From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In 2006, writing about future threats on privacy, I described a life recorder:
A "life recorder" you can wear on your lapel that constantly records is still abeen...schneier From Schneier on Security | April 19, 2010 at 11:30 AM
CCTV cameras in Moscow have been accused of streaming prerecorded video instead of live images.
What I can't figure out is why? To me, it seems easier for the...schneier From Schneier on Security | April 16, 2010 at 05:46 PM
Last weekend I was in New York, and saw posters on the subways warning people about real guns painted to look like toys. And today I find these pictures from the...schneier From Schneier on Security | April 16, 2010 at 11:28 AM
Interesting study: "Patients, Pacemakers, and Implantable Defibrillators: Human Values and Security for Wireless Implantable Medical Devices," Tamara Denning,Abstract...schneier From Schneier on Security | April 15, 2010 at 06:55 PM
This idea, by Stuart Schechter at Microsoft Research, is -- I think -- clever:
Abstract: Implantable medical devices, such as implantable cardiac defibrillators...schneier From Schneier on Security | April 15, 2010 at 11:43 AM
Fifteen years ago, Matt Blaze wrote an Afterword to my book Applied Cryptography. Here are his current thoughts on that piece of writing.
schneier From Schneier on Security | April 14, 2010 at 06:30 PM
Chris Hoofnagle has a new paper: "Internalizing Identity Theft." Basically, he shows that one of the problems is that lenders extend credit even when credit applications...schneier From Schneier on Security | April 14, 2010 at 11:57 AM
John Adams argues that our irrationality about comparative risks depends on the type of risk:
With "pure" voluntary risks, the risk itself, with its associated...schneier From Schneier on Security | April 13, 2010 at 06:18 PM
Nice analysis by John Mueller and Mark G. Stewart:
There is a general agreement about risk, then, in the established regulatory practices of several developed...schneier From Schneier on Security | April 13, 2010 at 08:54 AM
Says Matt Blaze:
A decade ago, I observed that commercial certificate authorities protect you from anyone from whom they are unwilling to take money. That turns...schneier From Schneier on Security | April 12, 2010 at 06:32 PM
An NYU student has been reverse-engineering facial recognition algorithms to devise makeup patterns to confuse face recognition software.
schneier From Schneier on Security | April 12, 2010 at 11:08 AM
Last month at the RSA Conference, I gave a talk titled "Security, Privacy, and the Generation Gap." It was pretty good, but it was the first time I gave that talk...schneier From Schneier on Security | April 9, 2010 at 05:55 PM
New cryptanalysis of the proprietrary encryption algorithm used in the Digital Enhanced Cordless Telecommunications (DECT) standard for cordless phones.
Abstract...schneier From Schneier on Security | April 8, 2010 at 06:05 PM
Air marshals are being arrested faster than air marshals are making arrests.
Actually, there have been many more arrests of Federal air marshals than that story...schneier From Schneier on Security | April 8, 2010 at 11:22 AM
Any ideas?
At a news conference at the National Press Club, WikiLeaks said it had acquired the video from whistle-blowers in the military and viewed it after breaking...schneier From Schneier on Security | April 7, 2010 at 06:37 PM
People intent on preventing a Moscow-style terrorist attack against the New York subway system are proposing a range of expensive new underground security measures...schneier From Schneier on Security | April 7, 2010 at 01:52 PM