Twister Icon Hanein Icon Register | Login
schneier_sec Dec 08, 2016
U.S. Elections Are a Mess, Even Though There’s No Evidence This One Was Hacked
schneier_sec Dec 08, 2016
New NSA Stories
schneier_sec Apr 23, 2016
The Value of Encryption
schneier_sec Apr 23, 2016
Friday Squid Blogging: My Little Cephalopod
schneier_sec Apr 07, 2016
Bypassing Phone Security through Social Engineering
schneier_sec Apr 06, 2016
IBM Officially Owns Resilient Systems
schneier_sec Apr 06, 2016
CONIKS
schneier_sec Apr 05, 2016
WhatsApp is Now End-to-End Encrypted
schneier_sec Apr 04, 2016
Smart Essay on the Limitations of Anti-Terrorism Security
schneier_sec Apr 01, 2016
Friday Squid Blogging: Composite Materials Based on Squid Beaks
schneier_sec Apr 01, 2016
Reddit's Warrant Canary Just Died
schneier_sec Apr 01, 2016
Hacking Elections in Latin America
schneier_sec Mar 31, 2016
ISIS Encryption Opsec
schneier_sec Mar 30, 2016
http://ur1.ca/optq6 Why You Should Side With Apple, Not the FBI, in the San Bernardino iPhone Case
schneier_sec Mar 30, 2016
http://ur1.ca/optq1 Friday Squid Blogging: President Squid
schneier_sec Feb 03, 2016
http://ur1.ca/oh844 Security vs. Surveillance
schneier_sec Feb 03, 2016
http://ur1.ca/oh545 Security vs. Surveillance
schneier_sec Feb 02, 2016
http://ur1.ca/oh2m7 The Internet Of Things Will Be The World's Biggest Robot
schneier_sec Feb 02, 2016
http://ur1.ca/oh24i Paper on the Going Dark Debate
schneier_sec Feb 02, 2016
http://ur1.ca/oh11d More Details on the NSA Switching to Quantum-Resistant Cryptography
schneier_sec Feb 01, 2016
http://ur1.ca/ogxh5 NSA and GCHQ Hacked Israeli Drone Feeds
schneier_sec Feb 01, 2016
http://ur1.ca/ogvxm NSA's TAO Head on Internet Offense and Defense
schneier_sec Jan 29, 2016
http://ur1.ca/oglar Friday Squid Blogging: Polynesian Squid Hook
schneier_sec Jan 29, 2016
http://ur1.ca/ogkvi Encryption Backdoor Comic
schneier_sec Jan 29, 2016
http://ur1.ca/ogjce Integrity and Availability Threats
schneier_sec Jan 28, 2016
http://ur1.ca/oggip Psychological Model of Selfishness
schneier_sec Jan 27, 2016
http://ur1.ca/ogfro When Hacking Could Enable Murder
schneier_sec Jan 27, 2016
http://ur1.ca/ogfrp How an Overreaction to Terrorism Can Hurt Cybersecurity
schneier_sec Jan 27, 2016
http://ur1.ca/ogdq9 Horrible Story of Digital Harassment
schneier_sec Jan 26, 2016
http://ur1.ca/ogb9w Data Driven Policing
schneier_sec Jan 25, 2016
http://ur1.ca/og7qv Shodan Lets Your Browse Insecure Webcams
schneier_sec Jan 22, 2016
http://ur1.ca/ofx4x Friday Squid Blogging: North Coast Squid
schneier_sec Jan 22, 2016
http://ur1.ca/ofwoz UK Government Promoting Backdoor-Enabled Voice Encryption Protocol
schneier_sec Jan 22, 2016
http://ur1.ca/ofux6 Security Trade-offs in the Longbow vs. Crossbow Decision
schneier_sec Jan 21, 2016
http://ur1.ca/ofp8f El Chapo's Opsec
schneier_sec Jan 20, 2016
http://ur1.ca/ofkm4 France Rejects Back Doors in Encryption Products
schneier_sec Jan 19, 2016
http://ur1.ca/ofi9z Reverse-Engineering a Zero-Day Exploit from the Hacking Team Data Dump
schneier_sec Jan 18, 2016
http://ur1.ca/ofe2s Counterfeit Theater Tickets in New York
schneier_sec Jan 18, 2016
http://ur1.ca/ofdfv Match Fixing in Tennis
schneier_sec Jan 16, 2016
http://ur1.ca/of5sx Should We Allow Bulk Searching of Cloud Archives?
