<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>Simon Willison's Weblog: bruce-schneier</title><link href="http://simonwillison.net/" rel="alternate"/><link href="http://simonwillison.net/tags/bruce-schneier.atom" rel="self"/><id>http://simonwillison.net/</id><updated>2026-03-06T17:26:50+00:00</updated><author><name>Simon Willison</name></author><entry><title>Anthropic and the Pentagon</title><link href="https://simonwillison.net/2026/Mar/6/anthropic-and-the-pentagon/#atom-tag" rel="alternate"/><published>2026-03-06T17:26:50+00:00</published><updated>2026-03-06T17:26:50+00:00</updated><id>https://simonwillison.net/2026/Mar/6/anthropic-and-the-pentagon/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="https://www.schneier.com/blog/archives/2026/03/anthropic-and-the-pentagon.html"&gt;Anthropic and the Pentagon&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
This piece by Bruce Schneier and Nathan E. Sanders is the most thoughtful and grounded coverage I've seen of the recent and ongoing Pentagon/OpenAI/Anthropic contract situation.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;AI models are increasingly commodified. The top-tier offerings have about the same performance, and there is little to differentiate one from the other. The latest models from Anthropic, OpenAI and Google, in particular, tend to leapfrog each other with minor hops forward in quality every few months. [...]&lt;/p&gt;
&lt;p&gt;In this sort of market, branding matters a lot. Anthropic and its CEO, Dario Amodei, are positioning themselves as the moral and trustworthy AI provider. That has market value for both consumers and enterprise clients.&lt;/p&gt;
&lt;/blockquote&gt;


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/bruce-schneier"&gt;bruce-schneier&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/ai"&gt;ai&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/openai"&gt;openai&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/generative-ai"&gt;generative-ai&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/llms"&gt;llms&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/anthropic"&gt;anthropic&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/ai-ethics"&gt;ai-ethics&lt;/a&gt;&lt;/p&gt;



</summary><category term="bruce-schneier"/><category term="ai"/><category term="openai"/><category term="generative-ai"/><category term="llms"/><category term="anthropic"/><category term="ai-ethics"/></entry><entry><title>Quoting Bruce Schneier and Barath Raghavan</title><link href="https://simonwillison.net/2025/Oct/21/ooda-loop/#atom-tag" rel="alternate"/><published>2025-10-21T02:28:39+00:00</published><updated>2025-10-21T02:28:39+00:00</updated><id>https://simonwillison.net/2025/Oct/21/ooda-loop/#atom-tag</id><summary type="html">
    &lt;blockquote cite="https://www.schneier.com/blog/archives/2025/10/agentic-ais-ooda-loop-problem.html"&gt;&lt;p&gt;Prompt injection might be unsolvable in today’s LLMs. LLMs process token sequences, but no mechanism exists to mark token privileges. Every solution proposed introduces new injection vectors: Delimiter? Attackers include delimiters. Instruction hierarchy? Attackers claim priority. Separate models? Double the attack surface. Security requires boundaries, but LLMs dissolve boundaries. [...]&lt;/p&gt;
&lt;p&gt;Poisoned states generate poisoned outputs, which poison future states. Try to summarize the conversation history? The summary includes the injection. Clear the cache to remove the poison? Lose all context. Keep the cache for continuity? Keep the contamination. Stateful systems can’t forget attacks, and so memory becomes a liability. Adversaries can craft inputs that corrupt future outputs.&lt;/p&gt;&lt;/blockquote&gt;
&lt;p class="cite"&gt;&amp;mdash; &lt;a href="https://www.schneier.com/blog/archives/2025/10/agentic-ais-ooda-loop-problem.html"&gt;Bruce Schneier and Barath Raghavan&lt;/a&gt;, Agentic AI’s OODA Loop Problem&lt;/p&gt;

    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/prompt-injection"&gt;prompt-injection&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/ai-agents"&gt;ai-agents&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/bruce-schneier"&gt;bruce-schneier&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/ai"&gt;ai&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/llms"&gt;llms&lt;/a&gt;&lt;/p&gt;



