Bruce Schneier
Bruce Schneier
Bruce Schneieris an American cryptographer, computer security and privacy specialist, and writer. He is the author of several books on general security topics, computer security and cryptography...
NationalityAmerican
ProfessionScientist
Date of Birth15 January 1963
CountryUnited States of America
children government four-horsemen-of-the-apocalypse
Beware the Four Horsemen of the Information Apocalypse: terrorists, drug dealers, kidnappers, and child pornographers. Seems like you can scare any public into allowing the government to do anything with those four.
mean nsa giving
Buy American Doesn’t Sell Well Anymore Because It Means Give A Copy To The NSA
easier illegal security
It's certainly easier to implement bad security and make it illegal for anyone to notice than it is to implement good security.
running silly cards
Microsoft made a big deal about Windows NT getting a C2 security rating. They were much less forthcoming with the fact that this rating only applied if the computer was not attached to a network and had no network card, and had its floppy drive epoxied shut, and was running on a Compaq 386. Solaris's C2 rating was just as silly.
philosophical terrorism social
Given the credible estimate that we've spent $1 trillion on anti-terrorism security
believe people magic
People don't understand computers. Computers are magical boxes that do things. People believe what computers tell them.
average answers internet-users
I am regularly asked what the average Internet user can do to ensure his security. My first answer is usually 'Nothing; you're screwed'.
technology hygiene police
It is poor civic hygiene to install technologies that could someday facilitate a police state.
sister reading two
There are two types of encryption: one that will prevent your sister from reading your diary and one that will prevent your government.
government liberty terrorist
Terrorists can only take my life. Only my government can take my freedom.
tasks looks waste
Something that looks like a protocol but does not accomplish a task is not a protocol—it’s a waste of time.
people important needs
Societies without a reservoir of people who don't follow the rules lack an important mechanism for societal evolution. Vibrant societies need a dishonest minority; if society makes its dishonest minority too small, it stifles dissent as well as common crime.
water digital made
Digital files cannot be made uncopyable, any more than water can be made not wet.
mother giving microsoft
When my mother gets a prompt 'Do you want to download this?' she's going to say yes. It's disingenuous for Microsoft to give you all of these tools with which to hang yourself, and when you do, then say it's your fault.