Schneier on Security A blog covering security and security technology.
- Friday Squid Blogging: Squid Sculpture in Massachusetts Buildingby Bruce Schneier on November 1, 2024 at 9:04 pm
Great blow-up sculpture. Blog moderation policy.
- Roger Grimes on Prioritizing Cybersecurity Adviceby Bruce Schneier on October 31, 2024 at 3:43 pm
This is a good point: Part of the problem is that we are constantly handed lists…list of required controls…list of things we are being asked to fix or improve…lists of new projects…lists of threats, and so on, that are not ranked for risks. For example, we are often given a cybersecurity guideline (e.g., PCI-DSS, HIPAA, SOX, NIST, etc.) with hundreds of recommendations. They are all great recommendations, which if followed, will reduce risk in your environment. What they do not tell you is which of the recommended things will have the most impact on best reducing risk in your environment. They do not tell you that one, two or three of these things…among the hundreds that have been given to you, will reduce more risk than all the others…
- Tracking World Leaders Using Stravaby Bruce Schneier on October 31, 2024 at 3:16 pm
Way back in 2018, people noticed that you could find secret military bases using data published by the Strava fitness app. Soldiers and other military personal were using them to track their runs, and you could look at the public data and find places where there should be no people running. Six years later, the problem remains. Le Monde has reported that the same Strava data can be used to track the movements of world leaders. They don’t wear the tracking device, but many of their bodyguards do.
- Simson Garfinkel on Spooky Cryptographic Action at a Distanceby Bruce Schneier on October 30, 2024 at 2:48 pm
Excellent read. One example: Consider the case of basic public key cryptography, in which a person’s public and private key are created together in a single operation. These two keys are entangled, not with quantum physics, but with math. When I create a virtual machine server in the Amazon cloud, I am prompted for an RSA public key that will be used to control access to the machine. Typically, I create the public and private keypair on my laptop and upload the public key to Amazon, which bakes my public key into the server’s administrator account. My laptop and that remove server are thus entangled, in that the only way to log into the server is using the key on my laptop. And because that administrator account can do anything to that server—read the sensitivity data, hack the web server to install malware on people who visit its web pages, or anything else I might care to do—the private key on my laptop represents a security risk for that server…
- Law Enforcement Deanonymizes Tor Usersby Bruce Schneier on October 29, 2024 at 11:02 am
The German police have successfully deanonymized at least four Tor users. It appears they watch known Tor relays and known suspects, and use timing analysis to figure out who is using what relay. Tor has written about this. Hacker News thread.
- Criminals Are Blowing up ATMs in Germanyby Bruce Schneier on October 28, 2024 at 4:12 pm
It’s low tech, but effective. Why Germany? It has more ATMs than other European countries, and—if I read the article right—they have more money in them.
- Friday Squid Blogging: Giant Squid Found on Spanish Beachby Bruce Schneier on October 25, 2024 at 9:01 pm
A giant squid has washed up on a beach in Northern Spain. Blog moderation policy.
- Watermark for LLM-Generated Textby Bruce Schneier on October 25, 2024 at 1:56 pm
Researchers at Google have developed a watermark for LLM-generated text. The basics are pretty obvious: the LLM chooses between tokens partly based on a cryptographic key, and someone with knowledge of the key can detect those choices. What makes this hard is (1) how much text is required for the watermark to work, and (2) how robust the watermark is to post-generation editing. Google’s version looks pretty good: it’s detectable in text as small as 200 tokens.
- Are Automatic License Plate Scanners Constitutional?by Bruce Schneier on October 23, 2024 at 6:16 pm
An advocacy groups is filing a Fourth Amendment challenge against automatic license plate readers. “The City of Norfolk, Virginia, has installed a network of cameras that make it functionally impossible for people to drive anywhere without having their movements tracked, photographed, and stored in an AI-assisted database that enables the warrantless surveillance of their every move. This civil rights lawsuit seeks to end this dragnet surveillance program,” the lawsuit notes. “In Norfolk, no one can escape the government’s 172 unblinking eyes,” it continues, referring to the 172 Flock cameras currently operational in Norfolk. The Fourth Amendment protects against unreasonable searches and seizures and has been ruled in many cases to protect against warrantless government surveillance, and the lawsuit specifically says Norfolk’s installation violates that.”…
- No, The Chinese Have Not Broken Modern Encryption Systems with a Quantum Computerby Bruce Schneier on October 22, 2024 at 11:03 am
The headline is pretty scary: “China’s Quantum Computer Scientists Crack Military-Grade Encryption.” No, it’s not true. This debunking saved me the trouble of writing one. It all seems to have come from this news article, which wasn’t bad but was taken widely out of proportion. Cryptography is safe, and will be for a long time EDITED TO ADD (11/3): Really good explainer from Dan Goodin.