</summary><category term="prompt-injection"/><category term="security"/><category term="ai-agents"/><category term="bruce-schneier"/><category term="ai"/><category term="llms"/></entry><entry><title>Quoting Bruce Schneier</title><link href="https://simonwillison.net/2025/Aug/27/bruce-schneier/#atom-tag" rel="alternate"/><published>2025-08-27T17:48:33+00:00</published><updated>2025-08-27T17:48:33+00:00</updated><id>https://simonwillison.net/2025/Aug/27/bruce-schneier/#atom-tag</id><summary type="html">
    &lt;blockquote cite="https://www.schneier.com/blog/archives/2025/08/we-are-still-unable-to-secure-llms-from-malicious-inputs.html"&gt;&lt;p&gt;We simply don’t know to defend against these attacks. We have zero agentic AI systems that are secure against these attacks. Any AI that is working in an adversarial environment—and by this I mean that it may encounter untrusted training data or input—is vulnerable to prompt injection. It’s an existential problem that, near as I can tell, most people developing these technologies are just pretending isn’t there.&lt;/p&gt;&lt;/blockquote&gt;
&lt;p class="cite"&gt;&amp;mdash; &lt;a href="https://www.schneier.com/blog/archives/2025/08/we-are-still-unable-to-secure-llms-from-malicious-inputs.html"&gt;Bruce Schneier&lt;/a&gt;&lt;/p&gt;

    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/prompt-injection"&gt;prompt-injection&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/generative-ai"&gt;generative-ai&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/bruce-schneier"&gt;bruce-schneier&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/ai"&gt;ai&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/llms"&gt;llms&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/ai-agents"&gt;ai-agents&lt;/a&gt;&lt;/p&gt;



</summary><category term="prompt-injection"/><category term="security"/><category term="generative-ai"/><category term="bruce-schneier"/><category term="ai"/><category term="llms"/><category term="ai-agents"/></entry><entry><title>AI mistakes are very different from human mistakes</title><link href="https://simonwillison.net/2025/Jan/21/ai-mistakes-are-very-different-from-human-mistakes/#atom-tag" rel="alternate"/><published>2025-01-21T15:12:03+00:00</published><updated>2025-01-21T15:12:03+00:00</updated><id>https://simonwillison.net/2025/Jan/21/ai-mistakes-are-very-different-from-human-mistakes/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="https://www.schneier.com/blog/archives/2025/01/ai-mistakes-are-very-different-from-human-mistakes.html"&gt;AI mistakes are very different from human mistakes&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
An entertaining and informative read by Bruce Schneier and Nathan E. Sanders.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;If you want to use an AI model to help with a business problem, it’s not enough to see that it understands what factors make a product profitable; you need to be sure it won’t forget what money is.&lt;/p&gt;
&lt;/blockquote&gt;


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/bruce-schneier"&gt;bruce-schneier&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/ai"&gt;ai&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/generative-ai"&gt;generative-ai&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/llms"&gt;llms&lt;/a&gt;&lt;/p&gt;



</summary><category term="bruce-schneier"/><category term="ai"/><category term="generative-ai"/><category term="llms"/></entry><entry><title>Friday Squid Blogging: Anniversary Post</title><link href="https://simonwillison.net/2025/Jan/4/friday-squid-blogging-anniversary-post/#atom-tag" rel="alternate"/><published>2025-01-04T16:21:51+00:00</published><updated>2025-01-04T16:21:51+00:00</updated><id>https://simonwillison.net/2025/Jan/4/friday-squid-blogging-anniversary-post/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="https://www.schneier.com/blog/archives/2025/01/friday-squid-blogging-anniversary-post.html"&gt;Friday Squid Blogging: Anniversary Post&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Bruce Schneier:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;I made my &lt;a href="https://www.schneier.com/blog/archives/2006/01/friday_squid_bl.html"&gt;first squid post&lt;/a&gt; nineteen years ago this week. Between then and now, I posted something about squid every week (with maybe only a few exceptions). There is a &lt;em&gt;lot&lt;/em&gt; out there about squid, even more if you count the other meanings of the word.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;I think that's &lt;a href="https://www.schneier.com/tag/squid/"&gt;1,004 posts about squid&lt;/a&gt; in 19 years. Talk about a &lt;a href="https://simonwillison.net/2024/Jan/2/escalating-streaks/"&gt;legendary streak&lt;/a&gt;!


