From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The further Kip Hawley has gotten from running the TSA, the more sense he has started to make. This is pretty good.schneier From Schneier on Security | August 8, 2013 at 07:14 AM
In July 2012, responding to allegations that the video-chat service Skype -- owned by Microsoft -- was changing its protocols to make it possible for the government...schneier From Schneier on Security | August 7, 2013 at 07:29 AM
There's speculation that the FBI is responsible for an exploit that compromised the Tor anonymity service. Note that Tor nodes installed or updated after June...schneier From Schneier on Security | August 6, 2013 at 02:42 PM
Last month, I wrote about the potential for mass surveillance mission creep: the tendency for the vast NSA surveillance apparatus to be used for other, lesser,already...schneier From Schneier on Security | August 6, 2013 at 07:16 AM
Imagine the government passed a law requiring all citizens to carry a tracking device. Such a law would immediately be found unconstitutional. Yet we all carryenormous...schneier From Schneier on Security | August 5, 2013 at 07:02 AM
I like watches with no numbers.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | August 2, 2013 at 06:59 PM
The Guardian discusses a new secret NSA program: XKeyscore. It's the desktop system that allows NSA agents to spy on anyone over the Internet in real time. It...schneier From Schneier on Security | August 2, 2013 at 04:20 PM
Good review of the strengths and weaknesses of Cryptography Engineering and Applied Cryptography.
Best -- at least to me -- is the list of things missing, which...schneier From Schneier on Security | August 2, 2013 at 03:28 PM
Searching on Google for a pressure cooker and backpacks got one family investigated by the police. More stories and comments.
This seems not to be the NSA eavesdropping...schneier From Schneier on Security | August 2, 2013 at 09:03 AM
Richard Bejtlich and Thomas Rid (author of the excellent book Cyber War Will Not Take Place) debate the cyberwar threat on the Economist website.
schneier From Schneier on Security | August 1, 2013 at 04:54 PM
The UK has banned researchers from revealing details of security vulnerabilities in car locks. In 2008, Phillips brought a similar suit against researchers who...schneier From Schneier on Security | August 1, 2013 at 07:37 AM
This is what happens when you're a security writer and you piss off the wrong people: they conspire to have heroin mailed to you, and then to tip off the police...schneier From Schneier on Security | July 31, 2013 at 07:25 AM
Research on why some neighborhoods feel safer:
Salesses and collaborators Katja Schechtner and César A. Hidalgo built an online comparison tool using Google Street...schneier From Schneier on Security | July 30, 2013 at 02:44 PM
This is a really clever social engineering attack against a bank-card holder:
It all started, according to the police, on the Saturday night where one of this...schneier From Schneier on Security | July 30, 2013 at 08:33 AM
The Obama Administration has a comprehensive "insider threat" program to detect leakers from within government. This is pre-Snowden. Not surprisingly, the combination...schneier From Schneier on Security | July 29, 2013 at 07:28 AM
It's "Sparky the Giant Squid."
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. schneier From Schneier on Security | July 26, 2013 at 05:27 PM
We interrupt this blog for some important inter-agency rivalry.
The fourth part is still uncracked, though.
Older links.schneier From Schneier on Security | July 26, 2013 at 02:19 PM
This is an interesting, if slightly disturbing, result:
In one experiment, we had subjects read two government policy papers from 1995, one from the State Department...schneier From Schneier on Security | July 26, 2013 at 07:25 AM
We're starting to see Internet companies talk about the mechanics of how the US government spies on their users. Here, a Utah ISP owner describes his experiences...schneier From Schneier on Security | July 25, 2013 at 01:27 PM
The story of people who poach and collect rare eggs, and the people who hunt them down.
Securing wildlife against poachers is a difficult problem, especially when...schneier From Schneier on Security | July 25, 2013 at 07:46 AM