Bruce Schneier

Bruce Schneier
Bruce Schneieris an American cryptographer, computer security and privacy specialist, and writer. He is the author of several books on general security topics, computer security and cryptography...
NationalityAmerican
ProfessionScientist
Date of Birth15 January 1963
CountryUnited States of America
water digital made
Digital files cannot be made uncopyable, any more than water can be made not wet.
tasks looks waste
Something that looks like a protocol but does not accomplish a task is not a protocol—it’s a waste of time.
government liberty terrorist
Terrorists can only take my life. Only my government can take my freedom.
sister reading two
There are two types of encryption: one that will prevent your sister from reading your diary and one that will prevent your government.
technology hygiene police
It is poor civic hygiene to install technologies that could someday facilitate a police state.
average answers internet-users
I am regularly asked what the average Internet user can do to ensure his security. My first answer is usually 'Nothing; you're screwed'.
believe people magic
People don't understand computers. Computers are magical boxes that do things. People believe what computers tell them.
philosophical terrorism social
Given the credible estimate that we've spent $1 trillion on anti-terrorism security
running silly cards
Microsoft made a big deal about Windows NT getting a C2 security rating. They were much less forthcoming with the fact that this rating only applied if the computer was not attached to a network and had no network card, and had its floppy drive epoxied shut, and was running on a Compaq 386. Solaris's C2 rating was just as silly.
mean nsa giving
Buy American Doesn’t Sell Well Anymore Because It Means Give A Copy To The NSA
learning people complaining
Microsoft knows that reliable software is not cost effective. According to studies, 90% to 95% of all bugs are harmless. They're never discovered by users, and they don't affect performance. It's much cheaper to release buggy software and fix the 5% to 10% of bugs people find and complain about.
fake firsts cards
ID can be hijacked, and cards can be faked. All of the 9/11 terrorists had fake IDs, yet they still got on the planes. If the British national ID card can't be faked, it will be the first on the planet.
easier illegal security
It's certainly easier to implement bad security and make it illegal for anyone to notice than it is to implement good security.
children government four-horsemen-of-the-apocalypse
Beware the Four Horsemen of the Information Apocalypse: terrorists, drug dealers, kidnappers, and child pornographers. Seems like you can scare any public into allowing the government to do anything with those four.