From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Wired summarizes research by Christopher Soghoian:
Sprint Nextel provided law enforcement agencies with customer location data more than 8 million times between...schneier From Schneier on Security | December 3, 2009 at 11:47 AM
It can be impossible to securely delete a file:
What are the security implications of Volume Shadow Copy?
Suppose you decide to protect one of your documents...schneier From Schneier on Security | December 2, 2009 at 09:49 AM
This research centers on looking at the radio characteristics of individual RFID chips and creating a "fingerprint." It makes sense; fingerprinting individual...schneier From Schneier on Security | December 1, 2009 at 04:15 PM
National Journal has an excellent article on cyberwar policy. I agree with the author's comments on The Atlantic blog:
Would the United States ever use a morereport...schneier From Schneier on Security | December 1, 2009 at 12:59 PM
This is a very interesting paper: "The Real Hustle, which does hidden camera demonstrations of con games. (There's no DVD of the show available, but there areprevious...schneier From Schneier on Security | November 30, 2009 at 10:20 AM
This 1996 interview with psychiatrist Robert DuPont was part of a Frontline program called "Nuclear Reaction."
He's talking about the role fear plays in the perception...schneier From Schneier on Security | November 27, 2009 at 02:25 PM
Wikileaks has published pager intercepts from New York on 9/11:
WikiLeaks released half a million US national text pager intercepts. The intercepts cover a 24nuggets...schneier From Schneier on Security | November 26, 2009 at 01:11 PM
Long, detailed, and very good story of the Mumbai terrorist attacks of last year.
My own short commentary in the aftermath of the attacks.
schneier From Schneier on Security | November 25, 2009 at 07:52 PM
If you allow players in an online world to penalize each other, you open the door to extortion:
One of the features that supported user socialization in the game...schneier From Schneier on Security | November 25, 2009 at 10:11 AM
This paper, by Cormac Herley at Microsoft Research, sounds like me:
Abstract: It is often suggested that users are hopelessly lazy and unmotivated on securityme...schneier From Schneier on Security | November 24, 2009 at 04:06 PM
Norbt (no robot) is a low-security web application to encrypt web pages. You can create and encrypt a webpage. The key is an answer to a question; anyone who...schneier From Schneier on Security | November 24, 2009 at 09:24 AM
This article reads like something written by the company's PR team.
When it comes to sleuthing these days, knowing your way within a database is as valued a skill...schneier From Schneier on Security | November 23, 2009 at 08:36 PM
I would sure like to know more about this:
Top code-breakers at the Government Communications Headquarters in the United Kingdom have succeeded in breaking the...schneier From Schneier on Security | November 23, 2009 at 09:53 AM
An expedition to study seamounts in the Indian Ocean has discovered some new species, including some squid.
schneier From Schneier on Security | November 20, 2009 at 10:57 PM
Yet another interview with me. This one is audio, and was conducted in Rotterdam in October.
schneier From Schneier on Security | November 20, 2009 at 04:20 PM
Interesting:
The researchers say they've found a vulnerability in U.S. law enforcement wiretaps, if only theoretical, that would allow a surveillance target to...schneier From Schneier on Security | November 20, 2009 at 09:22 AM
At the Internet Governance Forum in Sharm El Sheikh this week, there was a conversation on social networking data. Someone made the point that there are several...schneier From Schneier on Security | November 19, 2009 at 09:26 AM