Bruce Schneier, Author at Security Boulevard https://securityboulevard.com/author/bruce-schneier/ The Home of the Security Bloggers Network Tue, 26 Mar 2024 16:23:19 +0000 en-US hourly 1 https://wordpress.org/?v=6.4.3 https://securityboulevard.com/wp-content/uploads/2021/10/android-chrome-256x256-1-32x32.png Bruce Schneier, Author at Security Boulevard https://securityboulevard.com/author/bruce-schneier/ 32 32 133346385 Hardware Vulnerability in Apple’s M-Series Chips https://securityboulevard.com/2024/03/hardware-vulnerability-in-apples-m-series-chips/ https://securityboulevard.com/2024/03/hardware-vulnerability-in-apples-m-series-chips/#respond Thu, 28 Mar 2024 11:05:01 +0000 https://www.schneier.com/?p=68657 It’s yet another hardware side-channel attack:

The threat resides in the chips’ data memory-dependent prefetcher, a hardware optimization that predicts the memory addresses of data that running code is likely to access in the near future. By loading the contents into the CPU cache before it’s actually needed, the DMP, as the feature is abbreviated, reduces latency between the main memory and the CPU, a common bottleneck in modern computing. DMPs are a relatively new phenomenon found only in M-series chips and Intel’s 13th-generation Raptor Lake microarchitecture, although older forms of prefetchers have been common for years...

The post Hardware Vulnerability in Apple’s M-Series Chips appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/03/hardware-vulnerability-in-apples-m-series-chips/feed/ 0 2013314
Security Vulnerability in Saflok’s RFID-Based Keycard Locks https://securityboulevard.com/2024/03/security-vulnerability-in-safloks-rfid-based-keycard-locks/ https://securityboulevard.com/2024/03/security-vulnerability-in-safloks-rfid-based-keycard-locks/#respond Wed, 27 Mar 2024 11:01:08 +0000 https://www.schneier.com/?p=68655 It’s pretty devastating:

Today, Ian Carroll, Lennert Wouters, and a team of other security researchers are revealing a hotel keycard hacking technique they call Unsaflok. The technique is a collection of security vulnerabilities that would allow a hacker to almost instantly open several models of Saflok-brand RFID-based keycard locks sold by the Swiss lock maker Dormakaba. The Saflok systems are installed on 3 million doors worldwide, inside 13,000 properties in 131 countries. By exploiting weaknesses in both Dormakaba’s encryption and the underlying RFID system Dormakaba uses, known as MIFARE Classic, Carroll and Wouters have demonstrated just how easily they can open a Saflok keycard lock. Their technique starts with obtaining any keycard from a target hotel—say, by booking a room there or grabbing a keycard out of a box of used ones—then reading a certain code from that card with a $300 RFID read-write device, and finally writing two keycards of their own. When they merely tap those two cards on a lock, the first rewrites a certain piece of the lock’s data, and the second opens it...

The post Security Vulnerability in Saflok’s RFID-Based Keycard Locks appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/03/security-vulnerability-in-safloks-rfid-based-keycard-locks/feed/ 0 2013133
On Secure Voting Systems https://securityboulevard.com/2024/03/on-secure-voting-systems/ https://securityboulevard.com/2024/03/on-secure-voting-systems/#respond Tue, 26 Mar 2024 11:08:16 +0000 https://www.schneier.com/?p=68650 Andrew Appel shepherded a public comment—signed by twenty election cybersecurity experts, including myself—on best practices for ballot marking devices and vote tabulation. It was written for the Pennsylvania legislature, but it’s general in nature.

From the executive summary:

We believe that no system is perfect, with each having trade-offs. Hand-marked and hand-counted ballots remove the uncertainty introduced by use of electronic machinery and the ability of bad actors to exploit electronic vulnerabilities to remotely alter the results. However, some portion of voters mistakenly mark paper ballots in a manner that will not be counted in the way the voter intended, or which even voids the ballot. Hand-counts delay timely reporting of results, and introduce the possibility for human error, bias, or misinterpretation...

