Schneier on Security

Syndicate content
A blog covering security and security technology. Movable Type Pro
Updated: 6 years 3 weeks ago

Tamper-Detection App for Android

Wed, 01/03/2018 - 14:17
Edward Snowden and Nathan Freitas have created an Android app that detects when it's being tampered with. The basic idea is to put the app on a second phone and put the app on or near something important, like your laptop. The app can then text you -- and also record audio and video -- when something happens around it:... Bruce Schneier
Categories: Security

Fake Santa Surveillance Camera

Tue, 01/02/2018 - 14:51
Reka makes a "decorative Santa cam," meaning that it's not a real camera. Instead, it just gets children used to being under constant surveillance. Our Santa Cam has a cute Father Christmas and mistletoe design, and a red, flashing LED light which will make the most logical kids suspend their disbelief and start to believe!... Bruce Schneier
Categories: Security

Security Vulnerabilities in Star Wars

Mon, 01/01/2018 - 14:23
A fun video describing some of the many Empire security vulnerabilities in the first Star Wars movie. Happy New Year, everyone.... Bruce Schneier
Categories: Security

Friday Squid Blogging: Squid Populations Are Exploding

Sat, 12/30/2017 - 00:23
New research: "Global proliferation of cephalopods" Summary: Human activities have substantially changed the world's oceans in recent decades, altering marine food webs, habitats and biogeochemical processes. Cephalopods (squid, cuttlefish and octopuses) have a unique set of biological traits, including rapid growth, short lifespans and strong life-history plasticity, allowing them to adapt quickly to changing environmental conditions. There has been growing... Bruce Schneier
Categories: Security

Profile of Reality Winner

Fri, 12/29/2017 - 14:34
New York Magazine published an excellent profile of the single-document leaker Reality Winner.... Bruce Schneier
Categories: Security

The "Extended Random" Feature in the BSAFE Crypto Library

Thu, 12/28/2017 - 14:30
Matthew Green wrote a fascinating blog post about the NSA's efforts to increase the amount of random data exposed in the TLS protocol, and how it interacts with the NSA's backdoor into the DUAL_EC_PRNG random number generator to weaken TLS.... Bruce Schneier
Categories: Security

Post-Quantum Algorithms

Wed, 12/27/2017 - 14:28
NIST has organized a competition for public-key algorithms secure against a quantum computer. It recently published all of its Round 1 submissions. (Details of the NIST efforts are here. A timeline for the new algorithms is here.)... Bruce Schneier
Categories: Security

Acoustical Attacks against Hard Drives

Tue, 12/26/2017 - 17:34
Interesting destructive attack: "Acoustic Denial of Service Attacks on HDDs": Abstract: Among storage components, hard disk drives (HDDs) have become the most commonly-used type of non-volatile storage due to their recent technological advances, including, enhanced energy efficacy and significantly-improved areal density. Such advances in HDDs have made them an inevitable part of numerous computing systems, including, personal computers, closed-circuit television... Bruce Schneier
Categories: Security

eXTReMe Tracker