From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Blog post from Ed Felten:
Usually when the threat model mentions subpoenas, the bigger threats in reality come from malicious intruders or insiders. The biggest...schneier From Schneier on Security | September 4, 2009 at 11:18 AM
If there's actually a cult out there, I want to hear about it. In an essay by that name, John Viega writes about the dangers of relying on Applied Cryptography...schneier From Schneier on Security | September 3, 2009 at 06:56 PM
Access control is difficult in an organizational setting. On one hand, every employee needs enough access to do his job. On the other hand, every time you giverole...schneier From Schneier on Security | September 3, 2009 at 05:54 PM
Blog post from Steve Bellovin:
It is vital that the keystream values (a) be truly random and (b) never be reused. The Soviets got that wrong in the 1940s; as a...schneier From Schneier on Security | September 3, 2009 at 12:20 PM
Good article, which basically says that our policies are based more on fear than on reality.
On cyber-terrorism:
So why is there so much concern about schneier From Schneier on Security | September 2, 2009 at 12:40 PM
Interesting:
So how many bits are in this instance of H1N1? The raw number of bits, by my count, is 26,022; the actual number of coding bits approximately 25,054...schneier From Schneier on Security | September 1, 2009 at 06:13 PM
Fascinating story of a 16-year-old blind phone phreaker.
One afternoon, not long after Proulx was swatted, Weigman came home to find his mother talking to what...schneier From Schneier on Security | September 1, 2009 at 11:23 AM
A recent report has concluded that the London's surveillance cameras have solved one crime per thousand cameras per year.
David Davis MP, the former shadow home...schneier From Schneier on Security | August 31, 2009 at 10:59 AM
Weird:
The U.S. Federal Bureau of Investigation is trying to figure out who is sending laptop computers to state governors across the U.S., including West Virginia...schneier From Schneier on Security | August 28, 2009 at 05:27 PM
More security stories from the natural world:
During chase scenes, movie protagonists often make their getaway by releasing some sort of decoy to cover their escape...schneier From Schneier on Security | August 28, 2009 at 11:12 AM
Not beer, just the glasses:
The Home Office has commissioned a new design, in an attempt to stop glasses being used as weapons.
Official figures show 5,500 people...schneier From Schneier on Security | August 27, 2009 at 06:44 PM