From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Interesting research:
Target prevalence powerfully influences visual search behavior. In most visual search experiments, targets appear on at least 50% of trials...schneier From Schneier on Security | February 8, 2010 at 07:54 PM
Three weeks ago, Google announced a sophisticated attack against them from China. There have been some interesting technical details since then. And the NSA is...schneier From Schneier on Security | February 8, 2010 at 12:03 PM
At FSE 2010 this week, Dmitry Khovratovich and Ivica Nikolic presented a paper where they cryptanalyze ARX algorithms (algorithms that use only addition, rotation...schneier From Schneier on Security | February 7, 2010 at 02:06 PM
This is unconscionable:
At Tuesday's hearing, Senator Dianne Feinstein, Democrat of California and chairwoman of the Senate Intelligence Committee, asked Mr. Blair...schneier From Schneier on Security | February 5, 2010 at 05:59 PM
Does anyone think this is a good idea?
Under an agreement that is still being finalized, the National Security Agency would help Google analyze a major corporate...schneier From Schneier on Security | February 5, 2010 at 12:02 PM
Security is rarely static. Technology changes both security systems and attackers. But thereschneier From Schneier on Security | February 4, 2010 at 12:35 PM
Universal identification is portrayed by some as the holy grail of Internet security. Anonymity is bad, the argument goes; and if we abolish it, we can ensure only...schneier From Schneier on Security | February 3, 2010 at 10:07 AM
The Foreign Policy website has its own list of movie-plot threats: machine-gun wielding terrorists on paragliders, disease-laden insect swarms, a dirty bomb made...schneier From Schneier on Security | February 1, 2010 at 12:34 PM
Ross Anderson reports:
Online transactions with credit cards or debit cards are increasingly verified using the 3D Secure system, which is branded as "Verified...schneier From Schneier on Security | February 1, 2010 at 12:26 PM
How unique is your browser? Can you be tracked simply by its characteristics? The EFF is trying to find out. Their site Panopticlick will measure the characteristics...schneier From Schneier on Security | January 29, 2010 at 09:29 AM
Today is World Privacy Day. (I know; it's odd to me, too.) You can celebrate by signing on to the Madrid Privacy Declaration, either as an individual or as an...schneier From Schneier on Security | January 28, 2010 at 12:21 PM
Still experimental:
The team propose using a particle accelerator to alternately smash ionised hydrogen molecules and deuterium ions into targets of carbon and...schneier From Schneier on Security | January 27, 2010 at 12:53 PM
This seems like a bad idea:
Police in the UK are planning to use unmanned spy drones, controversially deployed in Afghanistan, for the "routine" monitoring of...schneier From Schneier on Security | January 26, 2010 at 01:16 PM
The notion that U.S. intelligence should have "connected the dots," and caught Abdulmutallab, isn't going away. This is a typical example:
So you'd need comeresponds...schneier From Schneier on Security | January 25, 2010 at 01:09 PM
CNN.com just published an essay of mine on China's hacking of Google, an update of this essay.
schneier From Schneier on Security | January 24, 2010 at 02:43 PM