From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Long and interesting article from The Toronto Star on the Toronto 18, a terrorist cell arrested in 2006. Lots of stuff in this article I had not read before....schneier From Schneier on Security | July 8, 2010 at 05:17 PM
"Does Surveillance Make Us Morally Better?":
Conclusion
The upshot of these reflections is that the relation between surveillance and moral edification is complicated...schneier From Schneier on Security | July 8, 2010 at 12:07 PM
There's a power struggle going on in the U.S. government right now.
It's about who is in charge of cyber security, and how much control the government will exert...schneier From Schneier on Security | July 7, 2010 at 05:58 PM
This sign is from a gas station in the U.K.
My first reaction was to laugh, but then I started thinking about it. We know that signs like "No Shoplifting"...schneier From Schneier on Security | July 7, 2010 at 02:20 PM
From the National Academies in 2009: Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. It's 390 pages.
schneier From Schneier on Security | July 6, 2010 at 11:00 AM
Interesting:
...water molecules differ slightly in their isotope ratios depending on the minerals at their source. ...researchers found that water samples from...schneier From Schneier on Security | July 5, 2010 at 03:00 PM
This is from Atomic Bombing: How to Protect Yourself, published in 1950:
Of course, millions of us will go through our lives never seeing a spy or a saboteur...schneier From Schneier on Security | July 1, 2010 at 06:05 PM
By Russian spies:
Ricci said the steganographic program was activated by pressing control-alt-E and then typing in a 27-character password, which the FBI found...schneier From Schneier on Security | July 1, 2010 at 02:02 PM
For a while now, I've pointed out that cryptography is singularly ill-suited to solve the major network security problems of today: denial-of-service attacks, website...schneier From Schneier on Security | June 30, 2010 at 05:53 PM
From Brazil: the moral, of course, is to choose a strong key and to encrypt the entire drive, not just key files.
schneier From Schneier on Security | June 30, 2010 at 02:16 PM
Space terrorism? Yes, space terrorism. This article, by someone at the European Space Policy Institute, hypes a terrorst threat I've never seen hyped before....schneier From Schneier on Security | June 29, 2010 at 04:42 PM
This, from Congressman Louie Gohmert of Texas, is about as dumb as it gets:
I talked to a retired FBI agent who said that one of the things they were looking at...schneier From Schneier on Security | June 29, 2010 at 11:28 AM
I'm at SHB 2010, the Third Interdisciplinary Workshop on Security and Human Behavior, at Cambridge University. This is a two-day gathering of computer securityprogram...schneier From Schneier on Security | June 28, 2010 at 09:02 AM
"10 Everyday Items Hackers Are Targeting Right Now"
5. Your Blender. Yes, Your Blender
That's right: your blender is under attack! Most mixers are self-contained...schneier From Schneier on Security | June 25, 2010 at 06:47 PM
Interesting:
The experiments offered the crayfish stark decisions -- a choice between finding their next meal and becoming a meal for an apparent predator. In...schneier From Schneier on Security | June 25, 2010 at 11:53 AM
It's operational:
The idea of hyperspectral sensing is not, however, merely to "see" in the usual sense of optical telescopes, infrared nightscopes and/or thermal...schneier From Schneier on Security | June 24, 2010 at 06:21 PM
Long, but interesting, profile of WikiLeaks's Julian Assange from The New Yorker.
Assange is an international trafficker, of sorts. He and his colleagues collect...schneier From Schneier on Security | June 24, 2010 at 06:13 PM