From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Interesting National Science Foundation award: In the proposed "CryptoClub" afterschool program, middle-grade students will explore cryptography while applying...Bruce Schneier From Schneier on Security | February 13, 2015 at 02:40 PM
Earlier this week, we learned that Samsung televisions are eavesdropping on their owners. If you have one of their Internet-connected smart TVs, you can turn on...Bruce Schneier From Schneier on Security | February 13, 2015 at 08:51 AM
DJI is programming no-fly zones into its drone software. Here's how it'll work. The update will add a list of GPS coordinates to the drone's computer that tells...Bruce Schneier From Schneier on Security | February 12, 2015 at 01:22 PM
Long New York Times article based on "former American and Indian officials and classified documents disclosed by Edward J. Snowden" outlining the intelligence failures...Bruce Schneier From Schneier on Security | February 12, 2015 at 07:57 AM
Here are two essays trying to understand NSA malware and how it works, in light of the enormous number of documents released by Speigel recently....Bruce Schneier From Schneier on Security | February 11, 2015 at 07:33 AM
In January, the National Academies of Science (NAS) released a report on the bulk collection of signals intelligence. Basically, a year previously President Obama...Bruce Schneier From Schneier on Security | February 9, 2015 at 05:20 PM
The Washington Department of Fish and Wildlife explains how to fish for squid. As usual, you can also use this squid post to talk about the security stories in...Bruce Schneier From Schneier on Security | February 6, 2015 at 06:58 PM
In the latest article based on the Snowden documents, the Intercept is reporting that the NSA and GCHQ are piggy-backing on the work of hackers: In some cases,...Bruce Schneier From Schneier on Security | February 6, 2015 at 10:41 AM
Werner Koch, who has been maintaining the GPG email encryption program since 1997, is going broke and considering quitting. Updates to the article say that, because...Bruce Schneier From Schneier on Security | February 5, 2015 at 08:50 PM
Interesting paper: "There's No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams," by Marie Vasek and Tyler Moore. Abstract...Bruce Schneier From Schneier on Security | February 4, 2015 at 08:48 AM
In an interview this week, President Obama said that terrorism does not pose an existential threat: What I do insist on is that we maintain a proper perspective...Bruce Schneier From Schneier on Security | February 3, 2015 at 07:15 AM
Seems that a Texas school has suspended a 9-year-old for threatening another student with a replica One Ring. (Yes, that One Ring.) I've written about this sort...Bruce Schneier From Schneier on Security | February 2, 2015 at 01:50 PM
In Colombia: The team began experimenting with Morse code using various percussion instruments and a keyboard. They learned that operators skilled in Morse code...Bruce Schneier From Schneier on Security | February 2, 2015 at 08:01 AM
No mention of the species, but the photo is a depressing one. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...Bruce Schneier From Schneier on Security | January 30, 2015 at 05:40 PM
This was supposed to be a secret until the middle of February, but we've been found out. We already have European customers; this is our European office. And, by...Bruce Schneier From Schneier on Security | January 30, 2015 at 03:57 PM
Here's a story of a fake bank in China -- a real bank, not an online bank -- that stole $32m from depositors over a year. Pro tip: real banks never offer 2%/week...Bruce Schneier From Schneier on Security | January 30, 2015 at 07:49 AM
Another story from the Snowden documents: According to the documents, the LEVITATION program can monitor downloads in several countries across Europe, the Middle...Bruce Schneier From Schneier on Security | January 29, 2015 at 07:26 AM
I missed this paper when it was first published in 2012: "Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks" Abstract...Bruce Schneier From Schneier on Security | January 28, 2015 at 08:00 AM
In the latest example of a military technology that has secretly been used by the police, we have radar guns that can see through walls....Bruce Schneier From Schneier on Security | January 27, 2015 at 02:08 PM
Here's an IDEA-variant with a 128-bit block length. While I think it's a great idea to bring IDEA up to a modern block length, the paper has none of the cryptanalysis...Bruce Schneier From Schneier on Security | January 27, 2015 at 07:24 AM