schneier_sec Jan 15, 2016
http://ur1.ca/of1tq Spamming Someone from PayPal
schneier_sec Jan 14, 2016
http://ur1.ca/oeywi Fighting DRM in the W3C
schneier_sec Jan 14, 2016
http://ur1.ca/oex3q Sean Penn's Opsec
schneier_sec Jan 13, 2016
http://ur1.ca/oerpm The Internet of Things that Talks About You Behind Your Back
schneier_sec Jan 12, 2016
http://ur1.ca/oeoh4 Michael Hayden and the Dutch Government Are against Crypto Backdoors
schneier_sec Jan 11, 2016
http://ur1.ca/oekeb Mac OS X, iOS, and Flash Had the Most Discovered Vulnerabilities in 2015
schneier_sec Jan 11, 2016
http://ur1.ca/oeien IT Security and the Normalization of Deviance
schneier_sec Jan 09, 2016
http://ur1.ca/oebrv The Internet of Things That Talk About You Behind Your Back
schneier_sec Jan 08, 2016
http://ur1.ca/oe8cd Friday Squid Blogging: Squid Ink Pasta
schneier_sec Jan 08, 2016
http://ur1.ca/oe7zy Podcast Interview with Me
schneier_sec Jan 08, 2016
http://ur1.ca/oe7pe "How Stories Deceive"
schneier_sec Jan 08, 2016
http://ur1.ca/oe6bc Replacing Judgment with Algorithms
schneier_sec Jan 07, 2016
http://ur1.ca/oe1p8 Straight Talk about Terrorism
schneier_sec Jan 06, 2016
http://ur1.ca/oe09b The Risks—and Benefits—of Letting Algorithms Judge Us
schneier_sec Jan 06, 2016
http://ur1.ca/odx7n How the US Is Playing Both Ends on Data Privacy
schneier_sec Jan 05, 2016
http://ur1.ca/oduab 1981 CIA Report on Deception
schneier_sec Jan 05, 2016
http://ur1.ca/odt06 NSA Spies on Israeli Prime Minister
schneier_sec Jan 04, 2016
http://ur1.ca/odq95 Windows 10 Whole-Disk Encryption without Key Escrow
schneier_sec Jan 04, 2016
http://ur1.ca/odoyi De-Anonymizing Users from their Coding Styles
schneier_sec Jan 01, 2016
http://ur1.ca/odelg Friday Squid Blogging: Video of Live Giant Squid
schneier_sec Dec 31, 2015
http://ur1.ca/oda6p Cory Doctorow on Software Security and the Internet of Things
schneier_sec Dec 30, 2015
http://ur1.ca/od611 Another Scandal Resulting from E-mails Gone Public
schneier_sec Dec 29, 2015
http://ur1.ca/od4gt PayPal Authentication Still Substandard
schneier_sec Dec 29, 2015
http://ur1.ca/od3y9 DMCA and the Internet of Things
schneier_sec Dec 28, 2015
http://ur1.ca/od240 NSA/GCHQ Exploits Against Juniper Networking Equipment
schneier_sec Dec 26, 2015
http://ur1.ca/od093 How the Internet of Things Limits Consumer Choice
schneier_sec Dec 25, 2015
http://ur1.ca/ocyvs Friday Squid Blogging: Squid Christmas
schneier_sec Dec 24, 2015
http://ur1.ca/ocxef Burglary Footage Turned into Commercial
schneier_sec Dec 24, 2015
http://ur1.ca/ocx0l Police Dog Sniffs for Hard Drives
schneier_sec Dec 23, 2015
http://ur1.ca/ocv21 Using Law Against Technology
schneier_sec Dec 22, 2015
http://ur1.ca/octed More Writings on the Second Crypto Wars
schneier_sec Dec 21, 2015
http://ur1.ca/ocsxk Can Laws Keep Up with Tech World?
