From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In 2009, I wrote:
There are several ways two people can divide a piece of cake in half. One way is to find someone impartial to do it for them. This works, but...Bruce Schneier From Schneier on Security | February 2, 2024 at 07:01 AM
GCHQ has released new images of the WWII Colossus code-breaking computer, celebrating the machine’s eightieth anniversary (birthday?).
News article.Bruce Schneier From Schneier on Security | January 30, 2024 at 03:08 PM
It finally admitted to buying bulk data on Americans from data brokers, in response to a query by Senator Weyden.
This is almost certainly illegal, although the...Bruce Schneier From Schneier on Security | January 30, 2024 at 07:12 AM
Microsoft is reporting that a Russian intelligence agency—the same one responsible for SolarWinds—accessed the email system of the company’s executives.
Beginning...Bruce Schneier From Schneier on Security | January 29, 2024 at 07:03 AM
Amazing footage of a black-eyed squid (Gonatus onyx) carrying thousands of eggs. They tend to hang out about 6,200 feet below sea level.
As usual, you can alsohere...Bruce Schneier From Schneier on Security | January 26, 2024 at 05:10 PM
For most of history, communicating with a computer has not been like communicating with a person. In their earliest years, computers required carefully constructed...Bruce Schneier From Schneier on Security | January 26, 2024 at 07:09 AM
Interesting article. I am also skeptical that we are going to see useful quantum computers anytime soon. Since at least 2019, I have been saying that this is hard...Bruce Schneier From Schneier on Security | January 25, 2024 at 07:04 AM
New research into poisoning AI models:
The researchers first trained the AI models using supervised learning and then used additional “safety training” methods...Bruce Schneier From Schneier on Security | January 24, 2024 at 07:06 AM
Really interesting research: “Lend Me Your Ear: Passive Remote Physical Side Channels on PCs.”
Abstract:
We show that built-in sensors in commodity PCs, such as...Bruce Schneier From Schneier on Security | January 23, 2024 at 07:09 AM
You can find them by searching for OpenAI chatbot warning messages, like: “I’m sorry, I cannot provide a response as it goes against OpenAI’s use case policy.”
I...Bruce Schneier From Schneier on Security | January 22, 2024 at 07:09 AM
We only eat about half of a squid, ignoring the fins. A group of researchers is working to change that.
As usual, you can also use this squid post to talk about...Bruce Schneier From Schneier on Security | January 19, 2024 at 05:07 PM
Okay, so this is weird. Zelle has been using my name, and my voice, in audio podcast ads—without my permission. At least, I think it is without my permission. It...Bruce Schneier From Schneier on Security | January 19, 2024 at 03:05 PM
After 175 million failed password guesses, a judge rules that the Canadian police must return a suspect’s phone.
[Judge] Carter said the investigation can continue...Bruce Schneier From Schneier on Security | January 18, 2024 at 07:02 AM
Interesting research: “Do Users Write More Insecure Code with AI Assistants?“:
Abstract: We conduct the first large-scale user study examining how users interact...Bruce Schneier From Schneier on Security | January 17, 2024 at 07:14 AM
Over at Wired, Andy Greenberg has an excellent story about the creators of the 2016 Mirai botnet.Bruce Schneier From Schneier on Security | January 16, 2024 at 07:21 AM
New research demonstrates voice cloning, in multiple languages, using samples ranging from one to twelve seconds.
Research paper.Bruce Schneier From Schneier on Security | January 15, 2024 at 07:09 AM
Interesting article, with photographs.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Read my...Bruce Schneier From Schneier on Security | January 12, 2024 at 05:06 PM
New law journal article:
Smart Device Manufacturer Liability and Redress for Third-Party Cyberattack Victims
Abstract: Smart devices are used to facilitate cyberattacks...Bruce Schneier From Schneier on Security | January 12, 2024 at 07:03 AM
Add pharmacies to the list of industries that are giving private data to the police without a warrant.Bruce Schneier From Schneier on Security | January 11, 2024 at 07:09 AM
In 2000, I wrote: “If McDonald’s offered three free Big Macs for a DNA sample, there would be lines around the block.”
Burger King in Brazil is almost there, offering...Bruce Schneier From Schneier on Security | January 10, 2024 at 07:05 AM