bruceschneier   795

« earlier    

Quantum Computing and Cryptography - Schneier on Security
At its core, cryptography relies on the mathematical quirk that some things are easier to do than to undo. Just as it's easier to smash a plate than to glue all the pieces back together, it's much easier to multiply two prime numbers together to obtain one large number than it is to factor that large number back into two prime numbers. Asymmetries of this kind -- one-way functions and trap-door one-way functions -- underlie all of cryptography.
bruceschneier  quantumcomputers  cryptography 
5 weeks ago by dlkinney
How Facebook Figures Out Everyone You've Ever Met
“Mobile phone numbers are even better than social security numbers for identifying people,” said security technologist Bruce Schneier by email. “People give them out all the time, and they’re strongly linked to identity.”
bruceschneier  facebook  privacy  security  surveillance  kashmirhill 
november 2017 by nowthis
Surveillance Intermediaries - Schneier on Security
"Surveillance intermediaries have the financial and ideological incentives to resist government requests for user data. Their techniques of resistance are: proceduralism and litigiousness that reject voluntary cooperation in favor of minimal complia…
US-politics  BruceSchneier  surveillance  privacy  PrivacyKitStream  facebook  google  apple 
june 2017 by loughlin
Security Trade-offs in the Longbow vs. Crossbow Decision - Schneier on Security
Rulers choosing between missile technologies thus confronted a trade-off with respect to internal and external security.
INTERESTING  innovation  bruceschneier  crossbows 
january 2017 by Walpole

« earlier    

related tags

041214  0414  2014  2016  9/11  adamminter  advertising  advice  ai  airport  alqaeda  alshabab  analysis  apple  article  autofill  awareness  behavior  belief  bigdata  biometrics  blog  blogentries  botnet  briankrebs  browser  bruce-schneier  bug  business  by:austinpowell  by:corydoctorow  cellphone  cellular  cert  cfaa  cheating  children  christopherahlberg  civics  closedsource  code  communication  companies  computers  computersecurity  congress  critique  crossbows  crypto  cryptography  cryptoparty  cybercrime  cyberlaw  cybersec  cybersecurity  data  ddos  democracy  design  devices  diesel  doxing  drivers  driving  dyn  economics  editorial  edwardsnowden  eff  email  embedded  en  encryption  encrzption  evankohlmann  facebook-archive  facebook  facebookpost  facialrecognition  fbi  fear  feedly  flashpointglobalpartners  flying  freedom  from:boingboing  from:thedailydot  future  gao  gchq  geo:unitedstates  gimf  glenngreenwald  gmail  golang  google  government  hack  hackerblogs  hacking  hardware  heartbleed  hjd  homelandsecurity  ibm  innovation  insightful  intelligence  interesting  internet  internetofshit  internetofthings  iot  islamicterrorism  it  jensgrossklags  kashmirhill  keithalexander  kevinbrown  kptibug  lang:en  law  linkfodder  location  malware  matthewfredrikson  meltdown  memri  mikerogers  mirai  mobile  natesilver  nbcnews  network  nicholasrasmussen  nicolaschristin  ninthcircuitcourt  northkorea  nsa  oman  opensource  openssl  opinion  organizations  parenting  password  passwordmanager  passwords  patching  paßwort  personal_net  phishing  phone  placebo  police  politics  privacy  privacykitstream  protocols  psychology  quantumcomputers  quotes  reaction  read  regulation  reputation  research  risk  risks  safety  samsung  schneier  schneieronsecurity  search  secrecy  security  securitytheatre  sensors  sergeegelman  snowden  software  softwareeatingtheworld  sony  source  spectre  spending  spideroak  standalone  statistics  stevenstalinsky  storage  subterfuge  subversion  supply_chains  surveillance  survey  tadayoshikohno  technology  terroris  terrorism  theatlantic  theguardian  theinterview  thomasristenpart  timothyvidas  tor  toread  transparency  transportation  trend  trump  trust  tsa  us-politics  us  usa  usability  users  volkswagen  vox  vulnerabilities  vulnerability  warrant_canary  wifi  wireless  wiretapping 

Copy this bookmark:



description:


tags: