• RSS
  • Twitter
  • FaceBook

Security Forums

Log in

FAQ | Search | Usergroups | Profile | Register | RSS | Posting Guidelines | Recent Posts

Bruce Schneier interview

Users browsing this topic:0 Security Fans, 0 Stealth Security Fans
Registered Security Fans: None
Goto page 1, 2, 3  Next
Post new topic   Reply to topic   Printer-friendly version    Networking/Security Forums Index -> Cryptographic Theory and Cryptanalysis - Internal and Transmission Security

View previous topic :: View next topic  
Author Message
alt.don
SF Boss
SF Boss


Joined: 04 Mar 2003
Posts: 16777079


Offline

PostPosted: Tue Nov 15, 2005 7:26 pm    Post subject: Bruce Schneier interview Reply with quote

Hi guys/gals,

It appears that Mr. Schneier is willing to do an interview for us. To that end please post the questions you would like to see posed to him in this thread. I will give it a week for questions to be posted to this thread.

Thanks,

Don


Last edited by alt.don on Tue Nov 15, 2005 8:20 pm; edited 1 time in total
Back to top
View user's profile Send private message Visit poster's website
ryansutton
Trusted SF Member
Trusted SF Member


Joined: 25 Aug 2004
Posts: 67
Location: San Francisco, California

Offline

PostPosted: Tue Nov 15, 2005 8:14 pm    Post subject: Reply with quote

Datah, Justin, where you guys at?!?! Very Happy
Back to top
View user's profile Send private message
alt.don
SF Boss
SF Boss


Joined: 04 Mar 2003
Posts: 16777079


Offline

PostPosted: Tue Nov 15, 2005 8:22 pm    Post subject: Reply with quote

Well one question that I would like Mr. Schneier to answer is "at what stage does encryption strength become a national security issue?". After all the bad guys are also able to use robust and free encryption.
Back to top
View user's profile Send private message Visit poster's website
ryansutton
Trusted SF Member
Trusted SF Member


Joined: 25 Aug 2004
Posts: 67
Location: San Francisco, California

Offline

PostPosted: Tue Nov 15, 2005 8:52 pm    Post subject: Reply with quote

Interesting point and if you really want to spend some time thinking about it as a national issue a good read is digital fortress, purley from a fictional standpoint but interesting none the less.
Back to top
View user's profile Send private message
moondoggie
Lurker
Lurker


Joined: 27 May 2005
Posts: 19


Offline

PostPosted: Wed Nov 16, 2005 4:43 am    Post subject: Reply with quote

wow, what a great post to look forward to. i guess i would like to know his take on the sony xcp rootkit phenomenon and whether or not that scheme is ultimately secure enough to actually protect the data
Back to top
View user's profile Send private message
Secure Lockdown
Just Arrived
Just Arrived


Joined: 29 Jul 2005
Posts: 2


Offline

PostPosted: Wed Nov 16, 2005 5:48 am    Post subject: Reply with quote

ask Schneier what he thinks of Zimmerman and his new VOIP & crypto initiative.
Back to top
View user's profile Send private message
PhiBer
SF Mod
SF Mod


Joined: 11 Mar 2003
Posts: 20
Location: Your MBR

Offline

PostPosted: Wed Nov 16, 2005 6:40 am    Post subject: Reply with quote

1.) Recently, you mentioned that you feel ISP's should be held liable for bad network traffic (i.e. viruses, spam, phishing, etcetera). What do you think is the best way of doing this, and how would you reduce false negatives? Also, what would you say to someone who claims that this is no different to holding car manufacturers responsible for drunk driving, gun makers for illegal use of their weapons, and so on.

2.) What do you think about the upcoming World Summit on the Information Society and the implications of giving DNS control to the European Union? Do you think that ICANN should continue to hold a prominent role in the governance of the Internet Root Servers?
Back to top
View user's profile Send private message
Guest







PostPosted: Wed Nov 16, 2005 9:31 am    Post subject: Reply with quote

The interviews have been great but leave out the "what coding language, scripting etc tcp/ip skills should ..." question and it makes a more enjoyable read, unless it of course is in contrast with the other questions made to the person (ie in ron gula interview the last question didn't really fit in, imho) Wink
Back to top
alt.don
SF Boss
SF Boss


Joined: 04 Mar 2003
Posts: 16777079


Offline

PostPosted: Wed Nov 16, 2005 2:02 pm    Post subject: Reply with quote

Hello Marko,

Well the interviews have geared around having an interview with a security professional and what their views are on not only contemporary issues, but also in what it takes to be a security pro. That includes core skills like programming, and networking ie: TCP/IP. Getting their opinion on these areas is indeed desired. That being said there has been enough now that all of the answers from the various interviewee's has pretty much been the same. Lastly, you are always welcome to suggest future people for interviews, and formulate questions. That is sometimes not an easy task I might addd. Either way I am happy that you are enjoying them.
Back to top
View user's profile Send private message Visit poster's website
Guest







PostPosted: Wed Nov 16, 2005 2:42 pm    Post subject: Reply with quote

Maybe the questions should be stated so that it doesn't lead the person to answering about programming and tcp/ip, but allows the person to give an opinion about what he/she considers nice.

