From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The Internet has turned into a massive surveillance tool. We're constantly monitored on the Internet by hundreds of companies -- both familiar and unfamiliar. Everything...schneier From Schneier on Security | May 21, 2013 at 11:15 AM
All of the anti-counterfeiting features of the new Canadian $100 bill are resulting in people not bothering to verify them.
The fanfare about the security features...schneier From Schneier on Security | May 20, 2013 at 11:34 AM
Technically, it's a cuttlefish and not a squid. But it's still nice art. I posted a photo of a real striped pyjama squid way back in 2006.
As usual, you can...schneier From Schneier on Security | May 17, 2013 at 09:57 PM
In the episode that aired on May 9th, about eight or nine minutes in, there's a scene with a copy of Applied Cryptography prominently displayed on the coffee table...schneier From Schneier on Security | May 17, 2013 at 07:59 PM
Here is a new lock that you can control via Bluetooth and an iPhone app.
That's pretty cool, and I can imagine all sorts of reasons to get one of those. But I'm...schneier From Schneier on Security | May 16, 2013 at 01:45 PM
As part of the fallout of the Boston bombings, we're probably going to get some new laws that give the FBI additional investigative powers. As with the Patriotmost...schneier From Schneier on Security | May 14, 2013 at 10:48 AM
It's at the end of May. Note that it's being put on by the Calamari Entertainment Group.
As usual, you can also use this squid post to talk about the security...schneier From Schneier on Security | May 10, 2013 at 09:26 PM
Wise advice:
At Chase Bank, we recognize the value of online banking -- it’s quick, convenient, and available any time you need it. Unfortunately, though, the...schneier From Schneier on Security | May 10, 2013 at 06:49 PM
From a FOIAed Department of Transportation document on investigative techniques:
A "mail cover" is the process by which the U.S. Postal Service records any data...schneier From Schneier on Security | May 10, 2013 at 11:47 AM
Maybe the tide is turning:
America is in a hole. The last response of the blowhards and cowards who have put it there is always: "So what would you do: set them...schneier From Schneier on Security | May 9, 2013 at 10:16 AM
Latanya Sweeney has demonstrated how easy it can be to identify people from their birth date, gender, and zip code. The anonymous data she reidentified happened...schneier From Schneier on Security | May 8, 2013 at 06:54 PM
Last week, an employee error caused the monitors at LAX to display a building evacuation order:
At a little before 9:47 p.m., the message read: "An emergency has...schneier From Schneier on Security | May 8, 2013 at 11:32 AM
I have no idea if "former counterterrorism agent for the FBI" Tom Clemente knows what he's talking about, but that's certainly what he implies here:
More recently...schneier From Schneier on Security | May 7, 2013 at 05:57 PM
The FBI and the CIA are being criticized for not keeping better track of Tamerlan Tsarnaev in the months before the Boston Marathon bombings. How could they have...schneier From Schneier on Security | May 7, 2013 at 11:10 AM
Interesting op-ed by former DHS head Michael Chertoff on the privacy risks of Google Glass.
Now imagine that millions of Americans walk around each day wearing...schneier From Schneier on Security | May 6, 2013 at 06:17 PM
Here is a simple but clever idea. Seed password files with dummy entries that will trigger an alarm when used. That way a site can know when a hacker is trying...schneier From Schneier on Security | May 6, 2013 at 10:44 AM
It's amazing how small a hole he can fit through.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...schneier From Schneier on Security | May 3, 2013 at 09:33 PM
It's a really interesting code and story. (The first link has the most detailed information about the code and the cryptanalysis.)schneier From Schneier on Security | May 3, 2013 at 05:44 PM
Our government collects a lot of information about us. Tax records, legal records, license records, records of government services received-- it's all in databases...schneier From Schneier on Security | May 3, 2013 at 11:15 AM