article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. Chatting with Snowden on an encrypted IM connection, I joked that the NSA cafeteria menu probably has code names for menu items. Transferring files electronically is what encryption is for.

article thumbnail

Attacking Machine Learning Systems

Schneier on Security

But aside from some special cases and unique circumstances, that’s not how encryption systems are exploited in practice. I wrote this in my book, Data and Goliath : The problem is that encryption is just a bunch of math, and math has no agency. This is bulk surveillance and can easily operate on this massive scale.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 pro-freedom technologies that could change the Internet

Malwarebytes

DNS encryption. DNS encryption plugs a gap that makes it easy to track the websites you visit. The domain name system (DNS) is a distributed address book that lists domain names and their corresponding IP addresses. FIDO2 is a specification that uses public key encryption for authentication. Homomorphic encryption.

Internet 113
article thumbnail

Amazon will pay you $10 for your palm prints. Should you be worried?

Malwarebytes

This biometric scanner can now be found in use in Amazon Books, Amazon Go convenience stores, Amazon Go Grocery, and Amazon 4-star stores in various US states, including Maryland, New Jersey, New York, and Texas. Palm signatures are created, encrypted, and stored in the cloud. How does it work?

Retail 136
article thumbnail

Ross Anderson

Schneier on Security

I know I was at the Fast Software Encryption workshop in December 1993, another conference he created. There I presented the Blowfish encryption algorithm. His masterwork book, Security Engineering —now in its Third Edition—is as comprehensive a tome on cybersecurity and related topics as you could imagine.

article thumbnail

Cross-Border Data Privacy and Security Concerns in the Dawn of Quantum Computing

Thales Cloud Protection & Licensing

New EU restrictions could force companies to change data transfer practices and adopt more advanced data encryption methods. government surveillance posed a threat to privacy and there was no sufficient redress in the American legal system for Europeans. Cross-Border Data Privacy and Security Concerns in the Dawn of Quantum Computing.

article thumbnail

Cloudastructure: 2021 – Year to Date Review

CyberSecurity Insiders

MIAMI–( BUSINESS WIRE )–Shareholders entrusted Cloudastructure with $30 million via a RegA+ to expand their cloud-based video surveillance platform empowered with Artificial Intelligence and Machine Learning analytics. As a result of that team’s efforts, Cloudastructure’s video surveillance platform now includes: People Detection.