From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The press is reporting a $32M theft of the cryptocurrency Ethereum. Like all such thefts, they're not a result of a cryptographic failure in the currencies, but...Bruce Schneier From Schneier on Security | July 20, 2017 at 10:12 AM
Slashdot asks if password masking -- replacing password characters with asterisks as you type them -- is on the way out. I don't know if that's true, but I would...Bruce Schneier From Schneier on Security | July 19, 2017 at 11:35 AM
Humble Bundle is selling a bunch of cybersecurity books very cheaply. You can get copies of Applied Cryptography, Secrets and Lies, and Cryptography Engineering...Bruce Schneier From Schneier on Security | July 18, 2017 at 07:38 AM
News from Australia: Under the law, internet companies would have the same obligations telephone companies do to help law enforcement agencies, Prime Minister Malcolm...Bruce Schneier From Schneier on Security | July 17, 2017 at 07:29 AM
They're rare: The one Dubielzig really wants is an eye from a giant squid, which has the biggest eye of any living animal -- it's the size of a dinner plate. "But...Bruce Schneier From Schneier on Security | July 14, 2017 at 05:35 PM
There are two opposing models of how the Internet has changed protest movements. The first is that the Internet has made protesters mightier than ever. This comes...Bruce Schneier From Schneier on Security | July 14, 2017 at 01:06 PM
A set of documents in Pakistan were detected as forgeries because their fonts were not in circulation at the time the documents were dated....Bruce Schneier From Schneier on Security | July 14, 2017 at 07:51 AM
I have a soft spot for interesting biological security measures, especially by plants. I've used them as examples in several of my books. Here's a new one: when...Bruce Schneier From Schneier on Security | July 13, 2017 at 07:06 AM
"Traffic shaping" -- the practice of tricking data to flow through a particular route on the Internet so it can be more easily surveiled -- is an NSA technique...Bruce Schneier From Schneier on Security | July 12, 2017 at 07:32 AM
This article argues that AI technologies will make image, audio, and video forgeries much easier in the future. Combined, the trajectory of cheap, high-quality...Bruce Schneier From Schneier on Security | July 10, 2017 at 07:04 AM
Counting squid is not easy. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting...Bruce Schneier From Schneier on Security | July 7, 2017 at 03:08 PM
This teapot has two chambers. Liquid is released from one or the other depending on whether an air hole is covered. I want one....Bruce Schneier From Schneier on Security | July 7, 2017 at 02:01 PM
The Intelligence Advanced Research Projects Activity (IARPA) is soliciting proposals for research projects in secure multiparty computation: Specifically of interest...Bruce Schneier From Schneier on Security | July 7, 2017 at 07:20 AM
The website key.me will make a duplicate key from a digital photo. If a friend or coworker leaves their keys unattended for a few seconds, you know what to do.....Bruce Schneier From Schneier on Security | July 6, 2017 at 07:27 AM
It's hard to tell how much of this story is real and how much is aspirational, but it really is only a matter of time: About the size of a child's electric toy...Bruce Schneier From Schneier on Security | July 5, 2017 at 01:48 PM
Good commentaries from Ed Felten and Matt Blaze. Both make a point that I have also been saying: hacks can undermine the legitimacy of an election, even if there...Bruce Schneier From Schneier on Security | July 5, 2017 at 07:58 AM
I don't have anything to say -- mostly because I'm otherwise busy -- about the malware known as GoldenEye, NotPetya, or ExPetr. But I wanted a post to park links...Bruce Schneier From Schneier on Security | July 4, 2017 at 04:40 PM
This is nice work: "The Password Reset MitM Attack," by Nethanel Gelerntor, Senia Kalma, Bar Magnezi, and Hen Porcilan: Abstract: We present the password reset...Bruce Schneier From Schneier on Security | July 3, 2017 at 07:01 AM
According to a lawsuit (main article behind paywall), "a Miami-based food vendor and its supplier have been misrepresenting their squid as octopus in an effort...Bruce Schneier From Schneier on Security | June 30, 2017 at 05:22 PM