schneier_sec Dec 21, 2015
http://ur1.ca/ocsit "The Medieval Origins of Mass Surveillance"
schneier_sec Dec 21, 2015
http://ur1.ca/ocs2d Back Door in Juniper Firewalls
schneier_sec Dec 18, 2015
http://ur1.ca/oco1g Friday Squid Blogging: Penguins Fight over Squid
schneier_sec Dec 18, 2015
http://ur1.ca/ocnow GCHQ Holiday Puzzle
schneier_sec Dec 18, 2015
http://ur1.ca/ocn76 25th Anniversary of the Landmark Unix Security Book
schneier_sec Dec 17, 2015
http://ur1.ca/ocli4 Catalog of Police Surveillance Equipment
schneier_sec Dec 17, 2015
http://ur1.ca/ockzx User Errors Often Compromise Encryption
schneier_sec Dec 16, 2015
http://ur1.ca/ociod DOS Attack Against Los Angeles Schools
schneier_sec Dec 14, 2015
http://ur1.ca/ocfug Attack Against DNS Root Servers
schneier_sec Dec 14, 2015
http://ur1.ca/ocetq "Security Theater" Sighting
schneier_sec Dec 14, 2015
http://ur1.ca/oce3q Good Swatting Story
schneier_sec Dec 11, 2015
http://ur1.ca/oc939 Friday Squid Blogging: Rare Octopus Squid Video from Hawaii
schneier_sec Dec 11, 2015
http://ur1.ca/oc8zd Resilient Systems News: End-of-Year Trends Webinar
schneier_sec Dec 11, 2015
http://ur1.ca/oc883 Hit-and-Run Driver Arrested Because Car Reported Accident
schneier_sec Dec 10, 2015
http://ur1.ca/oc5p7 How People Learn about Computer Security
schneier_sec Dec 09, 2015
http://ur1.ca/oc3t3 Terrifying Technologies
schneier_sec Dec 09, 2015
http://ur1.ca/oc34u Worldwide Cryptographic Products Survey: Edits and Additions Wanted
schneier_sec Dec 09, 2015
http://ur1.ca/oc33z How Israel Regulates Encryption
schneier_sec Dec 09, 2015
http://ur1.ca/oc346 The Moral Dimension of Cryptography
schneier_sec Dec 09, 2015
http://ur1.ca/oc342 BlackBerry Leaves Pakistan Rather Than Provide a Government Backdoor
schneier_sec Dec 09, 2015
http://ur1.ca/oc340 Forced Authorization Attacks Against Chip-and-Pin Credit Card Terminals
schneier_sec Dec 01, 2015
http://ur1.ca/oc06l Tracking Someone Using LifeLock
schneier_sec Nov 30, 2015
http://ur1.ca/obxiw A History of Privacy
schneier_sec Nov 30, 2015
http://ur1.ca/obwm7 Cryptanalysis of Algebraic Eraser
schneier_sec Nov 27, 2015
http://ur1.ca/obqq5 Friday Squid Blogging: Squid Necklace
schneier_sec Nov 27, 2015
http://ur1.ca/obqj0 Data and Goliath in German
schneier_sec Nov 27, 2015
http://ur1.ca/obpw4 Defending against Actual IT Threats
schneier_sec Nov 25, 2015
http://ur1.ca/obljr NSA Lectures on Communications Security from 1973
schneier_sec Nov 24, 2015
http://ur1.ca/objq6 NSA Collected Americans' E-mails Even After it Stopped Collecting Americans' E-mails
schneier_sec Nov 24, 2015
http://ur1.ca/obiax Policy Repercussions of the Paris Terrorist Attacks
schneier_sec Nov 23, 2015
http://ur1.ca/obb4g Voter Surveillance
schneier_sec Nov 20, 2015
http://ur1.ca/oaqvk Friday Squid Blogging: Squid Spawning in South Australian Waters
