From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
WISTFULTOLL
(TS//SI//REL) WISTFULTOLL is a UNITEDRAKE and STRAITBIZZARE plug...schneier From Schneier on Security | February 10, 2014 at 03:58 PM
There has been a lot of news about Bengian cryptographer Jean-Jacques Quisquater having his computer hacked, and whether the NSA or GCHQ is to blame. It's a lot...schneier From Schneier on Security | February 10, 2014 at 07:57 AM
Uh oh.
And the real story.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
schneier From Schneier on Security | February 7, 2014 at 05:54 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
TRINITY
(TS//SI//REL) TRINITY is a miniaturized digital core packaged in a...schneier From Schneier on Security | February 7, 2014 at 03:53 PM
Generate your own fake TAO implant. This is even more fun than the fake NSA program generator.
Sadly, the NSA will probably use these to help develop their R&D...schneier From Schneier on Security | February 7, 2014 at 03:23 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
SWAP
(TS//SI//REL) SWAP provides software application persistence by exploiting...schneier From Schneier on Security | February 6, 2014 at 03:07 PM
Interesting paper by Steven J. Murdoch and Ross Anderson in this year's Financial Cryptography conference: "Security Protocols and Evidence: Where Many Payment."...schneier From Schneier on Security | February 6, 2014 at 07:05 AM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
SOMBERKNAVE
(TS//SI//REL) SOMBERKNAVE is Windows XP wireless software implant...schneier From Schneier on Security | February 5, 2014 at 03:04 PM
From Betty Medsger's book on the 1971 FBI burglary (page 22):
As burglars, they used some unusual techniques, ones Davidon enjoyed recalling years later, such...schneier From Schneier on Security | February 5, 2014 at 07:02 AM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
MAESTRO-II
(TS//SI//REL) MAESTRO-II is a miniaturized digital core packaged...schneier From Schneier on Security | February 4, 2014 at 03:09 PM
I think this is a great hack:
A man bought a first-class ticket and used it to have free meals and drinks at the airport's VIP lounge almost every day for nearly...schneier From Schneier on Security | February 4, 2014 at 07:45 AM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
JUNIORMINT
(TS//SI//REL) JUNIORMINT is a digital core packaged in both a mini...schneier From Schneier on Security | February 3, 2014 at 03:09 PM
The most recent story from the Snowden documents is from Canada: it claims the CSEC (Communications Security Establishment Canada) used airport Wi-Fi information...schneier From Schneier on Security | February 3, 2014 at 06:09 AM
A T-shirt with a drawing of a squid reading.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | January 31, 2014 at 05:41 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
IRATEMONK
(TS//SI//REL) IRATEMONK provides software application persistence...schneier From Schneier on Security | January 31, 2014 at 03:17 PM
This is a pretty impressive social engineering story: an attacker compromised someone's GoDaddy domain registration in order to change his e-mail address and steal...schneier From Schneier on Security | January 31, 2014 at 07:16 AM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
HOWLERMONKEY
(TS//SI//REL) HOWLERMONKEY is a custom Short to Medium rangehere...schneier From Schneier on Security | January 30, 2014 at 09:38 PM
The male túngara frog Physalaemus pustulosus uses calls to attract females. But croaking also causes ripples in the water, which are eavesdropped on -- both by...schneier From Schneier on Security | January 30, 2014 at 01:08 PM
This looks to be very good.
Add that to these three indexes of NSA source material, and these two summaries.
This excellent parody website has a good collection...schneier From Schneier on Security | January 30, 2014 at 07:52 AM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
GINSU
(TS//SI//REL) GINSU provides software application persistence for the...schneier From Schneier on Security | January 29, 2014 at 03:28 PM