Christiaan008 asked:

Speaker: BRUCE SCHNEIER Bruce Schneier will answer questions topics ranging from the SHA-3 competition to the TSA to trust and society to squid. Internationa…

Advertisement
Share →

22 Responses to DEFCON 20: Bruce Schneier Answers Your Questions

  1. Negauka says:

    Oh dear… how eloquent…

  2. Abraham Williams says:

    Fascinating set of questions and answers covering security, cloud
    computing, users, the TSA, and many other topics. I highly recommend you
    watch it.

  3. Jordan Lewis says:

    Fascinating set of questions and answers covering security, cloud
    computing, users, the TSA, and many other topics. I highly recommend you
    watch it.

  4. John Ohno says:

    DEFCON 20: Bruce Schneier Answers Your Questions

  5. Adrian Magdas says:

    DEFCON 20: Bruce Schneier Answers Your Questions

  6. Attila-Mihaly Balazs says:

    DEFCON 20: Bruce Schneier Answers Your Questions

  7. Siegfried Hirsch says:

    Fascinating set of questions and answers covering security, cloud
    computing, users, the TSA, and many other topics. I highly recommend you
    watch it.

  8. kamaradski1 says:

    I’t not the problem that we are loosing controll of our endpoints or data,
    the real problem is that some other people (big companies) are gaining
    control (over my stuff…)

  9. Klaatu says:

    If I were a TI would I know it?-)

  10. Jessehz says:

    “…which, for any of you who works in law-enforcement knows, is kind of a
    joke, ’cause any pat-down that is not *personally embarrassing*, is
    actually not very effective.” Friggin’ exactly.

  11. lennyhome says:

    I don’t trust him and I think he may have let some other entity take over
    his charisma in exchange for goods.

  12. Jessehz says:

    The solution to the password problem, is to not allow users to pick their
    own passwords. When a user creates a new account (or recovers one), they
    should get a new randomly generated password assigned to them. If they
    can’t remember it, they should write it down in their diary. Sure, writing
    down passwords is a bad idea in general, but having a strong password that
    might be accessible to a few people that you know, is still better than
    having a weak password that anyone in the world can guess.

  13. AzureCuzYeah says:

    Ok. Who is ready for Vegas!

  14. weewilly2007 says:

    Who’s using who, d builders or d breakesr? Or else it’s just evolutionary
    niches right, determined by light affinity? Unless we want 2 propose d
    entire construct & dichotomy 2 b obsolete. Not quite what ur doing. But
    where’s d diversity or complexity in dat?

  15. Klaatu says:

    I was being sarcastic. I am a TI. And it is NOT necessarily so that you
    know it is happening.

  16. Jessehz says:

    You’re talking about an offline attack. With a long, random password, there
    are no words or common sequences to search for. Even if you try every
    combination, it’s going to take you longer than most people are willing to
    wait, especially if the passwords are fed through an expensive hash
    function.

  17. Meniacle says:

    6:20 my Computer Security teacher

  18. trollharderINC troll vigorously says:

    Very much so. A constant buzzing and cluster headaches are all associated
    with individual targeting.

  19. HooterGeuse says:

    He totally reminds me of George Carlin

  20. Klaatu says:

    What is the relationship between SQUID tech & squid blogging? Is there any
    truth behind Microwave Auditory Effect as a remote neural monitoring tech &
    “non-lethal”? If the tech exists to what extent is it potential or
    practical? I’m not talking about microwave hearing off office or home
    windows & I’m not interested in “tinfoilhat” type answers. I’m talking
    about hacking the human brain & body. So what would Bruce say? “NEXT
    QUESTION PLEASE!” or “Hah! Ask Gen. Alexander in the next room…”;-)

  21. trollharderINC troll vigorously says:

    Look up “Targeted Individuals” will get you started on the real world
    applications of those techniques and examples of their use.The main issue
    with the practicality of Auditory Microwave targeting is a microwave
    amplifier which has the capabilities to condense the wavelength enough to
    target victims effectively. Anything else? Be more specific please.

  22. Klaatu says:

    IMO, there is more to “squid blogging” & the constant reference to these
    cephalopods on Schneier’s blog. A deliberate unacknowledged allusion to
    SQUID tech & the implications of same pertaining to “security” or the lack
    of same when combined with other tech? Or are they his favorite dinner?-)

Leave a Reply

Your email address will not be published. Required fields are marked *

* Copy This Password *

* Type Or Paste Password Here *

Looking for something?

Use the form below to search the site:


Still not finding what you're looking for? Drop us a note so we can take care of it!

Set your Twitter account name in your settings to use the TwitterBar Section.