From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The NSA recently declassified a report on the Eurocrypt '92 conference. Honestly, I share some of the writer's opinions on the more theoretical stuff. I know it's...Bruce Schneier From Schneier on Security | November 18, 2014 at 11:57 AM
New article on the NSA's efforts to control academic cryptographic research in the 1970s. It includes new interviews with public-key cryptography inventor Martin...Bruce Schneier From Schneier on Security | November 17, 2014 at 10:19 PM
The interesting story of how engineers at Ford Motor Co. invented the superconducting quantum interference device, or SQUID. As usual, you can also use this squid...Bruce Schneier From Schneier on Security | November 14, 2014 at 06:01 PM
Last month, for the first time since US export restrictions on cryptography were relaxed two decades ago, the US government has fined a company for exporting crypto...Bruce Schneier From Schneier on Security | November 14, 2014 at 10:58 AM
Pew Research has released a new survey on American's perceptions of privacy. The results are pretty much in line with all the other surveys on privacy I've read...Bruce Schneier From Schneier on Security | November 13, 2014 at 04:00 PM
It's not happening often, but it seems that some ISPs are blocking STARTTLS messages and causing web encryption to fail. EFF has the story....Bruce Schneier From Schneier on Security | November 13, 2014 at 08:43 AM
Orin Kerr has a new article that argues for narrowly constructing national security law: This Essay argues that Congress should adopt a rule of narrow construction...Bruce Schneier From Schneier on Security | November 11, 2014 at 03:41 PM
Kaspersky Labs is reporting (detailed report here, technical details here) on a sophisticated hacker group that is targeting specific individuals around the world...Bruce Schneier From Schneier on Security | November 10, 2014 at 03:55 PM
Good paper, and layman's explanation. Internet voting scares me. It gives hackers the potential to seriously disrupt our democratic processes....Bruce Schneier From Schneier on Security | November 10, 2014 at 02:43 PM
Security is a combination of protection, detection, and response. It's taken the industry a long time to get to this point, though. The 1990s was the era of protection...Bruce Schneier From Schneier on Security | November 10, 2014 at 07:51 AM
I'm not sure why this is news, except that it makes for a startling headline. (Is the New York Times now into clickbait?) It's not as if people are throwing squid...Bruce Schneier From Schneier on Security | November 7, 2014 at 06:00 PM
My company, Co3 Systems, is hiring both technical and nontechnical positions. If you live in the Boston area, click through and take a look....Bruce Schneier From Schneier on Security | November 7, 2014 at 02:06 PM
Chicago is doing random explosives screenings at random L stops in the Chicago area. Compliance is voluntary: Police made no arrests but one rider refused to submit...Bruce Schneier From Schneier on Security | November 7, 2014 at 11:54 AM
Robert Lee and Thomas Rid have a new paper: "OMG Cyber! Thirteen Reasons Why Hype Makes for Bad Policy."...Bruce Schneier From Schneier on Security | November 6, 2014 at 03:59 PM
Interesting paper by Melissa Hathaway: "Connected Choices: How the Internet Is Challenging Sovereign Decisions." Abstract: Modern societies are in the middle of...Bruce Schneier From Schneier on Security | November 6, 2014 at 07:46 AM
Verizon is tracking the Internet use of their phones by surreptitiously modifying URLs. This is a good description of how it works....Bruce Schneier From Schneier on Security | November 4, 2014 at 07:21 AM
Probably the best IT security book of the year is Adam Shostack's Threat Modeling. The book is an honorable mention finalist for "The Best Books" of the past 12...Bruce Schneier From Schneier on Security | November 3, 2014 at 08:42 AM
Beautiful photo. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | October 31, 2014 at 05:47 PM
The Intercept has published the complete manuals for Hacking Team's attack software. This follows a detailed report on Hacking Team's products from August. Hacking...Bruce Schneier From Schneier on Security | October 31, 2014 at 09:59 AM