From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Interesting research: "One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users":
Abstract: Tor is a popular low-latency anonymity...schneier From Schneier on Security | March 25, 2011 at 09:34 AM
This is just silly:
Beaver Stadium is a terrorist target. It is most likely the No. 1 target in the region. As such, it deserves security measures commensurate...Schneier From Schneier on Security | October 9, 2009 at 09:39 AM
Interesting:
Songhua Xu presented an interesting idea for measuring pen angle and pressure to present beautiful flower-like visual versions of a handwritten signature...Schneier From Schneier on Security | October 8, 2009 at 09:33 AM
I think there are 2 letters to sum up this event: OK. Content-wise, it was between OK and great. The organization of the event was terrible, though: The venue was...Johannes Fahrenkrug From Springenwerk Blog | March 12, 2009 at 11:37 AM
The majority staff of the House Homeland Security Committee hosted a workshop December 3 on "Constitutional Protections in Homeland Security." A copy of the agenda... From U.S. Public Policy Committee of the ACM | December 4, 2008 at 12:00 AM
USACM Chair Eugene Spafford recently made predictions about information security curriculua in American higher education for CSO Magazine. You can read his comments... From U.S. Public Policy Committee of the ACM | November 30, 2008 at 12:00 AM