From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Using a 3D printer. Impressive.
At the end of the day he talked the officers into trying the key on their handcuffs and schneier From Schneier on Security | September 16, 2009 at 02:00 PM
Skein is one of the 14 SHA-3 candidates chosen by NIST to advance to the second round. As part of the process, NIST allowed the algorithm designers to implement...schneier From Schneier on Security | September 15, 2009 at 11:10 AM
Back in 2002, science fiction author Robert J. Sawyer wrote an essay about the trade-off between privacy and security, and came out in favor of less privacy. I...schneier From Schneier on Security | September 14, 2009 at 09:20 AM
On September 30, 2001, I published a special issue of Crypto-Gram discussing the terrorist attacks. I wrote about the novelty of the attacks, airplane security...schneier From Schneier on Security | September 11, 2009 at 02:47 PM
File deletion is all about control. This used to not be an issue. Your data was on your computer, and you decided when and how to delete a file. You could use the...schneier From Schneier on Security | September 10, 2009 at 11:08 AM
The BBC has a video demonstration of a 16-ounce bottle of liquid blowing a hole in the side of a plane.
I know no more details other than what's in the video.
...schneier From Schneier on Security | September 9, 2009 at 05:25 PM
Three of the UK liquid bombers were convicted Monday. NSA-intercepted e-mail was introduced as evidence in the trial:
The e-mails, several of which have been ...schneier From Schneier on Security | September 9, 2009 at 03:10 PM
Interesting video:
A new class of global actors is playing an increasingly important role in globalization: smugglers, warlords, guerrillas, terrorists, gangs,...schneier From Schneier on Security | September 8, 2009 at 03:06 PM
Very interesting hour-long interview.
Australian-born David Kilcullen was the senior advisor to US General David Petraeus during his time in Iraq, advising on...Bruce Schneier From Schneier on Security | September 7, 2009 at 11:04 AM
Blog post from Ed Felten:
Usually when the threat model mentions subpoenas, the bigger threats in reality come from malicious intruders or insiders. The biggest...schneier From Schneier on Security | September 4, 2009 at 11:18 AM
If there's actually a cult out there, I want to hear about it. In an essay by that name, John Viega writes about the dangers of relying on Applied Cryptography...schneier From Schneier on Security | September 3, 2009 at 06:56 PM
Access control is difficult in an organizational setting. On one hand, every employee needs enough access to do his job. On the other hand, every time you giverole...schneier From Schneier on Security | September 3, 2009 at 05:54 PM
Blog post from Steve Bellovin:
It is vital that the keystream values (a) be truly random and (b) never be reused. The Soviets got that wrong in the 1940s; as a...schneier From Schneier on Security | September 3, 2009 at 12:20 PM
Good article, which basically says that our policies are based more on fear than on reality.
On cyber-terrorism:
So why is there so much concern about schneier From Schneier on Security | September 2, 2009 at 12:40 PM
Interesting:
So how many bits are in this instance of H1N1? The raw number of bits, by my count, is 26,022; the actual number of coding bits approximately 25,054...schneier From Schneier on Security | September 1, 2009 at 06:13 PM
Fascinating story of a 16-year-old blind phone phreaker.
One afternoon, not long after Proulx was swatted, Weigman came home to find his mother talking to what...schneier From Schneier on Security | September 1, 2009 at 11:23 AM