From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
We don't know what they mean, but there are a bunch of NSA code names on LinkedIn profiles.
ANCHORY, AMHS, NUCLEON, TRAFFICTHIEF, ARCMAP, SIGNAV, COASTLINE, DISHFIRE...schneier From Schneier on Security | July 11, 2013 at 07:36 AM
Nice history of Project SHAMROCK, the NSA's illegal domestic surveillance program from the 1970s. It targeted telegrams.schneier From Schneier on Security | July 10, 2013 at 02:19 PM
This is really interesting. It starts by talking about a "cant" dictionary of 16th-century thieves' argot, and ends up talking about secret languages in general...schneier From Schneier on Security | July 10, 2013 at 06:55 AM
This study concludes that there is a benefit to forcing companies to undergo privacy audits: "The results show that there are empirical regularities consistent...schneier From Schneier on Security | July 9, 2013 at 01:17 PM
A philosophical perspective:
But while Descartes's overall view has been rightly rejected, there is something profoundly right about the connection between privacy...schneier From Schneier on Security | July 9, 2013 at 07:24 AM
Evgeny Morozov makes a point about surveillance and big data: it just looks for useful correlations without worrying about causes, and leads people to implement...schneier From Schneier on Security | July 8, 2013 at 12:50 PM
In the wake of the Snowden NSA documents, reporters have been asking me whether encryption can solve the problem. Leaving aside the fact that much of what theadvice...schneier From Schneier on Security | July 8, 2013 at 07:43 AM
Giant origami squid photo found -- without explanation -- on Reddit.
As usual, you can also use this squid post to talk about the security stories in the news...schneier From Schneier on Security | July 5, 2013 at 05:01 PM
Interesting article:
Apple is famously focused on design and human experience as their top guiding principles. When it comes to security, that focus created a...schneier From Schneier on Security | July 5, 2013 at 02:33 PM
On April 1, I announced the Sixth Mostly-Annual Movie-Plot Threat Contest:
For this year's contest, I want a cyberwar movie-plot threat. (For those who don't know...schneier From Schneier on Security | July 5, 2013 at 01:08 PM
Responding to a tweet by Thomas Ptacek saying, "If you're not learning crypto by coding attacks, you might not actually be learning crypto," Colin Percival published...schneier From Schneier on Security | July 5, 2013 at 08:04 AM
Here's a transcript of a panel discussion about NSA surveillance. There's a lot worth reading here, but I want to quote Bob Litt's opening remarks. He's the General...schneier From Schneier on Security | July 4, 2013 at 08:07 AM
Interesting law journal article: "Privacy Protests: Surveillance Evasion and Fourth Amendment Suspicion," by Elizabeth E. Joh.
Abstract: The police tend to think...schneier From Schneier on Security | July 3, 2013 at 01:30 PM
The US Department of Defense is blocking sites that are reporting about the Snowden documents. I presume they're not censoring sites that are smearing him personally...schneier From Schneier on Security | July 3, 2013 at 07:02 AM
This is a really good paper describing the unique threat model of children in the home, and the sorts of security philosophies that are effective in dealing with...schneier From Schneier on Security | July 2, 2013 at 01:08 PM
More Snowden documents analyzed by the Guardian -- two articles -- discuss how the NSA collected e-mails and data on Internet activity of both Americans and foreigners...schneier From Schneier on Security | July 2, 2013 at 07:49 AM
Two weeks ago, the Guardian published two new Snowden documents. These outline how the NSA's data-collection procedures allow it to collect lots of data on Americans...schneier From Schneier on Security | July 1, 2013 at 01:16 PM
The NSA has published some new symmetric algorithms:
Abstract: In this paper we propose two families of block ciphers, SIMON and SPECK, each of which comes in...schneier From Schneier on Security | July 1, 2013 at 07:24 AM
Video story on Animal Planet.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
schneier From Schneier on Security | June 28, 2013 at 05:07 PM