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/blogging"&gt;blogging&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/bruce-schneier"&gt;bruce-schneier&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/streaks"&gt;streaks&lt;/a&gt;&lt;/p&gt;



</summary><category term="blogging"/><category term="bruce-schneier"/><category term="streaks"/></entry><entry><title>Quoting Bruce Schneier</title><link href="https://simonwillison.net/2024/May/15/bruce-schneier/#atom-tag" rel="alternate"/><published>2024-05-15T13:34:35+00:00</published><updated>2024-05-15T13:34:35+00:00</updated><id>https://simonwillison.net/2024/May/15/bruce-schneier/#atom-tag</id><summary type="html">
    &lt;blockquote cite="https://www.schneier.com/blog/archives/2024/05/llms-data-control-path-insecurity.html"&gt;&lt;p&gt;But unlike the phone system, we can’t separate an LLM’s data from its commands. One of the enormously powerful features of an LLM is that the data affects the code. We want the system to modify its operation when it gets new training data. We want it to change the way it works based on the commands we give it. The fact that LLMs self-modify based on their input data is a feature, not a bug. And it’s the very thing that enables prompt injection.&lt;/p&gt;&lt;/blockquote&gt;
&lt;p class="cite"&gt;&amp;mdash; &lt;a href="https://www.schneier.com/blog/archives/2024/05/llms-data-control-path-insecurity.html"&gt;Bruce Schneier&lt;/a&gt;&lt;/p&gt;

    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/prompt-injection"&gt;prompt-injection&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/generative-ai"&gt;generative-ai&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/bruce-schneier"&gt;bruce-schneier&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/ai"&gt;ai&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/llms"&gt;llms&lt;/a&gt;&lt;/p&gt;



</summary><category term="prompt-injection"/><category term="security"/><category term="generative-ai"/><category term="bruce-schneier"/><category term="ai"/><category term="llms"/></entry><entry><title>AI and Trust</title><link href="https://simonwillison.net/2023/Dec/5/ai-and-trust/#atom-tag" rel="alternate"/><published>2023-12-05T21:43:03+00:00</published><updated>2023-12-05T21:43:03+00:00</updated><id>https://simonwillison.net/2023/Dec/5/ai-and-trust/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="https://www.schneier.com/blog/archives/2023/12/ai-and-trust.html"&gt;AI and Trust&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Barnstormer of an essay by Bruce Schneier about AI and trust. It’s worth spending some time with this—it’s hard to extract the highlights since there are so many of them.&lt;/p&gt;

&lt;p&gt;A key idea is that we are predisposed to trust AI chat interfaces because they imitate humans, which means we are highly susceptible to profit-seeking biases baked into them.&lt;/p&gt;

&lt;p&gt;Bruce suggests that what’s needed is public models, backed by government funds: “A public model is a model built by the public for the public. It requires political accountability, not just market accountability.”


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/bruce-schneier"&gt;bruce-schneier&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/trust"&gt;trust&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/ai"&gt;ai&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/generative-ai"&gt;generative-ai&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/llms"&gt;llms&lt;/a&gt;&lt;/p&gt;



</summary><category term="bruce-schneier"/><category term="trust"/><category term="ai"/><category term="generative-ai"/><category term="llms"/></entry><entry><title>Quoting Bruce Schneier</title><link href="https://simonwillison.net/2019/Feb/12/bruce-schneier/#atom-tag" rel="alternate"/><published>2019-02-12T19:14:17+00:00</published><updated>2019-02-12T19:14:17+00:00</updated><id>https://simonwillison.net/2019/Feb/12/bruce-schneier/#atom-tag</id><summary type="html">
    &lt;blockquote cite="https://www.schneier.com/blog/archives/2019/02/blockchain_and_.html"&gt;&lt;p&gt;Private blockchains are completely uninteresting. (By this, I mean systems that use the blockchain data structure but don't have the above three elements.) In general, they have some external limitation on who can interact with the blockchain and its features. These are not anything new; they're distributed append-only data structures with a list of individuals authorized to add to it. Consensus protocols have been studied in distributed systems for more than 60 years. Append-only data structures have been similarly well covered. They're blockchains in name only, and -- as far as I can tell -- the only reason to operate one is to ride on the blockchain hype.&lt;/p&gt;&lt;/blockquote&gt;
&lt;p class="cite"&gt;&amp;mdash; &lt;a href="https://www.schneier.com/blog/archives/2019/02/blockchain_and_.html"&gt;Bruce Schneier&lt;/a&gt;&lt;/p&gt;

    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/blockchain"&gt;blockchain&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/bruce-schneier"&gt;bruce-schneier&lt;/a&gt;&lt;/p&gt;