schneier_sec Nov 20, 2015
http://ur1.ca/oaoab Reputation in the Information Age
schneier_sec Nov 19, 2015
http://ur1.ca/oahq4 RFID-Shielded, Ultra-Strong Duffel Bags
schneier_sec Nov 18, 2015
http://ur1.ca/oaccb Paris Terrorists Use Double ROT-13 Encryption
schneier_sec Nov 18, 2015
http://ur1.ca/oaa5d Ads Surreptitiously Using Sound to Communicate Across Devices
schneier_sec Nov 17, 2015
http://ur1.ca/oa6ew The Automation of Reputation
schneier_sec Nov 17, 2015
http://ur1.ca/oa4gg On CISA
schneier_sec Nov 17, 2015
http://ur1.ca/oa3ec Refuse to Be Terrorized
schneier_sec Nov 16, 2015
http://ur1.ca/oa07h Paris Attacks Blamed on Strong Cryptography and Edward Snowden
schneier_sec Nov 16, 2015
http://ur1.ca/o9ya1 Did Carnegie Mellon Attack Tor for the FBI?
schneier_sec Nov 13, 2015
http://ur1.ca/o9o4k Friday Squid Blogging: Squid Fishing Championship
schneier_sec Nov 13, 2015
http://ur1.ca/o9nmx Amazon Chooses Data and Goliath as a Best Book of 2015
schneier_sec Nov 13, 2015
http://ur1.ca/o9ly4 Personal Data Sharing by Mobile Apps
schneier_sec Nov 12, 2015
http://ur1.ca/o9iw7 Testing the Usability of PGP Encryption Tools
schneier_sec Nov 12, 2015
http://ur1.ca/o9ha1 Betting Ticket Forged Based on Selfie
schneier_sec Nov 11, 2015
http://ur1.ca/o9eh4 Bypassing the iPhone Activation Lock
schneier_sec Nov 11, 2015
http://ur1.ca/o9dhp Ransomware Is Getting Sophisticated
schneier_sec Nov 10, 2015
http://ur1.ca/o9atq IT Security Is Still a Great Career Path
schneier_sec Nov 10, 2015
http://ur1.ca/o9918 Linus Torvalds on Linux Security
schneier_sec Nov 09, 2015
http://ur1.ca/o947r Good Article on the Blockchain
schneier_sec Nov 06, 2015
http://ur1.ca/o8t9w Friday Squid Blogging: The Symbiotic Relationship Between Squid and Bacteria
schneier_sec Nov 05, 2015
http://ur1.ca/o8nf5 Passwords by Mail
schneier_sec Nov 05, 2015
http://ur1.ca/o8lba The Effects of Surveillance on the Victims
schneier_sec Nov 04, 2015
http://ur1.ca/o8h9w Analyzing Reshipping Mule Scams
schneier_sec Nov 03, 2015
http://ur1.ca/o8c1a $1M Bounty for iPhone Hack
schneier_sec Nov 03, 2015
http://ur1.ca/o89vs Australia Is Testing Virtual Passports
schneier_sec Nov 02, 2015
http://ur1.ca/o84t1 The Rise of Political Doxing
schneier_sec Oct 30, 2015
http://ur1.ca/o7w8t Friday Squid Blogging: Baby Giant Squid Found
schneier_sec Oct 30, 2015
http://ur1.ca/o7vye The Onion on the State of IT Security
schneier_sec Oct 30, 2015
http://ur1.ca/o7u83 Weaknesses in the PLAID Protocol
schneier_sec Oct 29, 2015
http://ur1.ca/o7qg2 Flash Drive Lock
schneier_sec Oct 29, 2015
http://ur1.ca/o7ovh Tracking Connected Vehicles
schneier_sec Oct 28, 2015
http://ur1.ca/o7lcb The Rise of Political Doxing
schneier_sec Oct 28, 2015
http://ur1.ca/o7l2b Why Is the NSA Moving Away from Elliptic Curve Cryptography?
