Remove Accountability Remove Book Remove Surveillance
article thumbnail

LLM Summary of My Book Beyond Fear

Schneier on Security

Claude (Anthropic’s LLM) was given this prompt: Please summarize the themes and arguments of Bruce Schneier’s book Beyond Fear. Then lay out the most salient criticisms of the book. Surveillance creep risks violating autonomy. Citizens are entitled to some degree of opacity. Secrecy enables abuses.

article thumbnail

Facebook and Cambridge Analytica

Schneier on Security

Harvard Business School professor Shoshana Zuboff calls it " surveillance capitalism." Surveillance capitalism takes this one step further. Google's surveillance isn't in the news, but it's startlingly intimate. That phone is probably the most intimate surveillance device ever invented. In 2015, I wrote a book about it.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. It’s amazing that one person could have had so much access with so little accountability, and could sneak all of this data out without raising any alarms. It started getting weird.

article thumbnail

AI and Trust

Schneier on Security

I wrote about this in 2012 in a book called Liars and Outliers. We are both under constant surveillance and are competing for star rankings. They have social media accounts with personalities. Surveillance is the business model of the Internet. And the incentives of surveillance capitalism are just too much to resist.

article thumbnail

Sextortion campaign uses Goontact spyware to target Android and iOS users

Security Affairs

These sites advertise account IDs for secure messaging apps such as KakaoTalk or Telegram that could allow to communicate with the escorts. In reality, the victims communicated with Goontact operators that attempt to trick them into installing (or sideload) a mobile application that steals the victim’s address book.

Spyware 144
article thumbnail

Iran-linked APT42 is behind over 30 espionage attacks

Security Affairs

The campaigns have been conducted since 2015 and are aimed at conducting information collection and surveillance operations against individuals and organizations of strategic interest to Teheran. ” The surveillance operations conducted by the APT group involved the distribution of Android malware such as VINETHORN and PINEFLOWER.

article thumbnail

Here’s what data the FBI can get from WhatsApp, iMessage, Signal, Telegram, and more

Malwarebytes

Unlike other apps, it doesn’t require you to enter an email address or phone number to create an account. Provides account (i.e. User activity on WeChat has been known to be analyzed, tracked and shared with Chinese authorities upon request as part of the mass surveillance network in China. Date and time account created.