From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
John Mueller and Mark Stewart ask the important questions about the NSA surveillance programs: why were they secret, what have they accomplished, and what do they...schneier From Schneier on Security | June 19, 2013 at 11:24 AM
Facebook (here), Apple (here), and Yahoo (here) have all released details of US government requests for data. They each say that they've turned over user datamuch...schneier From Schneier on Security | June 18, 2013 at 09:00 PM
In an excellent essay about privacy and secrecy, law professor Daniel Solove makes an important point. There are two types of NSA secrecy being discussed. It's...schneier From Schneier on Security | June 18, 2013 at 04:02 PM
Interesting speculation that the NSA is storing everyone's phone calls, and not just metadata. Definitely worth reading.
I expressed skepticism about this just...schneier From Schneier on Security | June 18, 2013 at 11:57 AM
This finally explains what John Ellis was talking about in "The Possibility of Non-Secret Encryption" when he dropped a tantalizing hint about wartime work at Bell...schneier From Schneier on Security | June 17, 2013 at 05:47 PM
There's one piece of blowback that isn't being discussed -- aside from the fact that Snowden killed the chances of a liberal arts major getting a job at the DoD...schneier From Schneier on Security | June 17, 2013 at 11:13 AM
It's a novel behavior.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | June 14, 2013 at 09:53 PM
On April 1, I announced the Sixth Annual Movie Plot Threat Contest:
I want a cyberwar movie-plot threat. (For those who don't know, a movie-plot threat is a scare...schneier From Schneier on Security | June 14, 2013 at 05:20 PM
This paper (full paper behind paywall) -- from Environment International (2009) -- does a good job of separating fact from fiction:
Abstract: In recent yearsThis...schneier From Schneier on Security | June 14, 2013 at 12:15 PM
Ray Wang makes an important point about trust and our data:
This is the paradox. The companies contending to win our trust to manage our digital identities all...schneier From Schneier on Security | June 13, 2013 at 09:06 PM
Facebook regularly abuses the privacy of its users. Google has stopped supporting its popular RSS feeder. Apple prohibits all iPhone apps that are political orGame...schneier From Schneier on Security | June 13, 2013 at 04:34 PM
Here's a quick list of some of my older writings that are related to the current NSA spying documents:
"The Internet Is a Surveillance State ," 2013.
The importance...schneier From Schneier on Security | June 13, 2013 at 11:09 AM
Edward Snowden broke the law by releasing classified information. This isn't under debate; it's something everyone with a security clearance knows. It's written...schneier From Schneier on Security | June 12, 2013 at 11:16 AM
Interesting.
Crazy as these theories are, those propagating them are not -- they’re quite normal, in fact. But recent scientific research tells us this much: if...schneier From Schneier on Security | June 11, 2013 at 05:30 PM
Ignore the sensationalist headline. This article is a good summary of the need for trust in IT, and provides some ideas for how to enable more of it.
Virtually...schneier From Schneier on Security | June 11, 2013 at 11:21 AM
Yesterday, we learned that the NSA received all calling records from Verizon customers for a three-month period starting in April. That's everything except themetadata...schneier From Schneier on Security | June 10, 2013 at 11:12 AM
A squid comic about the importance of precise language in security warnings.
As usual, you can also use this squid post to talk about the security stories in the...schneier From Schneier on Security | June 7, 2013 at 09:35 PM
In this podcast interview, I talk about security, power, and the various things I have been thinking about recently.schneier From Schneier on Security | June 7, 2013 at 07:22 PM
Ars Technica gave three experts a 16,000-entry encrypted password file, and asked them to break them. The winner got 90% of them, the loser 62% -- in a few hours...schneier From Schneier on Security | June 7, 2013 at 11:41 AM