From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This is a creepy story. A woman has her phone seized by the Drug Enforcement Agency and gives them permission to look at her phone. Without her knowledge or consent...Bruce Schneier From Schneier on Security | October 15, 2014 at 08:06 AM
A few days ago, I saw this tweet: "Just a reminder that it is now *a full year* since Schneier cited it, and the FOXACID ops manual remains unpublished." It's true...Bruce Schneier From Schneier on Security | October 15, 2014 at 07:29 AM
This essay, "Grooming students for a lifetime of surveillance," talks about the general trends in student surveillance. Related: essay on the need for student privacy...Bruce Schneier From Schneier on Security | October 14, 2014 at 06:59 AM
Interesting essay about James Bamford and his efforts to publish The Puzzle Palace over the NSA's objections. Required reading for those who think the NSA's excesses...Bruce Schneier From Schneier on Security | October 13, 2014 at 07:55 AM
The latest Intercept article on the Snowden NSA documents talks about their undercover operatives working in foreign companies. There are no specifics, although...Bruce Schneier From Schneier on Security | October 11, 2014 at 04:00 PM
Recipe from Tom Douglas. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | October 10, 2014 at 05:56 PM
Good essay by Molly Sauter: basically, there is no legal avenue for activism and protest on the Internet. Also note Sauter's new book, The Coming Swarm....Bruce Schneier From Schneier on Security | October 10, 2014 at 01:56 PM
This article reads like snake oil. But the company was founded by Lars Knudsen, so it can't possibly be. I'm curious....Bruce Schneier From Schneier on Security | October 10, 2014 at 04:40 AM
In July, I wrote about an unpatchable USB vulnerability called BadUSB. Code for the vulnerability has been published....Bruce Schneier From Schneier on Security | October 8, 2014 at 04:41 PM
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World is finished. I submitted it to my publisher, Norton, this morning. In a few weeks...Bruce Schneier From Schneier on Security | October 7, 2014 at 07:56 AM
Last week Apple announced that it is closing a serious security vulnerability in the iPhone. It used to be that the phone's encryption only protected a small amount...Bruce Schneier From Schneier on Security | October 6, 2014 at 07:50 AM
McDonald's has a Halloween-themed burger with a squid-ink bun. Only in Japan. As usual, you can also use this squid post to talk about the security stories in the...Bruce Schneier From Schneier on Security | October 3, 2014 at 07:19 PM
Former NSA employee -- not technical director, as the link says -- explains how NSA bulk surveillance works, using some of the Snowden documents. Very interesting...Bruce Schneier From Schneier on Security | October 3, 2014 at 07:59 AM
The NSA is building a private cloud with its own security features: As a result, the agency can now track every instance of every individual accessing what is in...Bruce Schneier From Schneier on Security | October 2, 2014 at 07:58 AM
Firechat is a secure wireless peer-to-peer chat app: Firechat is theoretically resistant to the kind of centralized surveillance that the Chinese government (as...Bruce Schneier From Schneier on Security | October 1, 2014 at 04:01 PM
The Chinese government checked ten thousand pigeons for "dangerous materials." Because fear....Bruce Schneier From Schneier on Security | October 1, 2014 at 09:01 AM
There's a new article on NSA's Technology Transfer Program, a 1990s-era program to license NSA patents to private industry. I was pretty dismissive about the offerings...Bruce Schneier From Schneier on Security | September 29, 2014 at 07:54 AM
Warmer waters are moving squid fishing up the California coast. As usual, you can also use this squid post to talk about the security stories in the news that I...Bruce Schneier From Schneier on Security | September 26, 2014 at 05:28 PM
There's a Reuters article on new types of fraud using stolen medical records. I don't know how much of this is real and how much is hype, but I'm certain that criminals...Bruce Schneier From Schneier on Security | September 26, 2014 at 01:47 PM