From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
On Friday, WikiLeaks published three summaries of NSA intercepts of German government communications. To me, the most interesting thing is not the intercept analyses...Bruce Schneier From Schneier on Security | July 6, 2015 at 06:13 AM
Long article about a very lucrative squid-fishing industry that involves bribing the Cambodian Navy. As usual, you can also use this squid post to talk about the...Bruce Schneier From Schneier on Security | July 3, 2015 at 05:39 PM
It's the Internet, which means there must be cute animal videos on this blog. But this one is different. Watch a mother rabbit beat up a snake to protect her children...Bruce Schneier From Schneier on Security | July 3, 2015 at 01:13 PM
This is really clever: Enigma's technique -- what cryptographers call "secure multiparty computation" -- works by mimicking a few of the features of bitcoin's decentralized...Bruce Schneier From Schneier on Security | July 3, 2015 at 07:38 AM
The Intercept has published a highly detailed two-part article on how the NSA's XKEYSCORE works, including a huge number of related documents from the Snowden archive...Bruce Schneier From Schneier on Security | July 2, 2015 at 12:22 PM
I don't have much to say about the recent hack of the US Office of Personnel Management, which has been attributed to China (and seems to be getting worse all the...Bruce Schneier From Schneier on Security | July 1, 2015 at 07:32 AM
The official Twitter feed for my blog is @schneierblog. The account @Bruce_Schneier also mirrors my blog, but it is not mine. I have nothing to do with it, and...Bruce Schneier From Schneier on Security | June 30, 2015 at 02:16 PM
Interesting research from 2012: "The Dynamics of Evolving Beliefs, Concerns, Emotions, and Behavioral Avoidance Following 9/11: A Longitudinal Analysis of Representative...Bruce Schneier From Schneier on Security | June 30, 2015 at 07:27 AM
There's a new paper on a low-cost TEMPEST attack against PC cryptography: We demonstrate the extraction of secret decryption keys from laptop computers, by nonintrusively...Bruce Schneier From Schneier on Security | June 29, 2015 at 02:38 PM
Here's a comprehensive document on migrating from SHA-1 to SHA-2 in Active Directory certificates....Bruce Schneier From Schneier on Security | June 29, 2015 at 07:05 AM
I have always liked this one. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | June 26, 2015 at 05:32 PM
There are two other Snowden stories this week about GCHQ: one about its hacking practices, and the other about its propaganda and psychology research. The second...Bruce Schneier From Schneier on Security | June 26, 2015 at 01:12 PM
On Monday, the Intercept published a new story from the Snowden documents: The spy agencies have reverse engineered software products, sometimes under questionable...Bruce Schneier From Schneier on Security | June 26, 2015 at 07:59 AM
Wikileaks has published some NSA SIGINT documents describing intercepted French government communications. This seems not be from the Snowden documents. It could...Bruce Schneier From Schneier on Security | June 25, 2015 at 01:51 PM
I think this is the first case of one professional sports team hacking another. No idea if it was an official operation, or a couple of employees doing it on their...Bruce Schneier From Schneier on Security | June 25, 2015 at 07:14 AM
In May, Admiral James A. Winnefeld, Jr., vice-chairman of the Joint Chiefs of Staff, gave an address at the Joint Service Academies Cyber Security Summit at West...Bruce Schneier From Schneier on Security | June 24, 2015 at 08:42 AM
Former NSA Director Michael recently mocked the NSA reforms in the recently passed USA Freedom Act: If somebody would come up to me and say, "Look, Hayden, here's...Bruce Schneier From Schneier on Security | June 23, 2015 at 02:39 PM
Encryption protects our data. It protects our data when it's sitting on our computers and in data centers, and it protects it when it's being transmitted around...Bruce Schneier From Schneier on Security | June 23, 2015 at 07:02 AM
As we're all gearing up to fight the Second Crypto War over governments' demands to be able to back-door any cryptographic system, it pays for us to remember the...Bruce Schneier From Schneier on Security | June 22, 2015 at 02:35 PM
Last weekend, the Sunday Times published a front-page story (full text here), citing anonymous British sources claiming that both China and Russia have copies of...Bruce Schneier From Schneier on Security | June 22, 2015 at 07:13 AM