From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Jonathan Zittrain proposes a very interesting hypothetical: Suppose a laptop were found at the apartment of one of the perpetrators of last year's Paris attacks...Bruce Schneier From Schneier on Security | January 16, 2016 at 06:26 AM
Troy Hunt has identified a new spam vector. PayPal allows someone to send someone else a $0 invoice. The spam is in the notes field. But it's a legitimate e-mail...Bruce Schneier From Schneier on Security | January 15, 2016 at 07:45 AM
Cory Doctorow has a good post on the EFF website about how they're trying to fight digital rights management software in the World Wide Web Consortium. So we came...Bruce Schneier From Schneier on Security | January 14, 2016 at 03:13 PM
This article talks about the opsec used by Sean Penn surrounding his meeting with El Chapo. Security experts say there aren't enough public details to fully analyze...Bruce Schneier From Schneier on Security | January 14, 2016 at 07:32 AM
SilverPush is an Indian startup that's trying to figure out all the different computing devices you own. It embeds inaudible sounds into the webpages you read and...Bruce Schneier From Schneier on Security | January 13, 2016 at 06:35 AM
Last week, former NSA Director Michael Hayden made a very strong argument against deliberately weakening security products by adding backdoors: Americans' safety...Bruce Schneier From Schneier on Security | January 12, 2016 at 02:22 PM
Interesting analysis: Which software had the most publicly disclosed vulnerabilities this year? The winner is none other than Apple's Mac OS X, with 384 vulnerabilities...Bruce Schneier From Schneier on Security | January 11, 2016 at 03:33 PM
Professional pilot Ron Rapp has written a fascinating article on a 2014 Gulfstream plane that crashed on takeoff. The accident was 100% human error and entirely...Bruce Schneier From Schneier on Security | January 11, 2016 at 07:45 AM
Squid ink pasta is not hard to make, and is a really good side for a wide variety of fish recipes. As usual, you can also use this squid post to talk about the...Bruce Schneier From Schneier on Security | January 8, 2016 at 05:05 PM
The Technoskeptic has posted a good interview with me on its website. Normally it charges for its content, but this interview is available for free....Bruce Schneier From Schneier on Security | January 8, 2016 at 03:15 PM
Fascinating New Yorker article about Samantha Azzopardi, serial con artist and deceiver. The article is really about how our brains allow stories to deceive us:...Bruce Schneier From Schneier on Security | January 8, 2016 at 01:54 PM
China is considering a new "social credit" system, designed to rate everyone's trustworthiness. Many fear that it will become a tool of social control -- but in...Bruce Schneier From Schneier on Security | January 8, 2016 at 06:21 AM
Nice essay that lists ten "truths" about terrorism: We can't keep the bad guys out. Besides, the threat is already inside. More surveillance won't get rid of terrorism...Bruce Schneier From Schneier on Security | January 7, 2016 at 08:00 AM
There's an excellent article in Foreign Affairs on how the European insistence on data privacy -- most recently illustrated by their invalidation of the "safe harbor"...Bruce Schneier From Schneier on Security | January 6, 2016 at 07:14 AM
Recently declassified: Deception Maxims: Fact and Folklore, Office of Research and Development, Central Intelligence Agency, June 1981. Research on deception and...Bruce Schneier From Schneier on Security | January 5, 2016 at 01:44 PM
The Wall Street Journal has a story that the NSA spied on Israeli Prime Minister Benjamin Netanyahu and other Israeli government officials, and incidentally collected...Bruce Schneier From Schneier on Security | January 5, 2016 at 07:36 AM
On the Intercept, Micah Lee has a good article that talks about how Microsoft is collecting the hard-drive encryption keys of Windows 10 users, and how to disable...Bruce Schneier From Schneier on Security | January 4, 2016 at 02:14 PM
Interesting blog post: We are able to de-anonymize executable binaries of 20 programmers with 96% correct classification accuracy. In the de-anonymization process...Bruce Schneier From Schneier on Security | January 4, 2016 at 08:41 AM
Giant squid filmed swimming through a harbor in Japan: Reports in Japanese say that the creature was filmed on December 24, seen by an underwater camera swimming...Bruce Schneier From Schneier on Security | January 1, 2016 at 01:29 PM
Cory Doctorow has a good essay on software integrity and control problems and the Internet of Things. He's writing about self-driving cars, but the issue is much...Bruce Schneier From Schneier on Security | December 31, 2015 at 07:12 AM