From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
I'm starting to think about my next book, which will be about power and the Internet -- from the perspective of security. My objective will be to describe current...schneier From Schneier on Security | April 1, 2013 at 11:07 AM
Really:
An unexploded bomb was found inside a squid when the fish was slaughtered at a fish market in Guangdong province.
Oddly enough, this doesn't seem to be...schneier From Schneier on Security | March 29, 2013 at 09:19 PM
Interesting article, "The Dangers of Surveillance," by Neil M. Richards, Harvard Law Review, 2013. From the abstract:
....We need a better account of the dangers...schneier From Schneier on Security | March 29, 2013 at 05:25 PM
This is a really clever attack on the RC4 encryption algorithm as used in TLS.
We have found a new attack against TLS that allows an attacker to recover a limited...schneier From Schneier on Security | March 29, 2013 at 11:59 AM
This is a story about a physicist who got taken in by an imaginary Internet girlfriend and ended up being arrested in Argentina for drug smuggling. Readers of...schneier From Schneier on Security | March 28, 2013 at 01:36 PM
Should companies spend money on security awareness training for their employees? It's a contentious topic, with respected experts on both sides of the debate.right...schneier From Schneier on Security | March 27, 2013 at 11:47 AM
The NSA has published declassified versions of its Cryptolog newsletter. All the issues from Aug 1974 through Summer 1997 are on the web, although there are some...schneier From Schneier on Security | March 26, 2013 at 07:15 PM
Turns out that it's pretty easy:
Researchers at the Massachusetts Institute of Technology (MIT) and the Catholic University of Louvain studied 15 months' worth...schneier From Schneier on Security | March 26, 2013 at 02:29 PM
I'm going to start with three data points.
One: Some of the Chinese military hackers who were implicated in a broad set of attacks against the U.S. governmentaccessed...schneier From Schneier on Security | March 25, 2013 at 11:28 AM
Despite looking very different from each other and being distributed across the world's oceans, all giant squid are the same species. There's also not a lot of...schneier From Schneier on Security | March 22, 2013 at 09:12 PM
I have made a few changes to my blog that I'd like to talk about.
The first is the various buttons associated with each post: a Facebook Like button, a Retweet...schneier From Schneier on Security | March 22, 2013 at 08:46 PM
Both Google and recently ruled National Security Letters unconstitutional. Not that this changes anything yet.schneier From Schneier on Security | March 22, 2013 at 12:10 PM
The FBI wants cell phone carriers to store SMS messages for a long time, enabling them to conduct surveillance backwards in time. Nothing new there -- data retention...schneier From Schneier on Security | March 21, 2013 at 06:17 PM
A core, not side, effect of technology is its ability to magnify power and multiply force -- for both attackers and defenders. One side creates ceramic handguns...schneier From Schneier on Security | March 21, 2013 at 12:02 PM
This article is worth reading. One bit:
For a time the FBI put its back into coming up with predictive analytics to help predict insider behavior prior to malicious...schneier From Schneier on Security | March 20, 2013 at 04:51 PM
Twenty five countries are using the FinSpy surveillance software package (also called FinFisher) to spy on their own citizens:
The list of countries with servers...schneier From Schneier on Security | March 19, 2013 at 06:34 PM
From the CIA archives: Orrin Clotworthy, "Some Far-out Thoughts on Computers," Studies in Intelligence v. 6 (1962).schneier From Schneier on Security | March 18, 2013 at 06:00 PM