From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This clever piece of malware evades forensic examination by deleting its own components.schneier From Schneier on Security | April 18, 2013 at 04:36 PM
I rewrote my "refuse to be terrorized" essay for the Atlantic. David Rothkoph (author of the great book Power, Inc.) wrote something similar, and so did John Cole...schneier From Schneier on Security | April 16, 2013 at 02:19 PM
We're learning a lot about how the FBI eavesdrops on cell phones from a recent court battle.schneier From Schneier on Security | April 16, 2013 at 11:37 AM
It's mentioned here:
Mr. Doerr said he had been wearing the glasses and uses them especially for taking pictures and looking up words while playing Scattergories...schneier From Schneier on Security | April 15, 2013 at 09:29 AM
While we we're on the subject of squid fishing in Argentina, the country is dealing with foreign boats illegally fishing for squid inside its territorial waters...schneier From Schneier on Security | April 12, 2013 at 09:34 PM
There is a lot of buzz on the the Internet about a talk at the Hack-in-the Box conference by Hugo Teso, who claims he can hack in to remotely control an airplane's...schneier From Schneier on Security | April 12, 2013 at 03:50 PM
Ed Felten has a really good blog post about the externalities that the recent Spamhaus DDOS attack exploited:
The attackers' goal was to flood Spamhaus or itswriting...schneier From Schneier on Security | April 10, 2013 at 05:46 PM
The last cryptanalyst at the Battle of Midway, Rear Admiral Donald "Mac" Showers, USN-Ret, passed away 19 October 2012. His interment at Arlington National Cemetery...schneier From Schneier on Security | April 10, 2013 at 11:40 AM
A real-world one-way function:
Alice and Bob procure the same edition of the white pages book for a particular town, say Cambridge. For each letter Alice wants...schneier From Schneier on Security | April 9, 2013 at 06:49 PM
Interesting article from the New Yorker.
I'm often asked what I think about bitcoins. I haven't analyzed the security, but what I have seen looks good. The real...schneier From Schneier on Security | April 9, 2013 at 11:05 AM
I hadn't heard of this term before, but it's an interesting one. The excerpt below is from an interview with Rebecca Solnit, author of A Paradise Built in Hell...schneier From Schneier on Security | April 8, 2013 at 06:30 PM
Interesting article about the perception of hackers in popular culture, and how the government uses the general fear of them to push for more power:
But theseoverzealous...schneier From Schneier on Security | April 8, 2013 at 11:34 AM
Page 18 of this thesis explains that squid fishing is done at night, and the lighting is so bright shows up in the satellite surveys of planetary lighting. This...schneier From Schneier on Security | April 5, 2013 at 09:08 PM
The U.S. Drug Enforcement Agency has complained (in a classified report, not publicly) that Apple's iMessage end-to-end encryption scheme can't be broken. On the...schneier From Schneier on Security | April 5, 2013 at 06:05 PM
Xkcd had a Skein collision competition. The contest is over -- Carnegie Mellon University won, with 384 (out of 1024) mismatched bits -- but it's explained here...schneier From Schneier on Security | April 5, 2013 at 11:35 AM
Whether it's Syria using Facebook to help identify and arrest dissidents or China using its "Great Firewall" to limit access to international news throughout the...schneier From Schneier on Security | April 3, 2013 at 12:29 PM
It's back, after a two-year hiatus. Terrorism is boring; cyberwar is in. Cyberwar, and its kin: cyber Pearl Harbor, cyber 9/11, cyber Armageddon. (Or make up...schneier From Schneier on Security | April 1, 2013 at 05:38 PM