Bruce Schneier
Bruce Schneier
Bruce Schneieris an American cryptographer, computer security and privacy specialist, and writer. He is the author of several books on general security topics, computer security and cryptography...
NationalityAmerican
ProfessionScientist
Date of Birth15 January 1963
CountryUnited States of America
years reviews offers
No one can duplicate the confidence that RSA offers after 20 years of cryptanalytic review.
clueless algorithms break
Anyone, from the most clueless amateur to the best cryptographer, can create an algorithm that he himself can't break.
sacrifice technology people
The more we expect technology to protect us from people in the same way it protects us from nature, the more we will sacrifice the very values of our society in futile attempts to achieve this security.
reading kids government
There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files.
process security products
Security is a process, not a product.
ideas remember easy
The whole notion of passwords is based on an oxymoron. The idea is to have a random string that is easy to remember. Unfortunately, if it's easy to remember, it's something nonrandom like 'Susan.' And if it's random, like 'r7U2*Qnp,' then it's not easy to remember.
fundamentals computer geek
The fundamental driver in computer security, in all of the computer industry, is economics. That requires a lot of re-education for us security geeks.
technology security-systems taught-us
History has taught us: never underestimate the amount of money, time, and effort someone will expend to thwart a security system. It's always better to assume the worst. Assume your adversaries are better than they are. Assume science and technology will soon be able to do things they cannot yet. Give yourself a margin for error. Give yourself more security than you need today. When the unexpected happens, you'll be glad you did.
gaps technological security
The more technological a society is, the greater the security gap is.
real writing scare
The real targets of terrorism are the rest of us: the billions of us who are not killed but are terrorized because of the killing. The real point of terrorism is not the act itself, but our reaction to the act. And we're doing exactly what the terrorists want [...] Our politicians help the terrorists every time they use fear as a campaign tactic. The press helps every time it writes scare stories about the plot and the threat. And if we're terrified, and we share that fear, we help.
thumbs thumbprints different
If someone steals your password, you can change it. But if someone steals your thumbprint, you can't get a new thumb. The failure modes are very different.
requirements maintaining dignity
Privacy is an inherent human right, and a requirement for maintaining the human condition with dignity and respect.
water people trying
Trying to make bits uncopyable is like trying to make water not wet. The sooner people accept this, and build business models that take this into account, the sooner people will start making money again.
security-systems people links
People often represent the weakest link in the security chain and are chronically responsible for the failure of security systems.