From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Texas Instruments' calculators use RSA digital signatures to authenticate any updates to their operating system. Unfortunately, their signing keys are too short...schneier From Schneier on Security | September 25, 2009 at 11:17 AM
It's not just hackers who steal financial and medical information:
Between April 2007 and January 2008, visitors to the Kmart and Sears web sites were invitedSony...schneier From Schneier on Security | September 24, 2009 at 11:37 AM
I already blogged about this; there's more information in this new article:
Included in the items the German army allowed humanitarian groups to distribute in...schneier From Schneier on Security | September 23, 2009 at 06:43 PM
This is a good thing:
An Illinois district court has allowed a couple to sue their bank on the novel grounds that it may have failed to sufficiently secure their...Schneier From Schneier on Security | September 23, 2009 at 11:00 AM
Back in 2005, I wrote about the failure of two-factor authentication to mitigate banking fraud:
Here are two new active attacks we're starting to see:
Man-in-the...schneier From Schneier on Security | September 22, 2009 at 11:39 AM
This is an important development:
Shor's algorithm was first demonstrated in a computing system based on nuclear magnetic resonance -- manipulating molecules in...schneier From Schneier on Security | September 22, 2009 at 11:01 AM
Interesting:
For nine months, Eagle's team recorded data from the phones of 94 students and staff at MIT. By using blue-tooth technology and phone masts, theyabstract...schneier From Schneier on Security | September 21, 2009 at 06:41 PM
Good essay on "terrorist havens" -- like Afghanistan -- and why they're not as big a worry as some maintain:
Rationales for maintaining the counterinsurgency in...schneier From Schneier on Security | September 21, 2009 at 11:46 AM
I wrote about the DHS's color-coded threat alert system in 2003, in Beyond Fear:
The color-coded threat alerts issued by the Department of Homeland Security are...schneier From Schneier on Security | September 18, 2009 at 11:45 AM
Using a 3D printer. Impressive.
At the end of the day he talked the officers into trying the key on their handcuffs and schneier From Schneier on Security | September 16, 2009 at 02:00 PM
Skein is one of the 14 SHA-3 candidates chosen by NIST to advance to the second round. As part of the process, NIST allowed the algorithm designers to implement...schneier From Schneier on Security | September 15, 2009 at 11:10 AM
Back in 2002, science fiction author Robert J. Sawyer wrote an essay about the trade-off between privacy and security, and came out in favor of less privacy. I...schneier From Schneier on Security | September 14, 2009 at 09:20 AM
On September 30, 2001, I published a special issue of Crypto-Gram discussing the terrorist attacks. I wrote about the novelty of the attacks, airplane security...schneier From Schneier on Security | September 11, 2009 at 02:47 PM
File deletion is all about control. This used to not be an issue. Your data was on your computer, and you decided when and how to delete a file. You could use the...schneier From Schneier on Security | September 10, 2009 at 11:08 AM
The BBC has a video demonstration of a 16-ounce bottle of liquid blowing a hole in the side of a plane.
I know no more details other than what's in the video.
...schneier From Schneier on Security | September 9, 2009 at 05:25 PM