From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Humbolt Squid off the coast of Mexico are spawning younger and smaller than usual. El Nino is to blame. The mystery was solved by a class of biology students....schneier From Schneier on Security | December 9, 2011 at 10:30 PM
DARPA held an unshredding contest, and there's a winner:
"Lots of experts were skeptical that a solution could be produced at all let alone within the short time...schneier From Schneier on Security | December 8, 2011 at 12:12 PM
Just announced:
The researchers found several properties of Skype that can track not only users' locations over time, but also their peer-to-peer (P2P) file-sharing...schneier From Schneier on Security | December 7, 2011 at 06:49 PM
In Montreal, police marked protesters with invisible ink to be able to identify them later. The next step is going to be a spray that marks people surreptitiously...schneier From Schneier on Security | December 7, 2011 at 12:13 PM
Invasive U.S. surveillance programs, either illegal like the NSA's wiretapping of AT&T phone lines or legal as authorized by the PATRIOT Act, are causing foreign...schneier From Schneier on Security | December 6, 2011 at 07:50 PM
Last week, I had a long conversation with Robert Lemos over an article he was writing about full disclosure. He had noticed that companies have recently been reacting...schneier From Schneier on Security | December 6, 2011 at 01:31 PM
Spyware on many smart phones monitors your every action, including collecting individual keystrokes. The company that makes and runs this software on behalf of...schneier From Schneier on Security | December 5, 2011 at 12:05 PM
Last weekend, I received an honorary PhD from the University of Westminster, in London.
I have had mixed feelings about this since I was asked early this year....schneier From Schneier on Security | December 2, 2011 at 07:57 PM
It's the kind of research result that screams hype, but online attacks that have physical-world consequences are fundamentally a different sort of threat. I suspect...schneier From Schneier on Security | December 2, 2011 at 07:17 PM
Interesting essay on walls and their effects:
Walls, then, are built not for security, but for a sense of security. The distinction is important, as those whoas...schneier From Schneier on Security | December 2, 2011 at 11:30 AM
According to researchers, full-disk encryption is hampering police forensics.
The authors of the report suggest there are some things law enforcement can do, but...schneier From Schneier on Security | December 1, 2011 at 07:44 PM
After a long and hard year, Liars and Outliers is done. I submitted the manuscript to the publisher on Oct 1, got edits back from both an outside editor and a...schneier From Schneier on Security | December 1, 2011 at 12:25 PM
The debate over full disclosure in computer security has been going on for the better part of two decades now. The stakes are much higher in biology:
The virus...schneier From Schneier on Security | November 30, 2011 at 06:28 PM
I have no idea if this story about CIA spies in Lebanon is true, and it will almost certainly never be confirmed or denied:
But others inside the American intelligence...schneier From Schneier on Security | November 30, 2011 at 12:57 PM
If something is protected by heavy security, it's obviously worth stealing. Here's an example from the insect world:
Maize plants, like many others, protect themselves...schneier From Schneier on Security | November 29, 2011 at 08:13 PM