From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
A very good four-part series: "Risk and Security in the Telecommunications Industry."
schneier From Schneier on Security | December 16, 2009 at 12:20 PM
This is interesting:
Most Americans fail to appreciate that the Civil Rights movement was about the overthrow of an entrenched political order in each of the Southern...schneier From Schneier on Security | December 15, 2009 at 01:57 PM
Now this interesting:
The United States has begun talks with Russia and a United Nations arms control committee about strengthening Internet security and limiting...schneier From Schneier on Security | December 14, 2009 at 01:41 PM
Rumors are that RSA president Art Coviello declined the job. No surprise: it has no actual authority but a lot of responsibility.
Security experts have pointed...schneier From Schneier on Security | December 11, 2009 at 12:37 PM
Last month, researchers found a security flaw in the SSL protocol, which is used to protect sensitive web data. The protocol is used for online commerce, webmail...schneier From Schneier on Security | December 10, 2009 at 07:13 PM
BoingBoing is pretty snarky:
The TSA has published a "redacted" version of their s00per s33kr1t screening procedure guidelines (Want to know whether to frisk a...schneier From Schneier on Security | December 10, 2009 at 12:47 PM
Schmidt said:
I think judgment matters. If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place. If you really...schneier From Schneier on Security | December 9, 2009 at 06:22 PM
This, from The New England Journal of Medicine, sounds familiar:
This is the story line for most headline-grabbing illnesses schneier From Schneier on Security | December 9, 2009 at 12:43 PM
I missed this story:
Since 2007, the U.S. State Department has been issuing high-tech "e-passports," which contain computer chips carrying biometric data to prevent...schneier From Schneier on Security | December 8, 2009 at 12:05 PM
In an AP story on increased security at major football (the American variety) events, this sentence struck me:
"High-profile events are something that terrorist...schneier From Schneier on Security | December 7, 2009 at 01:53 PM
Wired summarizes research by Christopher Soghoian:
Sprint Nextel provided law enforcement agencies with customer location data more than 8 million times between...schneier From Schneier on Security | December 3, 2009 at 11:47 AM
It can be impossible to securely delete a file:
What are the security implications of Volume Shadow Copy?
Suppose you decide to protect one of your documents...schneier From Schneier on Security | December 2, 2009 at 09:49 AM
This research centers on looking at the radio characteristics of individual RFID chips and creating a "fingerprint." It makes sense; fingerprinting individual...schneier From Schneier on Security | December 1, 2009 at 04:15 PM
National Journal has an excellent article on cyberwar policy. I agree with the author's comments on The Atlantic blog:
Would the United States ever use a morereport...schneier From Schneier on Security | December 1, 2009 at 12:59 PM
This is a very interesting paper: "The Real Hustle, which does hidden camera demonstrations of con games. (There's no DVD of the show available, but there areprevious...schneier From Schneier on Security | November 30, 2009 at 10:20 AM