</summary><category term="blockchain"/><category term="bruce-schneier"/></entry><entry><title>Schneier on Stuxnet</title><link href="https://simonwillison.net/2010/Oct/9/stuxnet/#atom-tag" rel="alternate"/><published>2010-10-09T10:57:00+00:00</published><updated>2010-10-09T10:57:00+00:00</updated><id>https://simonwillison.net/2010/Oct/9/stuxnet/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.schneier.com/blog/archives/2010/10/stuxnet.html"&gt;Schneier on Stuxnet&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Stuxnet now rivals Wikileaks as the real life plot most likely to have leaked from science fiction.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/bruce-schneier"&gt;bruce-schneier&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/recovered"&gt;recovered&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/stuxnet"&gt;stuxnet&lt;/a&gt;&lt;/p&gt;



</summary><category term="bruce-schneier"/><category term="security"/><category term="recovered"/><category term="stuxnet"/></entry><entry><title>Intercepting Predator Video</title><link href="https://simonwillison.net/2009/Dec/24/schneier/#atom-tag" rel="alternate"/><published>2009-12-24T21:26:26+00:00</published><updated>2009-12-24T21:26:26+00:00</updated><id>https://simonwillison.net/2009/Dec/24/schneier/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.schneier.com/blog/archives/2009/12/intercepting_pr.html"&gt;Intercepting Predator Video&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Bruce Schneier’s take on the unencrypted Predator UAV story. A fascinating discussion of key management and the non-technical side of cryptography.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/bruce-schneier"&gt;bruce-schneier&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/cryptography"&gt;cryptography&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/drones"&gt;drones&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/military"&gt;military&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/nsa"&gt;nsa&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;&lt;/p&gt;



</summary><category term="bruce-schneier"/><category term="cryptography"/><category term="drones"/><category term="military"/><category term="nsa"/><category term="security"/></entry><entry><title>Quoting Bruce Schneier</title><link href="https://simonwillison.net/2009/Oct/17/framing/#atom-tag" rel="alternate"/><published>2009-10-17T16:55:39+00:00</published><updated>2009-10-17T16:55:39+00:00</updated><id>https://simonwillison.net/2009/Oct/17/framing/#atom-tag</id><summary type="html">
    &lt;blockquote cite="http://www.schneier.com/blog/archives/2009/10/the_commercial.html"&gt;&lt;p&gt;Whenever you build a security system that relies on detection and identification, you invite the bad guys to subvert the system so it detects and identifies someone else. [...] Build a detection system, and the bad guys try to frame someone else. Build a detection system to detect framing, and the bad guys try to frame someone else framing someone else. Build a detection system to detect framing of framing, and well, there's no end, really.&lt;/p&gt;&lt;/blockquote&gt;
&lt;p class="cite"&gt;&amp;mdash; &lt;a href="http://www.schneier.com/blog/archives/2009/10/the_commercial.html"&gt;Bruce Schneier&lt;/a&gt;&lt;/p&gt;

    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/bruce-schneier"&gt;bruce-schneier&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/framing"&gt;framing&lt;/a&gt;&lt;/p&gt;



</summary><category term="bruce-schneier"/><category term="security"/><category term="framing"/></entry><entry><title>On the Anonymity of Home/Work Location Pairs</title><link href="https://simonwillison.net/2009/May/24/schneier/#atom-tag" rel="alternate"/><published>2009-05-24T13:14:04+00:00</published><updated>2009-05-24T13:14:04+00:00</updated><id>https://simonwillison.net/2009/May/24/schneier/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.schneier.com/blog/archives/2009/05/on_the_anonymit.html"&gt;On the Anonymity of Home/Work Location Pairs&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Most people can be uniquely identified by the rough location of their home combined with the rough location of their work. US Census data shows that 5% of people can be uniquely identified by this combination even at just census tract level (1,500 people).


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/bruce-schneier"&gt;bruce-schneier&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/census"&gt;census&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/location"&gt;location&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/privacy"&gt;privacy&lt;/a&gt;&lt;/p&gt;



</summary><category term="bruce-schneier"/><category term="census"/><category term="location"/><category term="privacy"/></entry><entry><title>Raising Octopus from Eggs</title><link href="https://simonwillison.net/2009/Jan/17/raising/#atom-tag" rel="alternate"/><published>2009-01-17T14:59:51+00:00</published><updated>2009-01-17T14:59:51+00:00</updated><id>https://simonwillison.net/2009/Jan/17/raising/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.tonmo.com/forums/forumdisplay.php?f=85"&gt;Raising Octopus from Eggs&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
I love that forums like this exist.