That being said, few questions for Schneier:

1. In a nutshell, what do you think of the Sony rootkit case?
2. What in your opinion are the biggest threats that will face us online in the near future (like worms, organized crime, and so on)?
3. What is your opinion about staying anonymous online? Is it really possible legally/illegally?

Then a new suggestion for interview: Raven Alder
Back to top
Amitabh
Just Arrived
Just Arrived


Joined: 24 Aug 2004
Posts: 0
Location: Australia

Offline

PostPosted: Wed Nov 16, 2005 3:49 pm    Post subject: Reply with quote

What sort of interview will it be?
Anyway my question: I want to know about the various patent laws dealing with cryptography and software in general. What is the future?

Specifically, I want his opinion on patents in cryptography. And how to know if I am violating a patent and if I should worry about it? (additionally, is it necessary to obtain a patent and if so how?)
Back to top
View user's profile Send private message Visit poster's website
Secure Lockdown
Just Arrived
Just Arrived


Joined: 29 Jul 2005
Posts: 2


Offline

PostPosted: Wed Nov 16, 2005 4:22 pm    Post subject: Reply with quote

alt.don wrote:
...what it takes to be a security pro.


In that case, I pull back my initial question about Zimmerman and ask if you can ash Schneier what "he" thinks is the best way to graduate from computer/network support/sys admin work and into a info sec role where he/she is doing only info sec and no more admin/support work anymore.

SL
Back to top
View user's profile Send private message
moondoggie
Lurker
Lurker


Joined: 27 May 2005
Posts: 19


Offline

PostPosted: Thu Nov 17, 2005 3:51 am    Post subject: Reply with quote

i actually have a different question for mr schneier: i was reading his entry on RFID passports and RFID security and i was wondering how much of security is based on research and how much is based on a priori knowledge?
Back to top
View user's profile Send private message
PhiBer
SF Mod
SF Mod


Joined: 11 Mar 2003
Posts: 20
Location: Your MBR

Offline

PostPosted: Thu Nov 17, 2005 7:37 pm    Post subject: Reply with quote

moondoggie wrote:
wow, what a great post to look forward to. i guess i would like to know his take on the sony xcp rootkit phenomenon and whether or not that scheme is ultimately secure enough to actually protect the data


In case you were still interested, Bruce wrote an article about this posted on wired today.
Back to top
View user's profile Send private message
B-Con
Just Arrived
Just Arrived


Joined: 29 Jul 2004
Posts: 8
Location: int main()

Offline

PostPosted: Sat Nov 19, 2005 12:43 am    Post subject: Reply with quote

Does he forsee the developement of a cryptographically secure hash any time in the near future? And does he anticipate finishing his own hash based on Phelix?
Back to top
View user's profile Send private message Visit poster's website
mxb
Trusted SF Member
Trusted SF Member


Joined: 30 Mar 2004
Posts: 6


Offline

PostPosted: Sat Nov 19, 2005 9:02 pm    Post subject: Reply with quote

My questions are the following:

1) You have previously suggested holding software developers liable for the security in their products. What is your opinion about free software? Do you think that it will be one single event that causes a hold shift in viewpoint for the entire commercial software industry? What do you think it will be?

2) As privacy seems to be currently eroding away, with the requests for wiretapping VOIP calls, logging of internet usage, and so forth, do you think that eventually the general public will realise and start to demand that privacy back?

3) With the current tactics being employed by the RIAA/MPAA against file sharers, what do you think about the current generation of file sharing networks? Do you think that actions by such corporations are a major driving force behind the research and development of anonymous and encrypted networks?

Cheers,
Martin
Back to top
View user's profile Send private message
Display posts from previous:   

Post new topic   Reply to topic   Printer-friendly version    Networking/Security Forums Index -> Cryptographic Theory and Cryptanalysis - Internal and Transmission Security All times are GMT + 2 Hours
Goto page 1, 2, 3  Next
Page 1 of 3


 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum

Community Area

Log in | Register