Remove Accountability Remove Book Remove Surveillance Remove Technology
article thumbnail

LLM Summary of My Book Beyond Fear

Schneier on Security

Claude (Anthropic’s LLM) was given this prompt: Please summarize the themes and arguments of Bruce Schneier’s book Beyond Fear. Then lay out the most salient criticisms of the book. Seek security policies and technologies that enhance society broadly rather than benefit special interests. Secrecy enables abuses.

article thumbnail

5 pro-freedom technologies that could change the Internet

Malwarebytes

After a good start, the Internet-enabled, technological revolution we are living through has hit some bumps in the road. To celebrate Independence Day we want to draw your attention to five technologies that could improve life, liberty and the pursuit of happiness on the Internet. And yet almost every Internet account requires one.

Internet 110
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. It’s amazing that one person could have had so much access with so little accountability, and could sneak all of this data out without raising any alarms. That feeling hasn’t faded.

article thumbnail

The Challenges in Building Digital Trust

SecureWorld News

We expect that emergency services will use their technologies to reliably provide us with services, that they will protect the private information we give them, and that the operators of their systems will act responsibly; but residents were failed in this sense. What are the origins of the need for a trust framework?

article thumbnail

Cross-Border Data Privacy and Security Concerns in the Dawn of Quantum Computing

Thales Cloud Protection & Licensing

Beyond this we also have Payment Card Industry (PCI) standards, Health Insurance Portability and Accountability Act (HIPAA), the California Data Privacy Act (CCPA) and much more. government surveillance posed a threat to privacy and there was no sufficient redress in the American legal system for Europeans. Privacy Shield was unlawful.

article thumbnail

AI and Trust

Schneier on Security

I wrote about this in 2012 in a book called Liars and Outliers. I wrote about four systems for enabling trust: our innate morals, concern about our reputations, the laws we live under, and security technologies that constrain our behavior. Laws and security technologies are systems of trust that force us to act trustworthy.

article thumbnail

MY TAKE: Can Project Wildland’s egalitarian platform make Google, Facebook obsolete?

The Last Watchdog

Technologically speaking, we are where we are because a handful of tech giants figured out how to collect, store and monetize user data in a singular fashion. On the technology front, blockchain systems signal the type of shifts that need to fully unfold.

Internet 223