    &lt;p&gt;&lt;small&gt;&lt;/small&gt;Via &lt;a href="http://www.schneier.com/blog/archives/2009/01/friday_squid_bl_158.html"&gt;Bruce Schneier (indirectly)&lt;/a&gt;&lt;/small&gt;&lt;/p&gt;


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/bruce-schneier"&gt;bruce-schneier&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/forums"&gt;forums&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/octopus"&gt;octopus&lt;/a&gt;&lt;/p&gt;



</summary><category term="bruce-schneier"/><category term="forums"/><category term="octopus"/></entry><entry><title>Quoting Bruce Schneier</title><link href="https://simonwillison.net/2008/Jul/1/schneier/#atom-tag" rel="alternate"/><published>2008-07-01T14:51:51+00:00</published><updated>2008-07-01T14:51:51+00:00</updated><id>https://simonwillison.net/2008/Jul/1/schneier/#atom-tag</id><summary type="html">
    &lt;blockquote cite="http://www.schneier.com/blog/archives/2008/07/kill_switches_a.html"&gt;&lt;p&gt;"Digital Manners Policies" is a marketing term. Let's call this what it really is: Selective Device Jamming. It's not polite, it's dangerous. It won't make anyone more secure - or more polite.&lt;/p&gt;&lt;/blockquote&gt;
&lt;p class="cite"&gt;&amp;mdash; &lt;a href="http://www.schneier.com/blog/archives/2008/07/kill_switches_a.html"&gt;Bruce Schneier&lt;/a&gt;&lt;/p&gt;

    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/marketing"&gt;marketing&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/bruce-schneier"&gt;bruce-schneier&lt;/a&gt;&lt;/p&gt;



</summary><category term="marketing"/><category term="security"/><category term="bruce-schneier"/></entry><entry><title>Quoting Bruce Schneier</title><link href="https://simonwillison.net/2008/Jan/29/schneier/#atom-tag" rel="alternate"/><published>2008-01-29T12:14:14+00:00</published><updated>2008-01-29T12:14:14+00:00</updated><id>https://simonwillison.net/2008/Jan/29/schneier/#atom-tag</id><summary type="html">
    &lt;blockquote cite="http://www.schneier.com/blog/archives/2008/01/security_vs_pri.html"&gt;&lt;p&gt;Since 9/11, approximately three things have potentially improved airline security: reinforcing the cockpit doors, passengers realizing they have to fight back and - possibly - sky marshals. Everything else - all the security measures that affect privacy - is just security theater and a waste of effort.&lt;/p&gt;&lt;/blockquote&gt;
&lt;p class="cite"&gt;&amp;mdash; &lt;a href="http://www.schneier.com/blog/archives/2008/01/security_vs_pri.html"&gt;Bruce Schneier&lt;/a&gt;&lt;/p&gt;

    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/bruce-schneier"&gt;bruce-schneier&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/privacy"&gt;privacy&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/securitytheatre"&gt;securitytheatre&lt;/a&gt;&lt;/p&gt;



</summary><category term="bruce-schneier"/><category term="privacy"/><category term="security"/><category term="securitytheatre"/></entry><entry><title>Quoting Bruce Schneier</title><link href="https://simonwillison.net/2007/Nov/16/schneier/#atom-tag" rel="alternate"/><published>2007-11-16T10:25:42+00:00</published><updated>2007-11-16T10:25:42+00:00</updated><id>https://simonwillison.net/2007/Nov/16/schneier/#atom-tag</id><summary type="html">
    &lt;blockquote cite="http://www.schneier.com/blog/archives/2007/11/the_strange_sto.html"&gt;&lt;p&gt;I don't understand why the NSA was so insistent about including Dual_EC_DRBG in the standard. It makes no sense as a trap door: It's public, and rather obvious. It makes no sense from an engineering perspective: It's too slow for anyone to willingly use it. And it makes no sense from a backwards-compatibility perspective: Swapping one random-number generator for another is easy.&lt;/p&gt;&lt;/blockquote&gt;
&lt;p class="cite"&gt;&amp;mdash; &lt;a href="http://www.schneier.com/blog/archives/2007/11/the_strange_sto.html"&gt;Bruce Schneier&lt;/a&gt;&lt;/p&gt;

