From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
New research:
An associate professor of chemistry and chemical biology at Northeastern University, Deravi’s recently published paper in the Journal of Materials...Bruce Schneier From Schneier on Security | March 21, 2025 at 04:30 PM
The Atlantic has a search tool that allows you to search for specific works in the “LibGen” database of copyrighted works that Meta used to train its AI models....Bruce Schneier From Schneier on Security | March 21, 2025 at 02:26 PM
The UK’s National Computer Security Center (part of GCHQ) released a timeline—also see their blog post—for migration to quantum-computer-resistant cryptography....Bruce Schneier From Schneier on Security | March 21, 2025 at 07:47 AM
This is serious:
A sophisticated cascading supply chain attack has compromised multiple GitHub Actions, exposing critical CI/CD secrets across tens of thousands...Bruce Schneier From Schneier on Security | March 20, 2025 at 11:14 AM
Really interesting research: “How WEIRD is Usable Privacy and Security Research?” by Ayako A. Hasegawa Daisuke Inoue, and Mitsuaki Akiyama:
Abstract: In human...Bruce Schneier From Schneier on Security | March 18, 2025 at 07:10 AM
New paper: “GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and TETRA: Brute Force Cryptanalysis of KASUMI, SPECK, and TEA3.”
Abstract: Key lengths...Bruce Schneier From Schneier on Security | March 17, 2025 at 11:09 AM