From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I have written a paper with Orin Kerr on encryption workarounds. Our goal wasn't to make any policy recommendations. (That was a good thing, since we probably don't...Bruce Schneier From Schneier on Security | March 22, 2017 at 07:23 AM
Here is a listing of all the documents that the NSA has in its archives that are dated earlier than 1930....Bruce Schneier From Schneier on Security | March 21, 2017 at 02:17 PM
WikiLeaks has started publishing a large collection of classified CIA documents, including information on several -- possibly many -- unpublished (i.e., zero-day)...Bruce Schneier From Schneier on Security | March 21, 2017 at 07:05 AM
This is William Friedman's highly annotated copy of Herbert Yardley's book, The American Black Chamber....Bruce Schneier From Schneier on Security | March 20, 2017 at 02:47 PM
Interesting research: "A Study of MAC Address Randomization in Mobile Devices When it Fails": Abstract: Media Access Control (MAC) address randomization is a privacy...Bruce Schneier From Schneier on Security | March 20, 2017 at 06:05 AM
News from the South Atlantic: While the outlook is good at present, it is too early to predict what the final balance of this season will be. The sector is totally...Bruce Schneier From Schneier on Security | March 17, 2017 at 05:27 PM
Researchers have demonstrated using Intel's Software Guard Extensions to hide malware and steal cryptographic keys from inside SGX's protected enclave: Malware...Bruce Schneier From Schneier on Security | March 16, 2017 at 06:54 AM
CloudPets are an Internet-connected stuffed animals that allow children and parents to send each other voice messages. Last week, we learned that Spiral Toys had...Bruce Schneier From Schneier on Security | March 15, 2017 at 01:14 PM
Some good election security news for a change: France is dropping its plans for remote Internet voting, because it's concerned about hacking....Bruce Schneier From Schneier on Security | March 15, 2017 at 07:20 AM
I am part of this very interesting project: For many users, blog posts on how to install Signal, massive guides to protecting your digital privacy, and broad statements...Bruce Schneier From Schneier on Security | March 14, 2017 at 02:08 PM
Brian Krebs posts a video advertisement for Philadelphia, a ransomware package that you can purchase....Bruce Schneier From Schneier on Security | March 14, 2017 at 08:01 AM
Useful best practices for malware writers, courtesy of the CIA. Seems like a lot of good advice. General: DO obfuscate or encrypt all strings and configuration...Bruce Schneier From Schneier on Security | March 13, 2017 at 01:00 PM
The Department of Justice is dropping all charges in a child-porn case rather than release the details of a hack against Tor....Bruce Schneier From Schneier on Security | March 13, 2017 at 07:33 AM
Here are some squid cooking tips. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | March 10, 2017 at 05:02 PM
A decade ago, I wrote about the death of ephemeral conversation. As computers were becoming ubiquitous, some unintended changes happened, too. Before computers,...Bruce Schneier From Schneier on Security | March 10, 2017 at 07:15 AM
Google's Project Zero is serious about releasing the details of security vulnerabilities 90 days after they alert the vendors, even if they're unpatched. It just...Bruce Schneier From Schneier on Security | March 9, 2017 at 07:28 AM
If I had to guess right now, I'd say the documents came from an outsider and not an insider. My reasoning: One, there is absolutely nothing illegal in the contents...Bruce Schneier From Schneier on Security | March 8, 2017 at 10:08 AM