doomed to fail because "they donschneier From Schneier on Security | November 25, 2010 at 12:39 PM
In Europe, although the article doesn't say where:
Many banks have fitted ATMs with devices that are designed to thwart criminals from attaching skimmers to the...schneier From Schneier on Security | November 24, 2010 at 07:33 PM
Yesterday I participated in a New York Times "Room for Debate" discussion on airline security. My contribution is nothing I haven't said before, so I won't reprint...schneier From Schneier on Security | November 23, 2010 at 12:11 PM
Rare common sense:
But Gen Richards told the BBC it was not possible to defeat the Taliban or al-Qaeda militarily.
"You can't. We've all said this. David Petraeus...schneier From Schneier on Security | November 22, 2010 at 07:08 PM
Another piece of the puzzle:
New research, published late last week, has established that Stuxnet searches for frequency converter drives made by Fararo Paya of...schneier From Schneier on Security | November 22, 2010 at 12:19 PM
Last week, I gave a talk on cyberwar and cyberconflict at the Institute for International and European Affairs in Dublin. Here's the video.
It was only the second...schneier From Schneier on Security | November 19, 2010 at 07:13 PM
Things are happening so fast that I don't know if I should bother. But here are some links and observations.
The head of the Allied Pilots Association is telling...schneier From Schneier on Security | November 19, 2010 at 11:37 AM
Excellent:
Here's a scenario:
Middle Eastern terrorists hijack a U.S. jetliner bound for Italy. A two-week drama ensues in which the plane's occupants are split...schneier From Schneier on Security | November 18, 2010 at 06:19 PM