From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Interesting: There is one feature of the squid that is not transparent and which could act as a signal to prey the eyes. However, the squid has a developed protection...Bruce Schneier From Schneier on Security | June 24, 2016 at 05:39 PM
Stories of burglars using social media to figure out who's on vacation are old hat. Now financial investigators are using social media to find hidden wealth....Bruce Schneier From Schneier on Security | June 24, 2016 at 07:29 AM
Michah Lee has a nice comparison among Signal, WhatsApp, and Allo. In this article, I'm going to compare WhatsApp, Signal, and Allo from a privacy perspective....Bruce Schneier From Schneier on Security | June 23, 2016 at 07:54 AM
IPv4 addresses are valuable, so criminals are figuring out how to buy or steal them. Hence criminals' interest in ways to land themselves IP addresses, some of...Bruce Schneier From Schneier on Security | June 22, 2016 at 02:15 PM
Amy Zegert has some good questions, comparing the Orlando Pulse massacre to the Fort Hood massacre from 2009....Bruce Schneier From Schneier on Security | June 22, 2016 at 07:04 AM
Ronald V. Clarke argues for more situational awareness in crime prevention. Turns out if you make crime harder, it goes down. And this has profound policy implications...Bruce Schneier From Schneier on Security | June 21, 2016 at 01:16 PM
Interesting: Since the team had tracked these groups daily, researchers could observe the tactics that pro-ISIS groups use to evade authorities. They found that...Bruce Schneier From Schneier on Security | June 21, 2016 at 07:01 AM
Last week, CIA director John Brennan told a Senate committee that there wasn't any strong cryptography outside of the US. CIA director John Brennan told US senators...Bruce Schneier From Schneier on Security | June 20, 2016 at 01:24 PM
The New York Times is reporting that some women in China are being forced to supply nude photos of themselves as collateral for getting a loan. Aside from the awfulness...Bruce Schneier From Schneier on Security | June 20, 2016 at 07:01 AM
The Internet is buzzing -- at least, my little corner of the Internet -- about finding a 120-meter-long giant squid on Google Earth. It's a false alarm. As usual...Bruce Schneier From Schneier on Security | June 17, 2016 at 05:05 PM
This essay argues that teaching computer science at the K-12 level is a matter of national security. I think the argument is even broader. Computers, networks,...Bruce Schneier From Schneier on Security | June 17, 2016 at 07:33 AM
At the Apple Worldwide Developers Conference earlier this week, Apple talked about something called "differential privacy." We know very little about the details...Bruce Schneier From Schneier on Security | June 16, 2016 at 10:30 PM
Typosquatting is an old trick of registering a domain name a typo away from a popular domain name and using it for various nefarious purposes. Nikolai Philipp Tschacher...Bruce Schneier From Schneier on Security | June 15, 2016 at 07:47 AM
The Washington Post is reporting that Russian hackers penetrated the network of the Democratic National Committee and stole opposition research on Donald Trump....Bruce Schneier From Schneier on Security | June 14, 2016 at 01:50 PM
There's an interesting message in the documents about Snowden that Vice magazine got out of the NSA with a FOIA request. At least in 2012, the NSA was using Word...Bruce Schneier From Schneier on Security | June 13, 2016 at 08:01 AM
Two years ago, I posted a photograph of a beautiful giant bronze squid sculpture by Kirk McGuire. He has a new sculpture: a squid table base. it's also beautiful...Bruce Schneier From Schneier on Security | June 10, 2016 at 05:38 PM
This interesting essay argues that financial risks are generally not systemic risks, and instead are generally much smaller. That's certainly been our experience...Bruce Schneier From Schneier on Security | June 10, 2016 at 01:56 PM
It makes for interesting reading. Someone noticed that parts of it read like standard modern office procedures....Bruce Schneier From Schneier on Security | June 10, 2016 at 10:54 AM
People who don't want Wayz routing cars through their neighborhoods are feeding it false data. It was here that Connor learned that some Waze warriors had launched...Bruce Schneier From Schneier on Security | June 9, 2016 at 07:17 AM