From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The Carnegie Endowment for Peace published a comprehensive report on ICT (information and communication technologies) supply-chain security and integrity. It's...Bruce Schneier From Schneier on Security | October 29, 2019 at 07:09 AM
In an extraordinary essay, the former FBI general counsel Jim Baker makes the case for strong encryption over government-mandated backdoors: In the face of congressional...Bruce Schneier From Schneier on Security | October 28, 2019 at 07:22 AM
Interesting article and paper. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...Bruce Schneier From Schneier on Security | October 25, 2019 at 05:04 PM
The US Department of Justice unraveled a dark web child-porn website, leading to the arrest of 337 people in at least 18 countries. This was all accomplished not...Bruce Schneier From Schneier on Security | October 25, 2019 at 07:14 AM
This is really interesting: "A Data-Driven Reflection on 36 Years of Security and Privacy Research," by Aniqua Baset and Tamara Denning: Abstract: Meta-research...Bruce Schneier From Schneier on Security | October 24, 2019 at 07:21 AM
There was a successful attack against NordVPN: Based on the command log, another of the leaked secret keys appeared to secure a private certificate authority that...Bruce Schneier From Schneier on Security | October 23, 2019 at 07:15 AM
Coming out of the Privacy Commissioners' Conference in Albania, Public Voice is launching a petition for an international moratorium on using facial recognition...Bruce Schneier From Schneier on Security | October 22, 2019 at 11:12 AM
NIST has completed a study -- it was published last year, but I just saw it recently -- calculating the costs and benefits of the Advanced Encryption Standard....Bruce Schneier From Schneier on Security | October 22, 2019 at 06:56 AM
Interesting details on Olympic Destroyer, the nation-state cyberattack against the 2018 Winter Olympic Games in South Korea. Wired's Andy Greenberg presents evidence...Bruce Schneier From Schneier on Security | October 21, 2019 at 07:23 AM
It's likely the diamondback squid. There's a video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...Bruce Schneier From Schneier on Security | October 18, 2019 at 05:11 PM
Last month, I gave a 15-minute talk in London titled: "Why technologists need to get involved in public policy." In it, I try to make the case for public-interest...Bruce Schneier From Schneier on Security | October 18, 2019 at 03:38 PM
Interesting proof of concept: At the CS3sthlm security conference later this month, security researcher Monta Elkins will show how he created a proof-of-concept...Bruce Schneier From Schneier on Security | October 18, 2019 at 06:54 AM
This is interesting research: In a BGP hijack, a malicious actor convinces nearby networks that the best path to reach a specific IP address is through their network...Bruce Schneier From Schneier on Security | October 17, 2019 at 07:08 AM
Lots of them weren't very good: BSD co-inventor Dennis Ritchie, for instance, used "dmac" (his middle name was MacAlistair); Stephen R. Bourne, creator of the Bourne...Bruce Schneier From Schneier on Security | October 15, 2019 at 11:38 AM
This theoretical paper shows how to factor 2048-bit RSA moduli with a 20-million qubit quantum computer in eight hours. It's interesting work, but I don't want...Bruce Schneier From Schneier on Security | October 14, 2019 at 07:58 AM
Apple fixed the squid emoji in iOS 13.1: A squid's siphon helps it move, breathe, and discharge waste, so having the siphon in back makes more sense than having...Bruce Schneier From Schneier on Security | October 11, 2019 at 05:29 PM
I just published my third collection of essays: We Have Root. This book covers essays from 2013 to 2017. (The first two are Schneier on Security and Carry On.)...Bruce Schneier From Schneier on Security | October 11, 2019 at 03:34 PM
Kaspersky has uncovered an Uzbeki hacking operation, mostly due to incompetence on the part of the government hackers. The group's lax operational security includes...Bruce Schneier From Schneier on Security | October 11, 2019 at 07:14 AM
Kaspersky has a detailed blog post about a new piece of sophisticated malware that it's calling Reductor. The malware is able to compromise TLS traffic by infecting...Bruce Schneier From Schneier on Security | October 10, 2019 at 02:49 PM
Free Wi-Fi hotspots can track your location, even if you don't connect to them. This is because your phone or computer broadcasts a unique MAC address. What distinguishes...Bruce Schneier From Schneier on Security | October 10, 2019 at 06:49 AM