From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
There's a lot of hype and hyperbole in this story, but here's the interesting bit:
According to Ronald Kessler, the author of the 2009 book In the President’s,...schneier From Schneier on Security | October 29, 2012 at 06:53 PM
I have a hard time getting worked up about this story:
I have X'd out any information that you could use to change my reservation. But it's all there, PNR, seat...schneier From Schneier on Security | October 26, 2012 at 11:46 AM
I'm not sure what to think about this story:
Six Italian scientists and an ex-government official have been sentenced to six years in prison over the 2009 deadly...schneier From Schneier on Security | October 25, 2012 at 11:27 AM
Peter Swire and Yianni Lagos have pre-published a law journal article on the risks of data portability. It specifically addresses an EU data protection regulation...schneier From Schneier on Security | October 24, 2012 at 06:27 PM
noPhoto reacts to a camera flash, and then jams the image with a bright light.
The website makes the point that this is legal, but that can't last.schneier From Schneier on Security | October 22, 2012 at 12:18 PM
This was once a real insurance product. Squid Insurance Marketing was the low-end offering at Astonish, complete with the tagline "Nothing Kills a Squid!"
As...schneier From Schneier on Security | October 19, 2012 at 09:54 PM
A lot of the debate around President Obama's cubsersecurity initiative center on how much of a burden it would be on industry, and how that should be financed.originally...schneier From Schneier on Security | October 19, 2012 at 12:45 PM
"Quantitative Analysis of the Full Bitcoin Transaction Graph," by Dorit Ron and Adi Shamir:
Abstract. The Bitcoin scheme is a rare example of a large scale global...schneier From Schneier on Security | October 18, 2012 at 11:11 AM
New report from the Presidential Commission for the Study of Biothethical Issues.
It's called "Privacy and Progress in Whole Genome Sequencing." The Commission...schneier From Schneier on Security | October 17, 2012 at 11:23 AM
Interesting paper: "Before We Knew It: An Empirical Study of Zero-Day Attacks In The Real World," by Leyla Bilge and Tudor Dumitras:
Abstract: Little is known...schneier From Schneier on Security | October 16, 2012 at 11:12 AM
This is important:
Previously, Apple had all but disabled tracking of iPhone users by advertisers when it stopped app developers from utilizing Apple mobile device...schneier From Schneier on Security | October 15, 2012 at 06:21 PM
Earlier this month, a retired New York City locksmith was selling a set of "master keys" on eBay:
Three of the five are standard issue for members of the FDNY,...schneier From Schneier on Security | October 15, 2012 at 12:02 PM
I was reviewed in Science:
Thus it helps to have a lucid and informative account such as Bruce Schneier's Liars and Outliers. The book provides an interesting...schneier From Schneier on Security | October 13, 2012 at 12:28 PM
A squid art car.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | October 12, 2012 at 09:17 PM