schneier_sec Oct 28, 2015
http://ur1.ca/o7j7y The Doxing Trend
schneier_sec Oct 27, 2015
http://ur1.ca/o7dth The Need for Transparency in Surveillance
schneier_sec Oct 26, 2015
http://ur1.ca/o75i7 Ravens Can Identify Cheaters
schneier_sec Oct 26, 2015
http://ur1.ca/o7240 Microsoft's Brad Smith on the Collapse of Safe Harbor
schneier_sec Oct 24, 2015
http://ur1.ca/o6fen Face Facts about Internet Security
schneier_sec Oct 23, 2015
http://ur1.ca/o61cv Friday Squid Blogging: Squid Bed Sheets
schneier_sec Oct 23, 2015
http://ur1.ca/o5tuw Forensic Analysis of Smart Card Fraud
schneier_sec Oct 22, 2015
http://ur1.ca/o5ert Hacking Fitbit
schneier_sec Oct 22, 2015
http://ur1.ca/o5a08 Police Want Genetic Data from Corporate Repositories
schneier_sec Oct 21, 2015
http://ur1.ca/o4vkv Forgotten Passwords
schneier_sec Oct 21, 2015
http://ur1.ca/o4r3k Security Risks of Unpatched Android Software
schneier_sec Oct 19, 2015
http://ur1.ca/o387n How to Commandeer a Store PA System
schneier_sec Oct 16, 2015
http://ur1.ca/o1ty4 Friday Squid Blogging: Squid Photos
schneier_sec Oct 16, 2015
http://ur1.ca/o1slm Mapping FinFisher Users
schneier_sec Oct 16, 2015
http://ur1.ca/o1lnl Breaking Diffie-Hellman with Massive Precomputation (Again)
schneier_sec Oct 15, 2015
http://ur1.ca/o14gj Problems with DNA Evidence
schneier_sec Oct 14, 2015
http://ur1.ca/o0sk1 On Cyber Arms Control Treaties
schneier_sec Oct 14, 2015
http://ur1.ca/o0oc2 Obama Administration Not Pursuing a Backdoor to Commercial Encryption
schneier_sec Oct 13, 2015
http://ur1.ca/o06oe Jamming Wi-Fi
schneier_sec Oct 12, 2015
http://ur1.ca/nzns7 Soviet Spying on US Selectric Typewriters
schneier_sec Oct 09, 2015
http://ur1.ca/nytmf NSA Patents
schneier_sec Oct 08, 2015
http://ur1.ca/nyogw I'm a Guest on "Adam Ruins Everything"
schneier_sec Oct 08, 2015
http://ur1.ca/nyo9j Friday Squid Blogging: Japanese Squid Recipe
schneier_sec Oct 08, 2015
http://ur1.ca/nyl6v SHA-1 Freestart Collision
schneier_sec Oct 08, 2015
http://ur1.ca/nyi0l Information in Your Boarding Pass's Bar Code
schneier_sec Oct 07, 2015
http://ur1.ca/nxw7f European Court of Justice Rules Against Safe Harbor
schneier_sec Oct 06, 2015
http://ur1.ca/nxfhg Autonomous Vehicles as Bombs
schneier_sec Oct 05, 2015
http://ur1.ca/nx2bj Automatic Face Recognition and Surveillance
schneier_sec Oct 02, 2015
http://ur1.ca/nwiri Friday Squid Blogging: Bobtail Squid Keeps Bacteria to Protect Its Eggs
schneier_sec Oct 02, 2015
http://ur1.ca/nwhum Resilient Systems News
schneier_sec Oct 02, 2015
http://ur1.ca/nwemp Stealing Fingerprints
