Schneier on Security
A blog covering security and security technology.
Movable Type Pro
Updated: 6 years 37 weeks ago
Tamper-Detection App for Android
Edward Snowden and Nathan Freitas have created an Android app that detects when it's being tampered with. The basic idea is to put the app on a second phone and put the app on or near something important, like your laptop. The app can then text you -- and also record audio and video -- when something happens around it:...
Bruce Schneier
Categories: Security
Fake Santa Surveillance Camera
Reka makes a "decorative Santa cam," meaning that it's not a real camera. Instead, it just gets children used to being under constant surveillance. Our Santa Cam has a cute Father Christmas and mistletoe design, and a red, flashing LED light which will make the most logical kids suspend their disbelief and start to believe!...
Bruce Schneier
Categories: Security
Security Vulnerabilities in Star Wars
A fun video describing some of the many Empire security vulnerabilities in the first Star Wars movie. Happy New Year, everyone....
Bruce Schneier
Categories: Security
Friday Squid Blogging: Squid Populations Are Exploding
New research: "Global proliferation of cephalopods" Summary: Human activities have substantially changed the world's oceans in recent decades, altering marine food webs, habitats and biogeochemical processes. Cephalopods (squid, cuttlefish and octopuses) have a unique set of biological traits, including rapid growth, short lifespans and strong life-history plasticity, allowing them to adapt quickly to changing environmental conditions. There has been growing...
Bruce Schneier
Categories: Security
Profile of Reality Winner
New York Magazine published an excellent profile of the single-document leaker Reality Winner....
Bruce Schneier
Categories: Security
The "Extended Random" Feature in the BSAFE Crypto Library
Matthew Green wrote a fascinating blog post about the NSA's efforts to increase the amount of random data exposed in the TLS protocol, and how it interacts with the NSA's backdoor into the DUAL_EC_PRNG random number generator to weaken TLS....
Bruce Schneier
Categories: Security
Post-Quantum Algorithms
NIST has organized a competition for public-key algorithms secure against a quantum computer. It recently published all of its Round 1 submissions. (Details of the NIST efforts are here. A timeline for the new algorithms is here.)...
Bruce Schneier
Categories: Security
Acoustical Attacks against Hard Drives
Interesting destructive attack: "Acoustic Denial of Service Attacks on HDDs": Abstract: Among storage components, hard disk drives (HDDs) have become the most commonly-used type of non-volatile storage due to their recent technological advances, including, enhanced energy efficacy and significantly-improved areal density. Such advances in HDDs have made them an inevitable part of numerous computing systems, including, personal computers, closed-circuit television...
Bruce Schneier
Categories: Security