From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Cheap!
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | May 18, 2012 at 09:26 PM
In his blog:
I think the most important security issues going forward center around identity and trust. Before knowing I would soon encounter Bruce again in the...schneier From Schneier on Security | May 18, 2012 at 11:06 AM
It was written in 1971, but this still seems like a cool book:
For an elementary illustration of tactics, take parts of your face as the point of reference; your...schneier From Schneier on Security | May 17, 2012 at 12:20 PM
Need some pre-industrial security for your USB drive? How about a wax seal? Neat, but I recommend combining it with encryption for even more security!schneier From Schneier on Security | May 16, 2012 at 06:50 PM
According to a report from the DHS Office of Inspector General:
Federal investigators "identified vulnerabilities in the screening process" at domestic airports...schneier From Schneier on Security | May 16, 2012 at 11:15 AM
To New Zealand:
United States Secretary of Homeland Security Janet Napolitano has warned the New Zealand Government about the latest terrorist threat known as...schneier From Schneier on Security | May 15, 2012 at 11:17 AM
Why do otherwise rational people think it's a good idea to profile people at airports? Recently, neuroscientist and best-selling author Sam Harris related a story...schneier From Schneier on Security | May 14, 2012 at 11:19 AM
Kraken: The Curious, Exciting, and Slightly Disturbing Science of Squid. And a review.
As usual, you can also use this squid post to talk about the security stories...schneier From Schneier on Security | May 11, 2012 at 09:58 PM
MobileScope looks like a great tool for monitoring and controlling what information third parties get from your smart phone apps:
We built MobileScope as a proof...schneier From Schneier on Security | May 11, 2012 at 11:42 AM
All RuggedCom equipment comes with a built-in backdoor:
The backdoor, which cannot be disabled, is found in all versions of the Rugged Operating System made by...schneier From Schneier on Security | May 9, 2012 at 11:24 AM
We don't know much, but here are my predictions:
There's a lot more hyperbole to this story than reality.
The explosive would have either 1) been caught by pre...schneier From Schneier on Security | May 8, 2012 at 06:14 PM
This is a ridiculous overreaction:
The police bomb squad was called to 2 World Financial Center in lower Manhattan at midday when a security guard reported a package...schneier From Schneier on Security | May 8, 2012 at 12:03 PM
With all the talk about airborne drones like the Predator, it's easy to forget that drones can be in the water as well. Meet the Common Unmanned Surface Vessel...schneier From Schneier on Security | May 7, 2012 at 11:52 AM
Neat.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | May 4, 2012 at 09:01 PM
This vendor is selling a tampon-shaped USB drive. Although it's less secure now that there are blog posts about it.schneier From Schneier on Security | May 4, 2012 at 06:31 PM
I suppose this sort of thing might be useful someday.
In Second Life, avatars are easily identified by their username, meaning police can just ask San Francisco...schneier From Schneier on Security | May 4, 2012 at 11:31 AM
I've often written about the base rate fallacy and how it makes tests for rare events -- like airplane terrorists -- useless because the false positives vastlyThis...schneier From Schneier on Security | May 3, 2012 at 11:22 AM