From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Interesting paper: "The value of Online Privacy," by Scott Savage and Donald M. Waldman.
Abstract: We estimate the value of online privacy with a differentiated...schneier From Schneier on Security | January 29, 2014 at 01:26 PM
This is very good:
...one might suppose that modern democratic states, with the lessons of history at hand, would seek to minimize fear or at least minimizeThey...schneier From Schneier on Security | January 29, 2014 at 07:24 AM
Back in December, Der Spiegel published a lot of information about the NSA's Tailored Access Operations (TAO) group, including a 2008 catalog of hardware and software...schneier From Schneier on Security | January 28, 2014 at 03:13 PM
Now we know why the president gave his speech on NSA surveillance last week; he wanted to get ahead of the Privacy and Civil Liberties Oversight Board.
Last week...schneier From Schneier on Security | January 28, 2014 at 01:39 PM
This makes a lot of sense.
Viviane Reding dismissed recent fines for Google as "pocket money" and said the firm would have had to pay $1bn under her plans for...schneier From Schneier on Security | January 28, 2014 at 07:47 AM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
SPARROW II
(TS//SI//REL) An embedded computer system running BLINDDATE tools...schneier From Schneier on Security | January 27, 2014 at 09:06 PM
Microsoft is trying to stop supporting Windows XP. The problem is that a majority of ATMs still use that OS. And once Microsoft stops issuing security updates...schneier From Schneier on Security | January 27, 2014 at 07:32 AM
It's big: 13 feet long.
The fisherman was stunned to discover the giant squid trapped in his net, having been caught at a depth of around 70m, about two-thirds...schneier From Schneier on Security | January 24, 2014 at 05:15 PM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
PHOTOANGLO
(TS//SI//REL TO USA,FVEY) PHOTOANGLO is a joint NSA/GCHQ project...schneier From Schneier on Security | January 24, 2014 at 03:09 PM
I'm sure this is a pirated copy.
Looking at it, it's amazing how long ago twenty years was.schneier From Schneier on Security | January 24, 2014 at 01:43 PM
This is an interesting way to characterizing income inequality as a security issue:
…growing inequality menaces vigorous societies. It is a proxy for how effectively...schneier From Schneier on Security | January 24, 2014 at 07:51 AM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
NIGHTWATCH
(TS//SI//REL TO USA,FVEY) NIGHTWATCH is a portable computer with...schneier From Schneier on Security | January 23, 2014 at 03:39 PM
Tim Hartford talks about consumer manipulation:
Consider, first, confusion by design: Las Vegas casinos are mazes, carefully crafted to draw players to the slot...schneier From Schneier on Security | January 23, 2014 at 08:03 AM
Today's device from the NSA's Tailored Access Operations (TAO) group implant catalog:
NIGHTSTAND
(TS//SI//REL) An active 802.11 wireless exploitation and injection...schneier From Schneier on Security | January 22, 2014 at 03:15 PM
Coming barely weeks after my essay on the security risks from embedded systems, the Proofpoint report of a span-sending refrigerator was just too good to be true...schneier From Schneier on Security | January 22, 2014 at 01:19 PM
Two reports have recently been published questioning the efficacy of the NSA's bulk-collection programs. The first one is from the left-leaning New American Foundation...schneier From Schneier on Security | January 22, 2014 at 07:41 AM
Today's item from the NSA's Tailored Access Operations (TAO) group implant catalog:
LOUDAUTO
(TS//SI//REL TO USA,FVEY) Audio-based RF retro-reflector. Provides...schneier From Schneier on Security | January 21, 2014 at 03:11 PM
This is not a good development:
To make matters worse, ownership of a Chrome extension can be transferred to another party, and users are never informed when an...schneier From Schneier on Security | January 21, 2014 at 07:33 AM
Today's device -- this one isn't an implant -- from the NSA's Tailored Access Operations (TAO) group implant catalog:
CTX4000
(TS//SI//REL TO USA,FVEY) The CTX4000...schneier From Schneier on Security | January 20, 2014 at 03:20 PM
This is new:
The NTP method first began to appear late last year. To bring down a server such as one running "League of Legends," the attackers trick NTP servers...schneier From Schneier on Security | January 20, 2014 at 07:18 AM