From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Clever:
Quantum cryptography is often touted as being perfectly secure. It is based on the principle that you cannot make measurements of a quantum system without...schneier From Schneier on Security | September 2, 2010 at 06:46 PM
This is beyond stupid:
The Pentagon is contemplating an aggressive approach to defending its computer systems that includes preemptive actions such as knocking...schneier From Schneier on Security | September 2, 2010 at 12:33 PM
As part of NIST's SHA-3 selection process, people have been implementing the candidate hash functions on a variety of hardware and software platforms. Our team...schneier From Schneier on Security | September 1, 2010 at 06:17 PM
Skein is my new hash function. Well, "my" is an overstatement; I'm one of the eight designers. It was submitted to NIST for their SHA-3 competition, and oneselected...schneier From Schneier on Security | September 1, 2010 at 11:01 AM
"Protecting your daily in-home activity information from a wireless snooping attack," by Vijay Srinivasan, John Stankovic, and Kamin Whitehouse:
Abstract: In...schneier From Schneier on Security | August 31, 2010 at 05:39 PM
In Australia:
A high school teacher who assigned her class to plan a terrorist attack that would kill as many innocent people as possible had no intent to promote...schneier From Schneier on Security | August 31, 2010 at 11:42 AM
Chilling:
How do most wrongful convictions come about?
The primary cause is mistaken identification. Actually, I wouldn't call it mistaken identification; I'd...schneier From Schneier on Security | August 30, 2010 at 05:05 PM
Since a fatal crash a few years ago, Boston T (their subway) operators have been forbidden from using -- or even having -- cell phones while on the job. Passengers...schneier From Schneier on Security | August 30, 2010 at 10:31 AM
Back in May, I attended the EastWest Institute's First Worldwide Cybersecurity Summit in Dallas. I only had eight minutes to speak, and tried to turn the dialog...schneier From Schneier on Security | August 27, 2010 at 05:47 PM
Full-body scanners in roving vans:
American Science & Engineering, a company based in Billerica, Massachusetts, has sold U.S. and foreign government agencies more...schneier From Schneier on Security | August 27, 2010 at 12:58 PM
Research paper: Detecting Deceptive Discussions in Conference Calls, by David F. Larcker and Anastasia A. Zakolyukina.
Abstract: We estimate classification models...schneier From Schneier on Security | August 26, 2010 at 11:15 AM
From danah boyd:
Carmen is engaging in social steganography. She's hiding information in plain sight, creating a message that can be read in one way by those who...schneier From Schneier on Security | August 25, 2010 at 11:20 AM
And you thought fingerprints were intrusive.
The Wright State Research Institute is developing a ground-breaking system that would scan the skeletal structures...schneier From Schneier on Security | August 24, 2010 at 11:56 AM
This is a first, I think:
The airline's central computer which registered technical problems on planes was infected by Trojans at the time of the fatal crash and...schneier From Schneier on Security | August 23, 2010 at 11:03 AM
Who knew?
"Hulse was shooting with burst mode on his camera, so I know exactly what the interval is between the frames and I can calculate velocity of squid flying...schneier From Schneier on Security | August 20, 2010 at 09:02 PM
Intel McAfee.
It's another example of a large non-security company buying a security company. I've been talking about this sort of thing for two and a half years...schneier From Schneier on Security | August 19, 2010 at 04:26 PM
Good essay by Seth Godin:
We pay the fear tax every time we spend time or money seeking reassurance. We pay it twice when the act of seeking that reassurance actually...schneier From Schneier on Security | August 18, 2010 at 08:48 PM
The Crypto 2010 Conference is going on right now at the University of California, Santa Barbara. Springer-Verlag publishes the proceedings, but they're available...schneier From Schneier on Security | August 17, 2010 at 05:29 PM
Still minor, but this kind of thing is only going to get worse:
The new research shows that other systems in the vehicle are similarly insecure. The tire pressure...schneier From Schneier on Security | August 17, 2010 at 11:42 AM