schneier_sec Oct 01, 2015
http://ur1.ca/nw7yc Existential Risk and Technological Advancement
schneier_sec Oct 01, 2015
http://ur1.ca/nw5ti Identifying CIA Officers in the Field
schneier_sec Sep 30, 2015
http://ur1.ca/nw1np The Era Of Automatic Facial Recognition And Surveillance Is Here
schneier_sec Sep 30, 2015
http://ur1.ca/nw1jl Stealing Fingerprints
schneier_sec Sep 30, 2015
http://ur1.ca/nw1jm VW Scandal Could Just Be the Beginning
schneier_sec Sep 30, 2015
http://ur1.ca/nvy9t Spoofing Fitness Trackers
schneier_sec Sep 30, 2015
http://ur1.ca/nvx2x Volkswagen and Cheating Software
schneier_sec Sep 29, 2015
http://ur1.ca/nvmc5 How GCHQ Tracks Internet Users
schneier_sec Sep 28, 2015
http://ur1.ca/nveqg Good Article on the Sony Attack
schneier_sec Sep 25, 2015
http://ur1.ca/nuxt8 Friday Squid Blogging: Disney's Minigame Squid Wars
schneier_sec Sep 25, 2015
http://ur1.ca/nux3x Anti-Alien Security
schneier_sec Sep 25, 2015
http://ur1.ca/nutr5 People Who Need to Pee Are Better at Lying
schneier_sec Sep 24, 2015
http://ur1.ca/nunnl Living in a Code Yellow World
schneier_sec Sep 23, 2015
http://ur1.ca/nukbd Self-Destructing Computer Chip
schneier_sec Sep 23, 2015
http://ur1.ca/nukaj Drone Speedboat
schneier_sec Sep 23, 2015
http://ur1.ca/nuhto Hacking the Game Show "Press Your Luck"
schneier_sec Sep 23, 2015
http://ur1.ca/nuhtw Living in Code Yellow
schneier_sec Sep 23, 2015
http://ur1.ca/nuhtu History of Hacktivism
schneier_sec Sep 23, 2015
http://ur1.ca/nuhtq Buying an Online Reputation
schneier_sec Sep 14, 2015
http://ur1.ca/ns8il Security Cartoon
schneier_sec Sep 14, 2015
http://ur1.ca/ns3a1 Programming Errors Weaken bcrypt Hashes of Ashley Madison Passwords
schneier_sec Sep 11, 2015
http://ur1.ca/nr9e1 Friday Squid Blogging: The Chemistry of Squid Camouflage
schneier_sec Sep 11, 2015
http://ur1.ca/nr80l Wanted: Cryptography Products for Worldwide Survey
schneier_sec Sep 11, 2015
http://ur1.ca/nr3jn Drone Self-Defense and the Law
schneier_sec Sep 10, 2015
http://ur1.ca/nqn2i FBI and Apple's Encryption
schneier_sec Sep 09, 2015
http://ur1.ca/nqi8e Is It OK to Shoot Down a Drone over Your Backyard?
schneier_sec Sep 09, 2015
http://ur1.ca/nqbpi Animals vs. Drones
schneier_sec Sep 08, 2015
http://ur1.ca/npp2d TSA Master Keys
schneier_sec Sep 07, 2015
http://ur1.ca/npavn Glenn Greenwald Debates Keith Alexander
schneier_sec Sep 04, 2015
http://ur1.ca/nob1m Understanding Squid Self-Healing Teeth
schneier_sec Sep 04, 2015
http://ur1.ca/no6kp China's "Great Cannon"
schneier_sec Aug 28, 2015
http://ur1.ca/nl95v Mickens on Security