From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This Wall Street Journal investigative piece is a month old, but well worth reading. Basically, the Total Information Awareness program is back with a different...schneier From Schneier on Security | January 8, 2013 at 12:28 PM
Interesting details of an Amazon Marketplace scam. Worth reading.
Most scams use a hook to cause a reaction. The idea being that if you are reacting, they get...schneier From Schneier on Security | January 7, 2013 at 12:31 PM
We'll see it later this month.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | January 4, 2013 at 09:36 PM
This is what Facebook gives the police in response to a subpoena. (Note that this isn't in response to a warrant; it's in response to a subpoena.) This might...schneier From Schneier on Security | January 4, 2013 at 01:48 PM
This is a great essay:
Spheres are special shapes for nuclear weapons designers. Most nuclear weapons have, somewhere in them, that spheres-within-spheres arrangement...schneier From Schneier on Security | January 3, 2013 at 12:03 PM
Fascianting story:
"Come on," Jillette said. "Steal something from me."
Again, Robbins begged off, but he offered to do a trick instead. He instructed Jillette...schneier From Schneier on Security | January 2, 2013 at 02:44 PM
After the Instagram debacle, where it changed its terms of service to give itself greater rights over user photos and reversed itself after a user backlash, it's...schneier From Schneier on Security | December 31, 2012 at 12:44 PM
Good article.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | December 28, 2012 at 09:16 PM
From "The Insider's TSA Dictionary":
Bruce Schneiered: (V, ints) When a passenger uses logic in order to confound and perplex an officer into submission. Ex: "A...schneier From Schneier on Security | December 28, 2012 at 06:34 PM
Fascinating article.
Snitching has become so commonplace that in the past five years at least 48,895 federal convicts -- one of every eight -- had their prison...schneier From Schneier on Security | December 28, 2012 at 12:37 PM
The newly announced ElcomSoft Forensic Disk Decryptor can decrypt BitLocker, PGP, and TrueCrypt. And it's only $300. How does it work?
Elcomsoft Forensic Disk...schneier From Schneier on Security | December 27, 2012 at 07:02 PM
In Liars and Outliers, I talk a lot about the more social forms of security. One of them is reputational. This post is about that squishy sociological security...schneier From Schneier on Security | December 27, 2012 at 12:21 PM
Finally, Cryptography Engineering is available as an ebook. Even better, it's today's deal of the day at O'Reilly: $27.50 (50% off) and no copy protection. (The...schneier From Schneier on Security | December 26, 2012 at 05:50 PM
Industrial control system comes with a backdoor:
Although the system was password protected in general, the backdoor through the IP address apparently required...schneier From Schneier on Security | December 26, 2012 at 12:05 PM
Interesting firsthand phishing story:
A few nights ago, I got a Twitter direct message (DM) from a friend saying that someone was saying nasty things about me,...schneier From Schneier on Security | December 24, 2012 at 12:31 PM
The small San Francisco film and video company is celebrating its 17th anniversary.
As usual, you can also use this squid post to talk about the security stories...schneier From Schneier on Security | December 21, 2012 at 10:58 PM
Schools go into lockdown over a thermometer, a car backfiring, a bank robbery a few blocks away, a student alone in a gym, a neighbor on the street, and some vague...schneier From Schneier on Security | December 21, 2012 at 06:12 PM
Clever:
Chris Cardinal discovered someone running such a scam on Amazon using his account: the scammer contacted Amazon pretending to be Chris, supplying his billing...schneier From Schneier on Security | December 21, 2012 at 12:20 PM
The "Great Firewall of China" is now able to detect and block encryption:
A number of companies providing "virtual private network" (VPN) services to users in...schneier From Schneier on Security | December 20, 2012 at 12:32 PM