    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/nsa"&gt;nsa&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/cryptography"&gt;cryptography&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/dualecdrbg"&gt;dualecdrbg&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/randomnumbers"&gt;randomnumbers&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/bruce-schneier"&gt;bruce-schneier&lt;/a&gt;&lt;/p&gt;



</summary><category term="nsa"/><category term="cryptography"/><category term="security"/><category term="dualecdrbg"/><category term="randomnumbers"/><category term="bruce-schneier"/></entry><entry><title>Quoting Bruce Schneier</title><link href="https://simonwillison.net/2007/Oct/24/schneier/#atom-tag" rel="alternate"/><published>2007-10-24T20:36:39+00:00</published><updated>2007-10-24T20:36:39+00:00</updated><id>https://simonwillison.net/2007/Oct/24/schneier/#atom-tag</id><summary type="html">
    &lt;blockquote cite="http://www.schneier.com/blog/archives/2007/10/rfid_chips_in_s.html"&gt;&lt;p&gt;A school in the UK is using RFID chips in school uniforms to track attendance. So now it's easy to cut class; just ask someone to carry your shirt around the building while you're elsewhere.&lt;/p&gt;&lt;/blockquote&gt;
&lt;p class="cite"&gt;&amp;mdash; &lt;a href="http://www.schneier.com/blog/archives/2007/10/rfid_chips_in_s.html"&gt;Bruce Schneier&lt;/a&gt;&lt;/p&gt;

    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/uk"&gt;uk&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/rfid"&gt;rfid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/schools"&gt;schools&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/bruce-schneier"&gt;bruce-schneier&lt;/a&gt;&lt;/p&gt;



</summary><category term="security"/><category term="uk"/><category term="rfid"/><category term="schools"/><category term="bruce-schneier"/></entry><entry><title>Global Hackers Create a New Online Crime Economy</title><link href="https://simonwillison.net/2007/Oct/17/whos/#atom-tag" rel="alternate"/><published>2007-10-17T21:46:25+00:00</published><updated>2007-10-17T21:46:25+00:00</updated><id>https://simonwillison.net/2007/Oct/17/whos/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.cio.com/article/135500/3"&gt;Global Hackers Create a New Online Crime Economy&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Fascinating, detailed look at the evolution of the hacker service economy. Of particular interest: a web application that sells access to hacked machines to identity thieves on a timeshare basis.

    &lt;p&gt;&lt;small&gt;&lt;/small&gt;Via &lt;a href="http://www.schneier.com/blog/archives/2007/10/future_of_malwa.html"&gt;Bruce Schneier&lt;/a&gt;&lt;/small&gt;&lt;/p&gt;


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/bruce-schneier"&gt;bruce-schneier&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/economics"&gt;economics&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/hackers"&gt;hackers&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/identitytheft"&gt;identitytheft&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;&lt;/p&gt;



</summary><category term="bruce-schneier"/><category term="economics"/><category term="hackers"/><category term="identitytheft"/><category term="security"/></entry><entry><title>The Storm Worm</title><link href="https://simonwillison.net/2007/Oct/6/schneier/#atom-tag" rel="alternate"/><published>2007-10-06T00:25:52+00:00</published><updated>2007-10-06T00:25:52+00:00</updated><id>https://simonwillison.net/2007/Oct/6/schneier/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.schneier.com/blog/archives/2007/10/the_storm_worm.html"&gt;The Storm Worm&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Bruce Schneier describes the Storm Worm, a fantastically advanced piece of malware that’s been spreading for nearly a year and is proving almost impossible to combat. Its effects are virtually invisible but infected machines are added to a multi-million machine botnet apparently controlled by anonymous Russian hackers.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/botnets"&gt;botnets&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/bruce-schneier"&gt;bruce-schneier&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/hackers"&gt;hackers&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/malware"&gt;malware&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/storm"&gt;storm&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/worm"&gt;worm&lt;/a&gt;&lt;/p&gt;



</summary><category term="botnets"/><category term="bruce-schneier"/><category term="hackers"/><category term="malware"/><category term="security"/><category term="storm"/><category term="worm"/></entry><entry><title>Bruce Schneier interviews Kip Hawley</title><link href="https://simonwillison.net/2007/Aug/7/schneier/#atom-tag" rel="alternate"/><published>2007-08-07T15:23:08+00:00</published><updated>2007-08-07T15:23:08+00:00</updated><id>https://simonwillison.net/2007/Aug/7/schneier/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.schneier.com/interview-hawley.html"&gt;Bruce Schneier interviews Kip Hawley&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
The head of the Transportation Security Administration in conversation with one of his most eloquent critics.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/bruce-schneier"&gt;bruce-schneier&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/interview"&gt;interview&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/kip-hawley"&gt;kip-hawley&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/tsa"&gt;tsa&lt;/a&gt;&lt;/p&gt;



