From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Last weekend, a Texas couple apparently discovered that the electronic baby monitor in their children's bedroom had been hacked. According to a local TV station...schneier From Schneier on Security | August 23, 2013 at 07:00 AM
There have been a bunch of articles about an information theory paper with vaguely sensational headlines like "Encryption is less secure than we thought" and "Research...schneier From Schneier on Security | August 21, 2013 at 08:01 AM
Not much surprising in this new survey.
Many teens ages 12-17 report that they usually figure out how to manage content sharing and privacy settings on their own...schneier From Schneier on Security | August 20, 2013 at 08:10 AM
There was a presentation at Black Hat last month warning us of a "factoring cryptopocalypse": a moment when factoring numbers and solving the discrete log problem...schneier From Schneier on Security | August 19, 2013 at 07:47 AM
Alton Brown suggests it for ice cream.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | August 16, 2013 at 05:13 PM
Terrorist organizations have the same management problems as other organizations, and new ones besides:
Terrorist leaders also face a stubborn human resources...schneier From Schneier on Security | August 16, 2013 at 08:31 AM
It turns out that the NSA's domestic and world-wide surveillance apparatus is even more extensive than we thought. Bluntly: The government has commandeered the...schneier From Schneier on Security | August 15, 2013 at 07:10 AM
My blog as made the Time magazine "The 25 Best Bloggers 2013 Edition" list.
I can't believe this was published ten days ago, and I'm only just finding out about...schneier From Schneier on Security | August 14, 2013 at 02:12 PM
This essay is filled historical MI5 stories -- often bizarre, sometimes amusing. My favorite:
It was recently revealed that back in the 1970s -- at the height...schneier From Schneier on Security | August 14, 2013 at 01:06 PM
Rangzen looks like a really interesting ad hoc mesh networking system to circumvent government-imposed communications blackouts. I am particularly interested in...schneier From Schneier on Security | August 14, 2013 at 08:43 AM
Rise of the Warrior Cop: The Militarization of America's Police Forces, by Radley Balko, PublicAffairs, 2013, 400 pages.
War as a rhetorical concept is firmly...schneier From Schneier on Security | August 13, 2013 at 02:31 PM
The 2013 Cryptologic History Symposium, sponsored by the NSA, will be held at John Hopkins University this October.schneier From Schneier on Security | August 13, 2013 at 07:45 AM
General Keith Alexander thinks he can improve security by automating sysadmin duties such that 90% of them can be fired:
Using technology to automate much of the...schneier From Schneier on Security | August 12, 2013 at 03:33 PM
Lots of sports stadiums have instituted Draconian new rules. Here are the rules for St. Louis Rams games:
Fans will be able to carry the following style and size...schneier From Schneier on Security | August 12, 2013 at 07:29 AM
With a squid.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | August 9, 2013 at 05:16 PM
Lavabit, the more-secure e-mail service that Edward Snowden -- among others -- used, has abruptly shut down. From the message on their homepage:
I have been forced...schneier From Schneier on Security | August 9, 2013 at 12:45 PM
It's being reported, although there's no indication of where this rumor is coming from or what it's based on.
...the new tactic allows terrorists to dip ordinary...schneier From Schneier on Security | August 9, 2013 at 07:04 AM
Twitter just rolled out a pretty nice two-factor authentication system using your smart phone as the second factor:
The new two-factor system works like this....schneier From Schneier on Security | August 8, 2013 at 01:20 PM