From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In 2013, in the early days of the Snowden leaks, Harvard Law School professor and former Assistant Attorney General Jack Goldsmith reflected on the increase in...Bruce Schneier From Schneier on Security | November 24, 2015 at 07:32 AM
There hasn't been that much written about surveillance and big data being used to manipulate voters. In Data and Goliath, I wrote: Unique harms can arise from the...Bruce Schneier From Schneier on Security | November 23, 2015 at 01:52 PM
Divers are counting them: Squid gather and mate with as many partners as possible, then die, in an annual ritual off Rapid Head on the Fleurieu Peninsula, south...Bruce Schneier From Schneier on Security | November 20, 2015 at 05:30 PM
Reputation is a social mechanism by which we come to trust one another, in all aspects of our society. I see it as a security mechanism. The promise and threat...Bruce Schneier From Schneier on Security | November 20, 2015 at 08:04 AM
They're for carrying cash through dangerous territory: SDR Traveller caters to people who, for one reason or another, need to haul huge amounts of cash money through...Bruce Schneier From Schneier on Security | November 19, 2015 at 07:16 AM
That is, no encryption at all. The Intercept has the story: "Yet news emerging from Paris -- as well as evidence from a Belgian ISIS raid in January -- suggests...Bruce Schneier From Schneier on Security | November 18, 2015 at 04:35 PM
This is creepy and disturbing: Privacy advocates are warning federal authorities of a new threat that uses inaudible, high-frequency sounds to surreptitiously track...Bruce Schneier From Schneier on Security | November 18, 2015 at 07:59 AM
I have avoided writing about the Cybersecurity Information Sharing Act (CISA), largely because the details kept changing. (For those not following closely, similar...Bruce Schneier From Schneier on Security | November 17, 2015 at 01:03 PM
Paul Krugman has written a really good update of my 2006 esssay. Krugman: So what can we say about how to respond to terrorism? Before the atrocities in Paris,...Bruce Schneier From Schneier on Security | November 17, 2015 at 07:36 AM
Well, that didn't take long: As Paris reels from terrorist attacks that have claimed at least 128 lives, fierce blame for the carnage is being directed toward American...Bruce Schneier From Schneier on Security | November 16, 2015 at 03:39 PM
There's pretty strong evidence that the team of researchers from Carnegie Mellon University who canceled their scheduled 2015 Black Hat talk deanonymized Tor users...Bruce Schneier From Schneier on Security | November 16, 2015 at 07:19 AM
Amazon chose Data and Goliath as one of its Best Books of 2015, in both the nonfiction and business categories....Bruce Schneier From Schneier on Security | November 13, 2015 at 03:25 PM
Interesting research: "Who Knows What About Me? A Survey of Behind the Scenes Personal Data Sharing to Third Parties by Mobile Apps," by Jinyan Zang, Krysta Dummit...Bruce Schneier From Schneier on Security | November 13, 2015 at 07:08 AM
"Why Johnny Still, Still Can't Encrypt: Evaluating the Usability of a Modern PGP Client," by Scott Ruoti, Jeff Andersen, Daniel Zappala, and Kent Seamons. Abstract...Bruce Schneier From Schneier on Security | November 12, 2015 at 03:28 PM
This is an interesting story. Someone posts a photograph of herself holding a winning horse-race betting ticket, and someone else uses the data from the photograph...Bruce Schneier From Schneier on Security | November 12, 2015 at 08:01 AM
Jobs are plentiful and salaries are booming. I know from personal experience that demand far exceeds supply....Bruce Schneier From Schneier on Security | November 10, 2015 at 03:17 PM