From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
One of the pleasant side effects of being too busy to write longer blog posts is that -- if I wait long enough -- someone else writes what I would have wanted to...schneier From Schneier on Security | June 17, 2011 at 05:09 PM
I'm at the Tenth Workshop on Economics of Information Security (WEIS 2011) , at George Mason University. Most of the papers are online, and Ross Anderson is liveblogging...schneier From Schneier on Security | June 15, 2011 at 06:19 PM
Worth reading: Morgan Leigh Manning, "Less than Picture Perfect: The Legal Relationship between Photographers' Rights and Law Enforcement," Tennessee Law Review...schneier From Schneier on Security | June 14, 2011 at 06:45 PM
Last night, at the Third EPIC Champion of Freedom Awards Dinner, we gave an award to Susie Castillo, whose blog post and video of her treatment in the hands of...schneier From Schneier on Security | June 14, 2011 at 12:54 PM
I've been asked this question by countless reporters in the past couple of weeks. Here's a good explanation. Shorter answer: it's easy to spoof source destination...schneier From Schneier on Security | June 13, 2011 at 11:52 AM
Patrick Gray on why we secretly love LulzSec, and Robert Cringely on why we openly hate RSA.
schneier From Schneier on Security | June 10, 2011 at 05:59 PM
Interesting:
Iscon's patented, thermo-conductive technology combines infrared (IR) and heat transfer, for high-resolution imaging without using any radiation....schneier From Schneier on Security | June 10, 2011 at 11:14 AM
Interesting research: Kirill Levchenko, et al. (2010), "Click Trajectories -- End-to-End Analysis of the Spam Value Chain," IEEE Symposium on Security and Privacy...schneier From Schneier on Security | June 9, 2011 at 06:53 PM
I have no idea if this is true:
In some cases, popular illegal forums used by cyber criminals as marketplaces for stolen identities and credit card numbers have...schneier From Schneier on Security | June 8, 2011 at 08:46 PM
Here's a new law that won't work:
State lawmakers in country music's capital have passed a groundbreaking measure that would make it a crime to use a friend's...schneier From Schneier on Security | June 7, 2011 at 10:32 AM
MI6 hacked into an online al-Qaeda magazine and replaced bomb-making instructions with a cupcake recipe.
It's a more polite hack than subtly altering the recipe...schneier From Schneier on Security | June 6, 2011 at 07:59 PM
Redaction failures are so common that I stopped blogging about them years ago. This is the first analysis I have seen of technical redaction failures. And here's...schneier From Schneier on Security | June 6, 2011 at 12:06 PM