Twitter
LinkedIn
RSS

Posts Tagged ‘schneier on security’


Conversnitch

Surveillance is getting cheaper and easier : Two artists have revealed Conversnitch, a device they built for less than $100 that resembles a lightbulb or lamp and surreptitiously listens in on nearby conversations and posts snippets of transcribed audio to Twitter . Kyle McDonald and Brian House say they hope to raise questions about the nature of public and private spaces in an era when anything can be broadcast by ubiquitous, Internet-connected listening devices

Read More...

Dan Geer on Heartbleed and Software Monocultures

Good essay : To repeat, Heartbleed is a common mode failure. We would not know about it were it not open source (Good). That it is open source has been shown to be no talisman against error (Sad).

Read More...

Friday Squid Blogging: Squid Jigging

Good news from Malaysia: The Terengganu International Squid Jigging Festival (TISJF) will be continued and become an annual event as one of the state’s main tourism products, said Menteri Besar Datuk Seri Ahmad Said. He said TISJF will become a signature event intended to enhance the branding of Terengganu as a leading tourism destination in the region. “Beside introducing squid jigging as a leisure activity, the event also highlights the state’s beautiful beaches, lakes and islands and also our arts, culture and heritage,” he said

Read More...

Reverse Heartbleed

Heartbleed can affect clients as well as servers.

Read More...

Schneier Talks and Interviews

Here are three articles about me from the last month.

Read More...

Friday Squid Blogging: Bronze Giant Squid Sculpture

A little too big for my house.

Read More...

"Unbreakable" Encryption Almost Certainly Isn’t

This headline is provocative: “Human biology inspires ‘unbreakable’ encryption.” The article is similarly nonsensical: Researchers at Lancaster University, UK have taken a hint from the way the human lungs and heart constantly communicate with each other, to devise an innovative, highly flexible encryption algorithm that they claim can’t be broken using the traditional methods of cyberattack. Information can be encrypted with an array of different algorithms, but the question of which method is the most secure is far from trivial.

Read More...

The Youngest Security Researcher

Five-year-old finds login vulnerability in Microsoft Xbox.

Read More...

Friday Squid Blogging: Squid + Security in a Cartoon

Funny.

Read More...