From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Interesting research -- "Cracking Android Pattern Lock in Five Attempts": Abstract: Pattern lock is widely used as a mechanism for authentication and authorization...Bruce Schneier From Schneier on Security | January 25, 2017 at 07:18 AM
Good article that crunches the data and shows that the press's coverage of terrorism is disproportional to its comparative risk. This isn't new. I've written about...Bruce Schneier From Schneier on Security | January 24, 2017 at 07:31 AM
NextGov has a nice article summarizing President Obama's accomplishments in Internet security: what he did, what he didn't do, and how it turned out....Bruce Schneier From Schneier on Security | January 23, 2017 at 07:55 AM
This graphic shows the important difference between arms and tentacles. As usual, you can also use this squid post to talk about the security stories in the news...Bruce Schneier From Schneier on Security | January 20, 2017 at 05:19 PM
Two days ago, the White House released a report on privacy: "Privacy in our Digital Lives: Protecting Individuals and Promoting Innovation." The report summarizes...Bruce Schneier From Schneier on Security | January 20, 2017 at 10:51 AM
There's research in using a heartbeat as a biometric password. No details in the article. My guess is that there isn't nearly enough entropy in the reproducible...Bruce Schneier From Schneier on Security | January 19, 2017 at 07:22 AM
Back in March, Rolf Weber wrote about a potential vulnerability in the WhatsApp protocol that would allow Facebook to defeat perfect forward secrecy by forcibly...Bruce Schneier From Schneier on Security | January 17, 2017 at 07:09 AM
Interesting post on Cloudflare's experience with receiving a National Security Letter. News article....Bruce Schneier From Schneier on Security | January 16, 2017 at 07:40 AM
This article discusses a giant squid attack on a schooner off the coast of Sri Lanka in 1874. As usual, you can also use this squid post to talk about the security...Bruce Schneier From Schneier on Security | January 13, 2017 at 05:52 PM
Imagine that you are someone in the CIA, concerned about the future of America. You have this Russian dossier on Donald Trump, which you have some evidence might...Bruce Schneier From Schneier on Security | January 13, 2017 at 12:58 PM
Interesting research: Sebastian Hellmeier, "The Dictator's Digital Toolkit: Explaining Variation in Internet Filtering in Authoritarian Regimes," Politics & Policy...Bruce Schneier From Schneier on Security | January 13, 2017 at 07:48 AM
President Obama has changed the rules regarding raw intelligence, allowing the NSA to share raw data with the US's other 16 intelligence agencies. The new rules...Bruce Schneier From Schneier on Security | January 12, 2017 at 01:07 PM
New paper: "A Simple Power Analysis Attack on the Twofish Key Schedule." This shouldn't be a surprise; these attacks are devastating if you don't take steps to...Bruce Schneier From Schneier on Security | January 12, 2017 at 07:28 AM
In the first of what will undoubtedly be a large number of battles between companies that make IoT devices and the police, Amazon is refusing to comply with a warrant...Bruce Schneier From Schneier on Security | January 11, 2017 at 07:22 AM
I am co-author on a paper discussing whether elections be classified as "critical infrastructure" in the US, based on experiences in other countries: Abstract:...Bruce Schneier From Schneier on Security | January 10, 2017 at 07:02 AM
The FDA has issued a report giving medical devices guidance on computer and network security. There's nothing particularly new or interesting; it reads like standard...Bruce Schneier From Schneier on Security | January 10, 2017 at 06:06 AM
President Barack Obama's public accusation of Russia as the source of the hacks in the US presidential election and the leaking of sensitive e-mails through WikiLeaks...Bruce Schneier From Schneier on Security | January 9, 2017 at 06:53 AM
Easy recipe from America's Test Kitchen. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | January 6, 2017 at 05:29 PM
Good article debunking the myth that requiring people to use their real names on the Internet makes them behave better....Bruce Schneier From Schneier on Security | January 6, 2017 at 10:44 AM