From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Police set up a highway sign warning motorists that there are random stops for narcotics checks ahead, but actually search people who take the next exit.
schneier From Schneier on Security | September 15, 2010 at 11:12 AM
Interesting story:
I was detained last night by federal authorities at San Francisco International Airport for refusing to answer questions about why I had travelled...schneier From Schneier on Security | September 14, 2010 at 05:58 PM
Kenzero is a Japanese Trojan that collects and publishes users' porn surfing habits, and then blackmails them to remove the information.
schneier From Schneier on Security | September 13, 2010 at 11:46 AM
In Japan:
These balls full of orange paint are anti-theft devices. When someone robs a store, the clerk can throw the ball at the perp (or at the perp's feet)...schneier From Schneier on Security | September 9, 2010 at 06:32 PM
From NPR:
Based on surveys Barnes collected, the top five worries of parents are, in order:
Kidnapping
School snipers
Terroristsknows,...schneier From Schneier on Security | September 8, 2010 at 11:06 AM
If you're a typical wired American, you've got a bunch of tech tools you like and a bunch more you covet. You have a cell phone that can easily text. You've got...schneier From Schneier on Security | September 7, 2010 at 12:25 PM
Back in 2007, I wrote an essay, "Portrait of the Modern Terrorist as an Idiot," where I said:
The JFK Airport plotters seem to have been egged on by an informant...schneier From Schneier on Security | September 6, 2010 at 12:24 PM
Interesting:
Who are these certificate authorities? At the beginning of Web history, there were only a handful of companies, like Verisign, Equifax, and Thawte...schneier From Schneier on Security | September 3, 2010 at 11:27 AM
Clever:
Quantum cryptography is often touted as being perfectly secure. It is based on the principle that you cannot make measurements of a quantum system without...schneier From Schneier on Security | September 2, 2010 at 06:46 PM
This is beyond stupid:
The Pentagon is contemplating an aggressive approach to defending its computer systems that includes preemptive actions such as knocking...schneier From Schneier on Security | September 2, 2010 at 12:33 PM
As part of NIST's SHA-3 selection process, people have been implementing the candidate hash functions on a variety of hardware and software platforms. Our team...schneier From Schneier on Security | September 1, 2010 at 06:17 PM
Skein is my new hash function. Well, "my" is an overstatement; I'm one of the eight designers. It was submitted to NIST for their SHA-3 competition, and oneselected...schneier From Schneier on Security | September 1, 2010 at 11:01 AM
"Protecting your daily in-home activity information from a wireless snooping attack," by Vijay Srinivasan, John Stankovic, and Kamin Whitehouse:
Abstract: In...schneier From Schneier on Security | August 31, 2010 at 05:39 PM