From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Interesting research into figuring out where Twitter users are located, based on similar tweets from other users: While geotags are the most definitive location...Bruce Schneier From Schneier on Security | March 27, 2014 at 08:43 AM
Facebook has developed a face-recognition system that works almost as well as the human brain: Asked whether two unfamiliar photos of faces show the same person...Bruce Schneier From Schneier on Security | March 26, 2014 at 09:53 PM
I'm writing a new book, with the tentative title of Data and Power. While it's obvious that the proliferation of data affects power, it's less clear how it does...Bruce Schneier From Schneier on Security | March 26, 2014 at 08:19 PM
Last week, IBM published an "open letter" about "government access to data," where it tried to assure its customers that it's not handing everything over to the...Bruce Schneier From Schneier on Security | March 26, 2014 at 12:38 PM
Pretty.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | February 28, 2014 at 05:38 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
NEBULA
(S//SI//FVEY) Multi-Protocol macro-class Network-In-a-Box (NIB) system...schneier From Schneier on Security | February 28, 2014 at 03:16 PM
The Voynich Manuscript has been partially decoded. This seems not to be a hoax. And the manuscript seems not to be a hoax, either.
Here's the paper.
schneier From Schneier on Security | February 28, 2014 at 07:25 AM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
GENESIS
(S//SI//REL) Commercial GSM handset that has been modified to include...schneier From Schneier on Security | February 27, 2014 at 03:08 PM
Last October, I speculated on the best ways to go about designing and implementing a software backdoor. I suggested three characteristics of a good backdoor: low...schneier From Schneier on Security | February 27, 2014 at 07:03 AM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
ENTOURAGE
(S//SI//REL) Direction Finding application operating on the HOLLOWPOINT...schneier From Schneier on Security | February 26, 2014 at 03:38 PM
Interesting research:
Abstract: The HLR/AuC is considered to be one of the most important network elements of a 3G network. It can serve up to five million subscribers...schneier From Schneier on Security | February 26, 2014 at 07:55 AM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
EBSR
(S//SI//REL) Multi-purpose, Pico class, tri-band active GSM base station...schneier From Schneier on Security | February 25, 2014 at 03:11 PM
The NSA has become too big and too powerful. What was supposed to be a single agency with a dual mission -- protecting the security of U.S. communications and eavesdropping...schneier From Schneier on Security | February 25, 2014 at 09:18 AM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
CYCLONE Hx9
(S//SI//FVEY) EGSM (900MGz) macro-class Network-In-a-Box (NIB)...schneier From Schneier on Security | February 24, 2014 at 03:44 PM
Amit Sahai and others have some new results in software obfuscation. The papers are here. An over-the top Wired.com story on the research is here. And Matthew...schneier From Schneier on Security | February 24, 2014 at 07:35 AM
This video is pretty fantastic:
The narrator does a great job at explaining what's going on here, blow by gross blow, but here are the highlights:
Black-eyed...schneier From Schneier on Security | February 21, 2014 at 05:33 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
CROSSBEAM
(TS//SI//REL) CROSSBEAM is a GSM module that mates a modified commercial...schneier From Schneier on Security | February 21, 2014 at 03:41 PM
Co3 Systems is going to be at the RSA Conference. We don't have our own booth on the show floor, but there are four ways you can find us. Monday, we're at the...schneier From Schneier on Security | February 21, 2014 at 03:06 PM