From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
"Measuring the Perpetrators and Funders of Typosquatting," by Tyler Moore and Benjamin Edelman:
Abstract. We describe a method for identifying "typosquatting",...schneier From Schneier on Security | March 15, 2010 at 09:33 AM
A hollowed-out U.S. nickel can hold a microSD card. Pound and euro coins are also available. I blogged about this about a year ago as well.
schneier From Schneier on Security | March 12, 2010 at 12:58 PM
It's good to dream:
IARPA's five-year plan aims to design experiments that can measure trust with high certainty -- a tricky proposition for a psychological study...schneier From Schneier on Security | March 11, 2010 at 12:17 PM
Really:
Since they are hard to conceal, the study says, noses would work well for identification in covert surveillance.
The researchers say noses have been overlooked...schneier From Schneier on Security | March 10, 2010 at 07:47 PM
Good legal paper on the limits of identity cards: Stephen Mason and Nick Bohm, "Identity and its Verification," in Computer Law & Security Review, Volume 26, Number...schneier From Schneier on Security | March 10, 2010 at 01:09 PM
Interesting commentary:
I don't think this is really a case about ISP liability at all. It is a case about the use of a person's image, without their consent,...schneier From Schneier on Security | March 9, 2010 at 06:36 PM
The "Microsoft Online Services Global Criminal Compliance Handbook (U.S. Domestic Version)" (also can be found here, here, and here) outlines exactly what Microsoft...schneier From Schneier on Security | March 9, 2010 at 12:59 PM
How not to destroy evidence:
In a bold and bizarre attempt to destroy evidence seized during a federal raid, a New York City man grabbed a flash drive and swallowed...schneier From Schneier on Security | March 8, 2010 at 05:00 PM
Interesting paper: "A Practical Attack to De-Anonymize Social Network Users."
Abstract. Social networking sites such as Facebook, LinkedIn, and Xing have been...schneier From Schneier on Security | March 8, 2010 at 12:13 PM
The Spanish police arrested three people in connection with the 13-million-computer Mariposa botnet.
schneier From Schneier on Security | March 5, 2010 at 12:02 PM
On Tuesday, the White House published an unclassified summary of its Comprehensive National Cybersecurity Initiative (CNCI). Howard Schmidt made the announcement...schneier From Schneier on Security | March 4, 2010 at 06:55 PM
Look at this new AES-encrypted USB memory stick. You enter the key directly into the stick via the keypad, thereby bypassing any eavesdropping software on the...schneier From Schneier on Security | March 4, 2010 at 12:05 PM