</summary><category term="bruce-schneier"/><category term="interview"/><category term="kip-hawley"/><category term="security"/><category term="tsa"/></entry><entry><title>The Psychology of Security</title><link href="https://simonwillison.net/2007/Feb/9/psychology/#atom-tag" rel="alternate"/><published>2007-02-09T01:27:28+00:00</published><updated>2007-02-09T01:27:28+00:00</updated><id>https://simonwillison.net/2007/Feb/9/psychology/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.schneier.com/essay-155.html"&gt;The Psychology of Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
I haven’t even started on this yet, but I bet it’s worth reading.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/bruce-schneier"&gt;bruce-schneier&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/psychology"&gt;psychology&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;&lt;/p&gt;



</summary><category term="bruce-schneier"/><category term="psychology"/><category term="security"/></entry><entry><title>Choosing Secure Passwords</title><link href="https://simonwillison.net/2007/Jan/11/passwords/#atom-tag" rel="alternate"/><published>2007-01-11T14:55:18+00:00</published><updated>2007-01-11T14:55:18+00:00</updated><id>https://simonwillison.net/2007/Jan/11/passwords/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.schneier.com/blog/archives/2007/01/choosing_secure.html"&gt;Choosing Secure Passwords&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Bruce Schneier describes the state of the art in password cracking software.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/bruce-schneier"&gt;bruce-schneier&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/passwords"&gt;passwords&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;&lt;/p&gt;



</summary><category term="bruce-schneier"/><category term="passwords"/><category term="security"/></entry><entry><title>Real-World Passwords</title><link href="https://simonwillison.net/2006/Dec/14/passwords/#atom-tag" rel="alternate"/><published>2006-12-14T14:14:54+00:00</published><updated>2006-12-14T14:14:54+00:00</updated><id>https://simonwillison.net/2006/Dec/14/passwords/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.schneier.com/blog/archives/2006/12/realworld_passw.html"&gt;Real-World Passwords&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Random passwords phished from MySpace are surprisingly decent.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/bruce-schneier"&gt;bruce-schneier&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/myspace"&gt;myspace&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/passwords"&gt;passwords&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/phishing"&gt;phishing&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;&lt;/p&gt;



</summary><category term="bruce-schneier"/><category term="myspace"/><category term="passwords"/><category term="phishing"/><category term="security"/></entry><entry><title>BT acquires Counterpane Internet Security</title><link href="https://simonwillison.net/2006/Oct/25/bt/#atom-tag" rel="alternate"/><published>2006-10-25T10:57:25+00:00</published><updated>2006-10-25T10:57:25+00:00</updated><id>https://simonwillison.net/2006/Oct/25/bt/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.btplc.com/News/Articles/Showarticle.cfm?ArticleID=386c1b2f-0860-4afc-8f4a-26a066c12d10"&gt;BT acquires Counterpane Internet Security&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
They just bought Bruce Schneier.

    &lt;p&gt;&lt;small&gt;&lt;/small&gt;Via &lt;a href="http://www.schneier.com/blog/archives/2006/10/bt_acquires_cou.html"&gt;Schneier on Security&lt;/a&gt;&lt;/small&gt;&lt;/p&gt;


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/bruce-schneier"&gt;bruce-schneier&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/bt"&gt;bt&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;&lt;/p&gt;



</summary><category term="bruce-schneier"/><category term="bt"/><category term="security"/></entry><entry><title>Bruce Schneier Facts</title><link href="https://simonwillison.net/2006/Aug/17/bruce/#atom-tag" rel="alternate"/><published>2006-08-17T14:19:35+00:00</published><updated>2006-08-17T14:19:35+00:00</updated><id>https://simonwillison.net/2006/Aug/17/bruce/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://geekz.co.uk/schneierfacts/"&gt;Bruce Schneier Facts&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
“SSL is invulnerable to man-in-the-middle attacks. Unless that man is Bruce Schneier.”


