Remove application-security schneier-on-hacking-society
article thumbnail

How AI Could Write Our Laws

Schneier on Security

Sanders & Bruce Schneier Nearly 90% of the multibillion-dollar federal lobbying apparatus in the United States serves corporate interests. Another word for a strategy like this is a “hack.” ” Hacks follow the rules of a system but subvert their intent. By Nathan E. There are three basic challenges involved.

article thumbnail

The Hacker Mind Podcast: What Star Wars Can Teach Us About Threat Modeling

ForAllSecure

Having a common framework around vulnerabilities, around threats , helps us understand the information security landscape better. It’s about challenging our expectations about the people who hack for a living. Literally, how the rebellion fighting the Empire has echoes in how we approach and mitigate information security threats.

Cloud 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: The Right To Repair

ForAllSecure

How do the current DMCA laws impact those who hack digital devices? To answer these questions, Paul Roberts, Editor-in-Chief of the Security Ledger, has founded securepairs.org , a group of infosec experts who are volunteering their free time to fight for the digital right to repair in local legislation. No need for a repair person.

article thumbnail

The Hacker Mind Podcast: The Right To Repair

ForAllSecure

How do the current DMCA laws impact those who hack digital devices? To answer these questions, Paul Roberts, Editor-in-Chief of the Security Ledger, has founded securepairs.org , a group of infosec experts who are volunteering their free time to fight for the digital right to repair in local legislation. No need for a repair person.