From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Apple's map application shows more of Taiwan than Google Maps:
The Taiwanese government/military, like many others around the world, requests that satellite imagery...schneier From Schneier on Security | October 11, 2012 at 12:03 PM
Not computer networks, networks in general:
Findings so far suggest that networks of networks pose risks of catastrophic danger that can exceed the risks in isolated...schneier From Schneier on Security | October 10, 2012 at 01:43 PM
This is a fascinating story of a CIA burglar, who worked for the CIA until he tried to work against the CIA. The fact that he stole code books and keys from foreign...schneier From Schneier on Security | October 9, 2012 at 11:31 AM
In the never-ending arms race between systems to prove that you're a human and computers that can fake it, here's a captcha that tests whether you have human feelings...schneier From Schneier on Security | October 8, 2012 at 01:12 PM
Neat book illustration.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | October 5, 2012 at 09:38 PM
On a NIST-sponsored hash function mailing list, Jesse Walker (from Intel; also a member of the Skein team) did some back-of-the-envelope calculations to estimate...schneier From Schneier on Security | October 5, 2012 at 06:24 PM
The folks at F-Secure have plotted ZeroAccess infections across the U.S. and across Europe. It's interesting to see, but I'm curious to see the data normalized...schneier From Schneier on Security | October 5, 2012 at 12:44 PM
NIST has just announced that Keccak has been selected as SHA-3.
It's a fine choice. I'm glad that SHA-3 is nothing like the SHA-2 family; something completely...schneier From Schneier on Security | October 2, 2012 at 09:50 PM
Among other findings in this CBO report:
Funding for homeland security has dropped somewhat from its 2009 peak of $76 billion, in inflation-adjusted terms; funding...schneier From Schneier on Security | October 2, 2012 at 02:41 PM
This story sounds pretty scary:
Developed by Robert Templeman at the Naval Surface Warfare Center in Indiana and a few buddies from Indiana University, PlaceRader...schneier From Schneier on Security | October 1, 2012 at 11:52 AM
A proposal to replace cryptography's Alice and Bob with Sita and Rama:
Any book on cryptography invariably involves the characters Alice and Bob. It is always...schneier From Schneier on Security | September 27, 2012 at 02:10 PM
Kay Hamacher and Stefan Katzenbeisser, "Public Security: Simulations Need to Replace Conventional Wisdom," New Security Paradigms Workshop, 2011.
Abstract: Is...schneier From Schneier on Security | September 26, 2012 at 12:11 PM
NIST is about to announce the new hash algorithm that will become SHA-3. This is the result of a six-year competition, and my own Skein is one of the five remaining...schneier From Schneier on Security | September 24, 2012 at 11:59 AM