Bruce Schneier

Bruce Schneier
Bruce Schneieris an American cryptographer, computer security and privacy specialist, and writer. He is the author of several books on general security topics, computer security and cryptography...
NationalityAmerican
ProfessionScientist
Date of Birth15 January 1963
CountryUnited States of America
database field system
We don?t have a field in the database system that will say you're an evildoer.
designed mind operating security system
Microsoft's operating system was never designed with security in mind. For Microsoft, security is always an afterthought.
choice companies gets happen insecure insurance longer looks losing operating pay percent premium rid sales shoddy start systems version windows
What will happen when the CFO looks at his premium and realizes that it will go down 50 percent if he gets rid of all his insecure Windows operating systems and replaces them with a secure version of Linux? The choice of which operating system to use will no longer be 100 percent technical, ... Microsoft, and other companies with shoddy security, will start losing sales because companies don't want to pay the insurance premiums.
attract dominant extremely operating sloppy system windows
It's the dominant operating system out there, so it's going to attract the attention. On the other hand, Windows has extremely sloppy security,
security-systems people world
A colleague once told me that the world was full of bad security systems designed by people who read Applied Cryptography
technology security-systems taught-us
History has taught us: never underestimate the amount of money, time, and effort someone will expend to thwart a security system. It's always better to assume the worst. Assume your adversaries are better than they are. Assume science and technology will soon be able to do things they cannot yet. Give yourself a margin for error. Give yourself more security than you need today. When the unexpected happens, you'll be glad you did.
security-systems people links
People often represent the weakest link in the security chain and are chronically responsible for the failure of security systems.
assets breaks cause connection corporate frighten industrial malicious network predators regularly service steal system
But with that connection comes new threats: malicious hackers, criminals, industrial spies. These network predators regularly steal corporate assets and intellectual property, cause service breaks and system failures, sully corporate brands, and frighten customers,
beyond fear security sensibly thinking uncertain
Beyond Fear: Thinking Sensibly About Security in an Uncertain World.
analyze appeared article aspect doctor easy given images picture talk
There's one important aspect of this fingerprint that the article did not talk about: how easy is it to forge? Can someone analyze 100 images from a given camera, and then doctor a pre-existing picture so that it appeared to come from that camera?
mark people respected
Mark is one of the more respected people out there doing this kind of work,
consider current hard impossible mathematics using willing
Using current mathematics and technology, it is impossible to even consider factoring a 1024-bit number. I'm not willing to make any hard predictions about tomorrow.
airplane good ground key life net outweigh uses whether
We could ground all airplanes and not have any more airplane crashes, ... The key is whether the good uses of the Net outweigh the bad. Life is like that. You just have to take the good with the bad.
against fact less saying traffic
What you and I are saying is much less important than the fact that you and I are talking. Against traffic analysis, encryption is irrelevant.