From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Great pictures.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | April 27, 2012 at 04:32 PM
At the RSA Conference this year, I noticed a trend of companies that have products and services designed to help victims recover from attacks. Kelly Jackson Higgins...schneier From Schneier on Security | April 27, 2012 at 11:53 AM
Last year, I wrote about how social media sites are making it harder than ever for undercover police officers. This story talks about how biometric passports are...schneier From Schneier on Security | April 26, 2012 at 11:57 AM
danah boyd is thinking about -- in a draft essay, and as a recording of a presentation -- fear and the attention economy. Basically, she is making the argument...schneier From Schneier on Security | April 25, 2012 at 11:51 AM
In Liars and Outliers, I use the metaphor of the Prisoner's Dilemma to exemplify the conflict between group interest and self-interest. There are a gazillion academic...schneier From Schneier on Security | April 24, 2012 at 04:44 PM
GCHQ, the UK government's communications headquarters, has released two new -- well, 70 years old, but new to us -- cryptanalysis documents by Alan Turing.
The...schneier From Schneier on Security | April 23, 2012 at 11:18 AM
How to extract squid ink.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | April 20, 2012 at 09:49 PM
Liars & Outliers has been available for about two months, and is selling well both in hardcover and e-book formats. More importantly, I'm very pleased with the...schneier From Schneier on Security | April 20, 2012 at 05:48 PM
Interesting data from the U.S. Government Accounting Office:
But congressional auditors have questions about other efficiencies as well, like having 3,000 "behavior...schneier From Schneier on Security | April 20, 2012 at 11:19 AM
A burglar was identified by his dance moves, captured on security cameras:
"The 16-year-old juvenile suspect is known for his 'swag,' or signature dance move,"...schneier From Schneier on Security | April 19, 2012 at 06:03 PM
Brian Krebs writes about smart meter hacks:
But it appears that some of these meters are smarter than others in their ability to deter hackers and block unauthorized...schneier From Schneier on Security | April 19, 2012 at 10:52 AM
Here's something good:
We have implemented sophisticated brute force protection for Linode Manager user accounts that combines a time delay on failed attempts,...schneier From Schneier on Security | April 18, 2012 at 06:30 PM
This article talks about a database of stolen cell phone IDs that will be used to deny service. While I think this is a good idea, I don't know how much it would...schneier From Schneier on Security | April 18, 2012 at 11:49 AM
That's a nice turn of phrase:
Forever day is a play on "zero day," a phrase used to classify vulnerabilities that come under attack before the responsible manufacturer...schneier From Schneier on Security | April 17, 2012 at 06:22 PM
From the CIA journal Studies in Intelligence: "Capturing the Potential of Outlier Ideas in the Intelligence Community."
In war you will generally find that the...schneier From Schneier on Security | April 17, 2012 at 11:15 AM
Kip Hawley wrote an essay for the Wall Street Journal on airport security. In it, he says so many sensible things that people have been forwarding it to me with...schneier From Schneier on Security | April 16, 2012 at 05:29 PM
Really interesting paper on the moral and ethical implications of cyberwar, and the use of information technology in war (drones, for example):
"Information Warfare...schneier From Schneier on Security | April 16, 2012 at 10:55 AM
Great short story in Nature.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | April 13, 2012 at 09:48 PM
This is not a video of my talk at the RSA Conference earlier this year. This is a 16-minute version of that talk -- TED-like -- that the conference filmed the...schneier From Schneier on Security | April 13, 2012 at 07:11 PM
One of the problems with Tor traffic is that it can de detected and blocked. Here's SkypeMorph, a clever system that disguises Tor traffic as Skype video traffic...schneier From Schneier on Security | April 13, 2012 at 12:08 PM