From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
New cryptanalysis of the proprietrary encryption algorithm used in the Digital Enhanced Cordless Telecommunications (DECT) standard for cordless phones.
Abstract...schneier From Schneier on Security | April 8, 2010 at 06:05 PM
Air marshals are being arrested faster than air marshals are making arrests.
Actually, there have been many more arrests of Federal air marshals than that story...schneier From Schneier on Security | April 8, 2010 at 11:22 AM
Any ideas?
At a news conference at the National Press Club, WikiLeaks said it had acquired the video from whistle-blowers in the military and viewed it after breaking...schneier From Schneier on Security | April 7, 2010 at 06:37 PM
People intent on preventing a Moscow-style terrorist attack against the New York subway system are proposing a range of expensive new underground security measures...schneier From Schneier on Security | April 7, 2010 at 01:52 PM
In January, Facebook Chief Executive, Mark Zuckerberg, declared the age of privacy to be over. A month earlier, Google Chief Eric Schmidt expressed a similar sentiment...schneier From Schneier on Security | April 6, 2010 at 12:47 PM
This seems like science fiction to me:
The camera uses the same "red eye" effect of from camera flashes to project it hundreds of meters, allowing it to identify...schneier From Schneier on Security | April 5, 2010 at 06:30 PM
It'll protect your secrets from your kid sister, unless she's smarter than that.
Looks cool, though.
schneier From Schneier on Security | April 2, 2010 at 05:30 PM
This is a little hokey, but better them than the NSA:
The National Cybersecurity Awareness Campaign Challenge Competition is designed to solicit ideas from industry...schneier From Schneier on Security | April 2, 2010 at 11:14 AM
Is MI5 playing a joke on us?
Female homicide bombers are being fitted with exploding breast implants which are almost impossible to detect, British spies havecould...schneier From Schneier on Security | April 1, 2010 at 06:33 PM
Once upon a time, men and women throughout the land lived in fear. This caused them to do foolish things that made them feel better temporarily, but didn't make...schneier From Schneier on Security | April 1, 2010 at 11:24 AM
The New York Times has an article about cameras in the subways. The article is all about how horrible it is that the cameras don't work:
Moreover, nearly half...schneier From Schneier on Security | March 31, 2010 at 06:24 PM
Information technology is increasingly everywhere, and it's the same technologies everywhere. The same operating systems are used in corporate and government computers...schneier From Schneier on Security | March 31, 2010 at 11:54 AM
According to new research:
The researchers found that subjects assigned leadership roles were buffered from the negative effects of lying. Across all measures,...schneier From Schneier on Security | March 30, 2010 at 06:59 PM
Nice essay:
Of course, we know why he's really there. He's really there so that if the bridge is destroyed by terrorists, the authorities can appear on the television...schneier From Schneier on Security | March 30, 2010 at 11:06 AM
The amazing story of Gerald Blanchard.
Thorough as ever, Blanchard had spent many previous nights infiltrating the bank to do recon or to tamper with the locks...schneier From Schneier on Security | March 29, 2010 at 06:48 PM
A potential new forensic:
To determine how similar a person's fingertip bacteria are to bacteria left on computer keys, the team took swabs from three computer...schneier From Schneier on Security | March 29, 2010 at 12:15 PM