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/bruce-schneier"&gt;bruce-schneier&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/funny"&gt;funny&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;&lt;/p&gt;



</summary><category term="bruce-schneier"/><category term="funny"/><category term="security"/></entry><entry><title>Schneier on Security: New Airline Security Rules</title><link href="https://simonwillison.net/2006/Aug/10/schneier/#atom-tag" rel="alternate"/><published>2006-08-10T16:26:33+00:00</published><updated>2006-08-10T16:26:33+00:00</updated><id>https://simonwillison.net/2006/Aug/10/schneier/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.schneier.com/blog/archives/2006/08/new_airline_sec.html"&gt;Schneier on Security: New Airline Security Rules&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
“I’m sure glad I’m not flying anywhere this week” says Bruce. Now I wish I wasn’t!


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/airlines"&gt;airlines&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/bruce-schneier"&gt;bruce-schneier&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;&lt;/p&gt;



</summary><category term="airlines"/><category term="bruce-schneier"/><category term="security"/></entry><entry><title>Schneier on Security: Cryptanalysis of SHA-1</title><link href="https://simonwillison.net/2005/Feb/19/schneier/#atom-tag" rel="alternate"/><published>2005-02-19T15:12:39+00:00</published><updated>2005-02-19T15:12:39+00:00</updated><id>https://simonwillison.net/2005/Feb/19/schneier/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.schneier.com/blog/archives/2005/02/cryptanalysis_o.html"&gt;Schneier on Security: Cryptanalysis of SHA-1&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
If you want to understand the “breaking” of SHA-1, this is the place to go. Surprisingly accessible.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/bruce-schneier"&gt;bruce-schneier&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/cryptanalysis"&gt;cryptanalysis&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/hashing"&gt;hashing&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/sha"&gt;sha&lt;/a&gt;&lt;/p&gt;



</summary><category term="bruce-schneier"/><category term="cryptanalysis"/><category term="hashing"/><category term="security"/><category term="sha"/></entry><entry><title>Schneier on Security: SHA-1 Broken</title><link href="https://simonwillison.net/2005/Feb/16/schneier/#atom-tag" rel="alternate"/><published>2005-02-16T04:47:31+00:00</published><updated>2005-02-16T04:47:31+00:00</updated><id>https://simonwillison.net/2005/Feb/16/schneier/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.schneier.com/blog/archives/2005/02/sha1_broken.html"&gt;Schneier on Security: SHA-1 Broken&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Whoa.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/bruce-schneier"&gt;bruce-schneier&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/hashing"&gt;hashing&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/sha"&gt;sha&lt;/a&gt;&lt;/p&gt;



</summary><category term="bruce-schneier"/><category term="hashing"/><category term="security"/><category term="sha"/></entry><entry><title>Bruce vs. Bruce</title><link href="https://simonwillison.net/2004/Jun/15/bruce/#atom-tag" rel="alternate"/><published>2004-06-15T22:04:08+00:00</published><updated>2004-06-15T22:04:08+00:00</updated><id>https://simonwillison.net/2004/Jun/15/bruce/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.randomhouse.com/delrey/catalog/display.pperl?isbn=0-345-46061-8&amp;amp;view=qa"&gt;Bruce vs. Bruce&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Schneier and Sterling discuss security and technology.

    &lt;p&gt;&lt;small&gt;&lt;/small&gt;Via &lt;a href="http://www.schneier.com/crypto-gram-0406.html"&gt;Crypto-Gram: June 15, 2004&lt;/a&gt;&lt;/small&gt;&lt;/p&gt;


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/bruce-schneier"&gt;bruce-schneier&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/bruce-sterling"&gt;bruce-sterling&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;&lt;/p&gt;



</summary><category term="bruce-schneier"/><category term="bruce-sterling"/><category term="security"/></entry><entry><title>Bruce Schneier: We are all security customers</title><link href="https://simonwillison.net/2004/May/4/bruce/#atom-tag" rel="alternate"/><published>2004-05-04T18:34:04+00:00</published><updated>2004-05-04T18:34:04+00:00</updated><id>https://simonwillison.net/2004/May/4/bruce/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://news.com.com/2010-7348-5204924.html?tag=nefd.gutspro"&gt;Bruce Schneier: We are all security customers&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
How can the US get the best return on investment for homeland security?


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/bruce-schneier"&gt;bruce-schneier&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;&lt;/p&gt;



</summary><category term="bruce-schneier"/><category term="security"/></entry></feed>