From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
The Naval Postgraduate School's Center for Homeland Defense and Security is running its sixth annual essay competition. There are cash prizes. (Info on previous...schneier From Schneier on Security | November 26, 2012 at 03:35 PM
Another squid comic.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | November 23, 2012 at 10:50 PM
"Recommendations to Prevent Catastrophic Threats." Federation of American Scientists, 9 November 2012. It's twelve specific sets of recommendations for twelvethis...schneier From Schneier on Security | November 23, 2012 at 12:18 PM
Can anyone make heads or tails of this story? (More links.)
For my part, I'd like a little -- you know -- evidence. Remember that Ohio was not the deciding state...schneier From Schneier on Security | November 20, 2012 at 06:53 PM
I've been reading lots of articles articles discussing how little e-mail and Internet privacy we actually have in the U.S. This is a good one to start with:
The...schneier From Schneier on Security | November 19, 2012 at 06:40 PM
I noticed this in an article about how increased security and a general risk aversion is harming US diplomatic missions:
"Barbara Bodine, who was the U.S. ambassador...schneier From Schneier on Security | November 19, 2012 at 11:41 AM
Vampire squid eats marine wastes (paper and video).
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...schneier From Schneier on Security | November 16, 2012 at 10:30 PM
Research into one VM stealing crypto keys from another VM running on the same hardware.
ABSTRACT: This paper details the construction of an access-driven side...schneier From Schneier on Security | November 16, 2012 at 12:13 PM
This is idiotic:
Public Intelligence recently posted a Powerpoint presentation from the NYC fire department (FDNY) discussing the unique safety issues mobile food...schneier From Schneier on Security | November 15, 2012 at 12:45 PM
I noticed this amongst the details of the Petraeus scandal:
Petraeus and Broadwell apparently used a trick, known to terrorists and teenagers alike, to conceal...schneier From Schneier on Security | November 14, 2012 at 06:28 PM
At least, that's the story:
The locks at the Tower of London, home to the Crown Jewels, had to be
changed after a burglar broke in and stole keys.
The intruder...schneier From Schneier on Security | November 14, 2012 at 11:57 AM
Dan Boneh of Stanford University is offering a free online cryptography course. The course runs for six weeks, and has five to seven hours of coursework per week...schneier From Schneier on Security | November 13, 2012 at 12:15 PM
Mother fairy wrens teach their children passwords while they're still in their eggs to tell them from cuckoo impostors:
She kept 15 nests under constant audiotheir...schneier From Schneier on Security | November 12, 2012 at 07:03 PM
This article makes the important argument that encryption -- where the user and not the cloud provider holds the keys -- is critical to protect cloud data. The...schneier From Schneier on Security | November 12, 2012 at 11:47 AM
Burger King introduces a black burger with ketchup that includes squid ink. Only in Japan, of course.schneier From Schneier on Security | November 9, 2012 at 10:16 PM
From the Department of Homeland Security, a handy list of 19 suspicious behaviors that could indicate that a hotel guest is actually a terrorist.
I myself have...schneier From Schneier on Security | November 9, 2012 at 07:32 PM
Interesting research from RAND:
Abstract: How do terrorist groups end? The evidence since 1968 indicates that terrorist groups rarely cease to exist as a result...schneier From Schneier on Security | November 9, 2012 at 12:41 PM