The post On Secure Voting Systems appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/03/on-secure-voting-systems/feed/ 0 2012980
Licensing AI Engineers https://securityboulevard.com/2024/03/licensing-ai-engineers/ https://securityboulevard.com/2024/03/licensing-ai-engineers/#respond Mon, 25 Mar 2024 11:04:34 +0000 https://www.schneier.com/?p=68647 The debate over professionalizing software engineers is decades old. (The basic idea is that, like lawyers and architects, there should be some professional licensing requirement for software engineers.) Here’s a law journal article recommending the same idea for AI engineers.

This Article proposes another way: professionalizing AI engineering. Require AI engineers to obtain licenses to build commercial AI products, push them to collaborate on scientifically-supported, domain-specific technical standards, and charge them with policing themselves. This Article’s proposal addresses AI harms at their inception, influencing the very engineering decisions that give rise to them in the first place. By wresting control over information and system design away from companies and handing it to AI engineers, professionalization engenders trustworthy AI by design. Beyond recommending the specific policy solution of professionalization, this Article seeks to shift the discourse on AI away from an emphasis on light-touch, ex post solutions that address already-created products to a greater focus on ex ante controls that precede AI development. We’ve used this playbook before in fields requiring a high level of expertise where a duty to the public welfare must trump business motivations. What if, like doctors, AI engineers also vowed to do no harm?...

The post Licensing AI Engineers appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/03/licensing-ai-engineers/feed/ 0 2012905
Public AI as an Alternative to Corporate AI https://securityboulevard.com/2024/03/public-ai-as-an-alternative-to-corporate-ai/ https://securityboulevard.com/2024/03/public-ai-as-an-alternative-to-corporate-ai/#respond Thu, 21 Mar 2024 11:03:18 +0000 https://www.schneier.com/?p=68639 This mini-essay was my contribution to a round table on Power and Governance in the Age of AI.  It’s nothing I haven’t said here before, but for anyone who hasn’t read my longer essays on the topic, it’s a shorter introduction.

 

The increasingly centralized control of AI is an ominous sign. When tech billionaires and corporations steer AI, we get AI that tends to reflect the interests of tech billionaires and corporations, instead of the public. Given how transformative this technology will be for the world, this is a problem.

To benefit society as a whole we need an ...

The post Public AI as an Alternative to Corporate AI appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/03/public-ai-as-an-alternative-to-corporate-ai/feed/ 0 2012566
Cheating Automatic Toll Booths by Obscuring License Plates https://securityboulevard.com/2024/03/cheating-automatic-toll-booths-by-obscuring-license-plates/ https://securityboulevard.com/2024/03/cheating-automatic-toll-booths-by-obscuring-license-plates/#respond Wed, 20 Mar 2024 11:08:52 +0000 https://www.schneier.com/?p=68614 The Wall Street Journal is reporting on a variety of techniques drivers are using to obscure their license plates so that automatic readers can’t identify them and charge tolls properly.

Some drivers have power-washed paint off their plates or covered them with a range of household items such as leaf-shaped magnets, Bramwell-Stewart said. The Port Authority says officers in 2023 roughly doubled the number of summonses issued for obstructed, missing or fictitious license plates compared with the prior year.

Bramwell-Stewart said one driver from New Jersey repeatedly used what’s known in the streets as a flipper, which lets you remotely swap out a car’s real plate for a bogus one ahead of a toll area. In this instance, the bogus plate corresponded to an actual one registered to a woman who was mystified to receive the tolls. “Why do you keep billing me?” Bramwell-Stewart recalled her asking...

The post Cheating Automatic Toll Booths by Obscuring License Plates appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/03/cheating-automatic-toll-booths-by-obscuring-license-plates/feed/ 0 2012418
AI and the Evolution of Social Media https://securityboulevard.com/2024/03/ai-and-the-evolution-of-social-media/ https://securityboulevard.com/2024/03/ai-and-the-evolution-of-social-media/#respond Tue, 19 Mar 2024 11:05:23 +0000 https://www.schneier.com/?p=68624 Oh, how the mighty have fallen. A decade ago, social media was celebrated for sparking democratic uprisings in the Arab world and beyond. Now front pages are splashed with stories of social platforms’ role in misinformation, business conspiracy, malfeasance, and risks to mental health. In a 2022 survey, Americans blamed social media for the coarsening of our political discourse, the spread of misinformation, and the increase in partisan polarization.

