From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
There's a nice example of traffic analysis in the book No Name, by Wilkie Collins (1862). The attacker, Captain Wragge, needs to know whether a letter has been...schneier From Schneier on Security | February 19, 2013 at 06:52 PM
After the New York Times broke the story of what seemed to be a state-sponsored hack from China against the newspaper, the Register has stories of two similar attacks...schneier From Schneier on Security | February 18, 2013 at 07:43 PM
Tesla Motors gave one of its electric cars to John Broder, a very outspoken electric-car skeptic from the New York Times, for a test drive. After a negative review...schneier From Schneier on Security | February 18, 2013 at 12:14 PM
Japanese squid researchers have confirmed flying squid can fly, and how they do it. (Note: I have written about flying squid before.)
As usual, you can also use...schneier From Schneier on Security | February 15, 2013 at 10:09 PM
This speech from last December's 29C3 (29th Chaos Communication Congress) is worth listening to. He talks about what we can do in the face of oppressive power...schneier From Schneier on Security | February 15, 2013 at 06:52 PM
"Practicality of Accelerometer Side Channels on Smartphones," by Adam J. Aviv. Benjamin Sapp, Matt Blaze, and Jonathan M. Smith.
Abstract: Modern smartphonesArticle...schneier From Schneier on Security | February 15, 2013 at 12:48 PM
Usability engineer Bruce Tognazzini talks about how an iWatch -- which seems to be either a mythical Apple product or one actually in development -- can make authentication...schneier From Schneier on Security | February 14, 2013 at 05:42 PM
Long article.
With over a thousand cameras operating 24/7, the monitoring room creates tremendous amounts of data every day, most of which goes unseen. Six technicians...schneier From Schneier on Security | February 14, 2013 at 12:32 PM
This is a real story of a pair of identical twins who are suspected in a crime. There is there is CCTV and DNA evidence that could implicate either suspect. Detailed...schneier From Schneier on Security | February 13, 2013 at 07:39 PM
There's not a lot of information -- and quite a lot of hyperbole -- in this article:
With the release of the Asrar Al Dardashah plugin, GIMF promised "secure correspondence"...schneier From Schneier on Security | February 13, 2013 at 12:13 PM
This is an amazing story. I urge you to read the whole thing, but here's the basics:
A November car chase ended in a "full blown-out" firefight, with glass and...schneier From Schneier on Security | February 12, 2013 at 06:55 PM
Society runs on trust. Over the millennia, we've developed a variety of mechanisms to induce trustworthy behavior in society. These range from a sense of guiltThis...schneier From Schneier on Security | February 12, 2013 at 12:53 PM
This is an extremely clever man-in-the-middle timing attack against AES that exploits the interaction between how the protocol implements AES in CBC mode for encryption...schneier From Schneier on Security | February 11, 2013 at 07:25 PM
Interesting article about the difficulty Google has pushing security updates onto Android phones. The problem is that the phone manufacturer is in charge, and...schneier From Schneier on Security | February 11, 2013 at 12:49 PM
Chorizo-stuffed squid with potatoes, capers and sage.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't...schneier From Schneier on Security | February 9, 2013 at 12:28 AM
This seems so obviously written by someone who Googled me on the Internet, without any other knowledge of who I am or what i do.schneier From Schneier on Security | February 8, 2013 at 08:41 PM
This long report looks at risky online behavior among the Millennial generation, and finds that they respond positively to automatic reminders and prodding. No...schneier From Schneier on Security | February 8, 2013 at 05:20 PM
A first-person account of the security surrounding the second inauguration of President Obama.schneier From Schneier on Security | February 8, 2013 at 12:16 PM
Basically, Tide detergent is a popular product with a very small profit margin. So small non-chain grocery and convenience stores are happy to buy it cheaply,started...schneier From Schneier on Security | February 7, 2013 at 06:51 PM