From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Exactly how did they confirm it was Bin Laden's body?
Officials compared the DNA of the person killed at the Abbottabad compound with the bin Laden "family DNA"...schneier From Schneier on Security | May 5, 2011 at 05:52 PM
It's not that the risk is greater, it's that the fear is greater. Data from New York:
There were 10,566 reports of suspicious objects across the five boroughs...schneier From Schneier on Security | May 5, 2011 at 11:43 AM
Wouldn't it be great if this were not a joke: the security contingency that was in place in the event that Kate Middleton tried to run away just before the wedding...schneier From Schneier on Security | May 4, 2011 at 05:15 PM
This is interesting:
When World Kitchen took over the Pyrex brand, it started making more products out of prestressed soda-lime glass instead of borosilicate....schneier From Schneier on Security | May 4, 2011 at 11:40 AM
According to this article, students are no longer learning how to write in cursive. And, if they are learning it, they're forgetting how. Certainly the ubiquity...schneier From Schneier on Security | May 3, 2011 at 07:25 PM
Not a lot of details:
ElcomSoft research shows that image metadata and image data are processed independently with a SHA-1 hash function. There are two 160-bit...schneier From Schneier on Security | May 3, 2011 at 12:54 PM
Earlier this month, the FBI seized control of the Coreflood botnet and shut it down:
According to the filing, ISC, under law enforcement supervision, planned to...schneier From Schneier on Security | May 2, 2011 at 10:30 AM
This is a surprise. My TED talk made it to the website. It's a surprise because I didn't speak at TED. I spoke last year at a regional TED event, TEDxPSU. And...schneier From Schneier on Security | April 29, 2011 at 07:45 PM
Good paper: "Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy," by Jerry Brito and Tate Watkins.
Over the past two years there has...schneier From Schneier on Security | April 28, 2011 at 11:56 AM
It's standard sociological theory that a group experiences social solidarity in response to external conflict. This paper studies the phenomenon in the Unitednew...schneier From Schneier on Security | April 27, 2011 at 02:10 PM
As I've written before, I run an open WiFi network. It's stories like these that may make me rethink that.
The three stories all fall along the same theme: a...schneier From Schneier on Security | April 26, 2011 at 11:59 AM
Clever:
Khan and his colleagues have written software that ensures clusters of a file, rather than being positioned at the whim of the disc drive controller chip...schneier From Schneier on Security | April 25, 2011 at 10:24 AM
Okay, this is a little weird:
This year's Earth Day will again include the celebrated "squid printing" activity with two big, beautiful Pacific Humboldt squidagain...schneier From Schneier on Security | April 22, 2011 at 09:30 PM
The CIA has just declassified six (1, 2, 3, 4, 5, and 6) documents about World War I security techniques. (The media is reporting they're CIA documents, but the...schneier From Schneier on Security | April 21, 2011 at 11:38 AM
A criminal gang is stealing truckloads of food:
Late last month, a gang of thieves stole six tractor-trailer loads of tomatoes and a truck full of cucumbers from...schneier From Schneier on Security | April 20, 2011 at 11:52 AM
Interesting blog post on the security costs for the $50B Air Force bomber program -- estimated to be $8B. This isn't all computer security, but the original article...schneier From Schneier on Security | April 20, 2011 at 11:31 AM
Increasingly, chains of evidence include software steps. It's not just the RIAA suing people -- and getting it wrong -- based on automatic systems to detect and...schneier From Schneier on Security | April 19, 2011 at 11:47 AM