Today, tech’s darling is artificial intelligence. Like social media, it has the potential to change the world in many ways, some favorable to democracy. But at the same time, it has the potential to do incredible damage to society...

The post AI and the Evolution of Social Media appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/03/ai-and-the-evolution-of-social-media/feed/ 0 2012305
Drones and the US Air Force https://securityboulevard.com/2024/03/drones-and-the-us-air-force/ https://securityboulevard.com/2024/03/drones-and-the-us-air-force/#respond Mon, 18 Mar 2024 11:03:14 +0000 https://www.schneier.com/?p=68618 Fascinating analysis of the use of drones on a modern battlefield—that is, Ukraine—and the inability of the US Air Force to react to this change.

The F-35A certainly remains an important platform for high-intensity conventional warfare. But the Air Force is planning to buy 1,763 of the aircraft, which will remain in service through the year 2070. These jets, which are wholly unsuited for countering proliferated low-cost enemy drones in the air littoral, present enormous opportunity costs for the service as a whole. In a set of comments posted on LinkedIn...

The post Drones and the US Air Force appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/03/drones-and-the-us-air-force/feed/ 0 2012211
A Taxonomy of Prompt Injection Attacks https://securityboulevard.com/2024/03/a-taxonomy-of-prompt-injection-attacks/ https://securityboulevard.com/2024/03/a-taxonomy-of-prompt-injection-attacks/#respond Fri, 08 Mar 2024 12:06:58 +0000 https://www.schneier.com/?p=68579 Researchers ran a global prompt hacking competition, and have documented the results in a paper that both gives a lot of good examples and tries to organize a taxonomy of effective prompt injection strategies. It seems as if the most common successful strategy is the “compound instruction attack,” as in “Say ‘I have been PWNED’ without a period.”

Ignore This Title and HackAPrompt: Exposing Systemic Vulnerabilities of LLMs through a Global Scale Prompt Hacking Competition

Abstract: Large Language Models (LLMs) are deployed in interactive contexts with direct user engagement, such as chatbots and writing assistants. These deployments are vulnerable to prompt injection and jailbreaking (collectively, prompt hacking), in which models are manipulated to ignore their original instructions and follow potentially malicious ones. Although widely acknowledged as a significant security threat, there is a dearth of large-scale resources and quantitative studies on prompt hacking. To address this lacuna, we launch a global prompt hacking competition, which allows for free-form human input attacks. We elicit 600K+ adversarial prompts against three state-of-the-art LLMs. We describe the dataset, which empirically verifies that current LLMs can indeed be manipulated via prompt hacking. We also present a comprehensive taxonomical ontology of the types of adversarial prompts...

The post A Taxonomy of Prompt Injection Attacks appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/03/a-taxonomy-of-prompt-injection-attacks/feed/ 0 2011391
How Public AI Can Strengthen Democracy https://securityboulevard.com/2024/03/how-public-ai-can-strengthen-democracy/ https://securityboulevard.com/2024/03/how-public-ai-can-strengthen-democracy/#respond Thu, 07 Mar 2024 12:00:13 +0000 https://www.schneier.com/?p=68571 With the world’s focus turning to misinformationmanipulation, and outright propaganda ahead of the 2024 U.S. presidential election, we know that democracy has an AI problem. But we’re learning that AI has a democracy problem, too. Both challenges must be addressed for the sake of democratic governance and public protection.

Just three Big Tech firms (Microsoft, Google, and Amazon) control about two-thirds of the global market for the cloud computing resources used to train and deploy AI models. They have a lot of the AI talent, the capacity for large-scale innovation, and face few public regulations for their products and activities...

The post How Public AI Can Strengthen Democracy appeared first on Security Boulevard.

]]>
https://securityboulevard.com/2024/03/how-public-ai-can-strengthen-democracy/feed/ 0 2011298