From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Two new stories based on the Snowden documents.
This is getting silly. General Alexander just lied about this to Congress last week. The old NSA tactic of hiding...schneier From Schneier on Security | October 1, 2013 at 02:08 PM
Last year, NIST selected Keccak as the winner of the SHA-3 hash function competition. Yes, I would have rather my own Skein had won, but it was a good choice.
...schneier From Schneier on Security | October 1, 2013 at 11:50 AM
ICANN has a draft study that looks at abuse of the Whois database.
This study, conducted by the National Physical Laboratory (NPL) in the United Kingdom, analyzes...schneier From Schneier on Security | October 1, 2013 at 10:09 AM
We know from the Snowden documents (and other sources) that the NSA taps Internet backbone through secret-agreements with major U.S. telcos., but the U.S. government...schneier From Schneier on Security | September 28, 2013 at 07:10 AM
The Grimalditeuthis bonplandi is the only known squid to use its tenticles to fish:
Its tentacles are thin and fragile, and almost always break off when it's captured...schneier From Schneier on Security | September 27, 2013 at 05:53 PM
Neat project. The reason it works is that the Android system doesn't start putting in very long delays between PIN attempts after a whole bunch of unsuccessful...schneier From Schneier on Security | September 27, 2013 at 07:21 AM
Interesting paper: "Three Paradoxes of Big Data," by Neil M. Richards and Jonathan H. King, Stanford Law Review Online, 2013.
Abstract: Big data is all the rage...schneier From Schneier on Security | September 26, 2013 at 07:58 AM
Kim Zetter has written the definitive story -- at least so far -- of the possible backdoor in the Dual_EC_DRBG random number generator that's part of the NIST SP800...schneier From Schneier on Security | September 25, 2013 at 08:17 AM
Nice hack from the Chaos Computer Club:
The method follows the steps outlined in this how-to with materials that can be found in almost every household: First,...schneier From Schneier on Security | September 24, 2013 at 10:20 AM
The NSA is looking for a Civil Liberties & Privacy Officer. It appears to be an internal posting.
The NSA Civil Liberties & Privacy Officer (CLPO) is conceived...schneier From Schneier on Security | September 23, 2013 at 02:14 PM
Back in June, when the contents of Edward Snowden's cache of NSA documents were just starting to be revealed and we learned about the NSA collecting phone metadata...schneier From Schneier on Security | September 23, 2013 at 07:21 AM
Fascinating:
The bacterium Vibrio fischeri is a squid terraformer. Although it can live independently in seawater, it also colonises the body of the adorable Hawaiian...schneier From Schneier on Security | September 20, 2013 at 05:25 PM
Kit Walsh has an interesting blog post where he looks at how existing law can be used to justify the surveillance of Americans.
Just to challenge ourselves, we'll...schneier From Schneier on Security | September 20, 2013 at 01:01 PM
This article points out that as people are logging into Wi-Fi networks from their Android phones, and backing up those passwords along with everything else into...schneier From Schneier on Security | September 20, 2013 at 08:05 AM
Excellent essay:
We have learned that in pursuit of its bureaucratic mission to obtain signals intelligence in a pervasively networked world, the NSA has mounted...schneier From Schneier on Security | September 18, 2013 at 08:06 AM
We recently learned that US intelligence agencies had at least three days' warning that Syrian President Bashar al-Assad was preparing to launch a chemical attack...schneier From Schneier on Security | September 17, 2013 at 07:15 AM
This is really interesting research: "Stealthy Dopant-Level Hardware Trojans." Basically, you can tamper with a logic gate to be either stuck-on or stuck-off by...schneier From Schneier on Security | September 16, 2013 at 02:25 PM
This was published during the battle about the Clipper Chip, and is remarkably prescient.schneier From Schneier on Security | September 16, 2013 at 01:59 PM