From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
We're starting to see a proliferation of smart devices that can be controlled from your phone. The security risk is, of course, that anyone can control them from...Bruce Schneier From Schneier on Security | June 10, 2014 at 09:54 AM
I'm at SHB 2014: the Seventh Annual Interdisciplinary Workshop on Security and Human Behavior. This is a small invitational gathering of people studying various...Bruce Schneier From Schneier on Security | June 9, 2014 at 05:53 AM
Rhymes with Orange. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | June 6, 2014 at 05:39 PM
Last June, the Guardian published a story about GCHQ tapping fiber-optic Internet cables around the globe, part of a program codenamed TEMPURA. One of the facts...Bruce Schneier From Schneier on Security | June 5, 2014 at 05:58 PM
On Monday I had the honor of presenting Edward Snowden with a "Champion of Freedom" award at the EPIC dinner. Snowden couldn't be there in person -- his father...Bruce Schneier From Schneier on Security | June 4, 2014 at 04:41 PM
The announcement on April 7 was alarming. A new Internet vulnerability called Heartbleed could allow hackers to steal your logins and passwords. It affected a piece...Bruce Schneier From Schneier on Security | June 4, 2014 at 07:46 AM
Chinese hacking of American computer networks is old news. For years we've known about their attacks against U.S. government and corporate targets. We've seen detailed...Bruce Schneier From Schneier on Security | June 2, 2014 at 07:37 AM
Here are pictures of squid-shaped pancakes. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....Bruce Schneier From Schneier on Security | May 30, 2014 at 05:51 PM
SEC Consult has published an advisory warning people not to use a government eavesdropping product called Recording eXpress, sold by the Israeli company Nice Systems...Bruce Schneier From Schneier on Security | May 29, 2014 at 03:52 PM
I have no idea what's going on with TrueCrypt. Good summary of story is a ArsTechnica, and SlashDot, Hacker News, and Reddit all have long comment threads. See...Bruce Schneier From Schneier on Security | May 29, 2014 at 09:11 AM
Ross Anderson has an important new paper on the economics that drive government-on-population bulk surveillance: My first big point is that all the three factors...Bruce Schneier From Schneier on Security | May 27, 2014 at 11:41 AM
Del Campo, a restaurant in Washington DC, has a Bloody Mary made with squid ink. As usual, you can also use this squid post to talk about the security stories in...Bruce Schneier From Schneier on Security | May 23, 2014 at 05:53 PM
Biologist Alan Watts makes some good points: Mammals don’t respond well to surveillance. We consider it a threat. It makes us paranoid, and aggressive and vengeful...Bruce Schneier From Schneier on Security | May 23, 2014 at 07:42 AM
There's a debate going on about whether the U.S. government -- specifically, the NSA and United States Cyber Comman -- should stockpile Internet vulnerabilities...Bruce Schneier From Schneier on Security | May 22, 2014 at 07:15 AM
I am regularly asked what is the most surprising thing about the Snowden NSA documents. It's this: the NSA is not made of magic. Its tools are no different from...Bruce Schneier From Schneier on Security | May 21, 2014 at 04:52 PM
New paper: "Your Secret Stingray's No Secret Anymore: The Vanishing Government Monopoly Over Cell Phone Surveillance and its Impact on National Security and Consumer...Bruce Schneier From Schneier on Security | May 21, 2014 at 10:51 AM
Interesting research paper on a bank card chip-and-PIN vulnerability. From the blog post: Our new paper shows that it is possible to create clone chip cards which...Bruce Schneier From Schneier on Security | May 20, 2014 at 03:04 PM
At Eurocrypt this year, researchers presented a paper that completely breaks the discrete log problem in any field with a small characteristic. It's nice work,...Bruce Schneier From Schneier on Security | May 20, 2014 at 07:13 AM
New IETF RFC: "RFC 7258: Pervasive Monitoring Is an Attack" that designers must mitigate. Slashdot thread....Bruce Schneier From Schneier on Security | May 19, 2014 at 02:44 PM