The point of terrorism is to cause terror, sometimes to further a political goal and sometimes out of sheer hatred. The people terrorists kill are not the targets; they are collateral damage. And blowing up planes, trains, markets or buses is not the goal; those are just tactics.
The real targets of terrorism are the rest of us: the billions of us who are not killed but are terrorized because of the killing. The real point of terrorism is not the act itself, but our reaction to the act.
And we're doing exactly what the terrorists want.
Refuse to be Terrorized http://www.wired.com/news/columns/0,71642-0.html,
Брюс Шнайер знаменитые цитаты
More people are killed every year by pigs than by sharks, which shows you how good we are at evaluating risk.
IT Conversations: Bruce Schneier http://www.itconversations.com/shows/detail119.html,
„Цифровые данные можно сделать некопируемыми настолько, насколько воду можно сделать сухой.“
Digital files cannot be made uncopyable, any more than water can be made not wet.
The Futility of Digital Copy Prevention http://www.schneier.com/crypto-gram-0105.html#3,
There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files.
Прикладная криптография (Applied Cryptography), 2-е издание.
„Только атаки дилетантов нацелены на машины; атаки профессионалов нацелены на людей.“
Only amateurs attack machines; professionals target people.
Semantic Attacks: The Third Wave of Network Attacks http://www.schneier.com/crypto-gram-0010.html#1,
Сайт Брюса Шнайера http://www.schneier.com о справляемся.
Брюс Шнайер цитаты
Technical problems can be remediated. A dishonest corporate culture is much harder to fix.
Visa and Amex Drop CardSystems http://www.schneier.com/crypto-gram-0508.html#16,
We can't keep weapons out of prisons; we can't possibly expect to keep them out of airports.
Prison Shivs http://www.schneier.com/blog/archives/2006/08/prison_shivs.html,
And honestly, if anyone thinks they can get an accurate picture of anyplace on the planet by reading news reports, they're sadly mistaken.
Should Terrorism be Reported in the News? http://www.schneier.com/crypto-gram-0505.html#3,
Once the technology is in place, there will always be the temptation to use it. And it is poor civic hygiene to install technologies that could someday facilitate a police state.
Секреты и ложь. Безопасность данных в цифровом мире (Secrets and Lies. Digital Security in a Networked World)
Брюс Шнайер: Цитаты на английском языке
preface to 2015 edition of Secrets and Lies
Cryptography
Контексте: A few years ago I heard a quotation, and I am going to modify it here: If you think technology can solve your security problems, then you don't understand the problems and you don't understand the technology.
The Fallacy of Trusted Client Software, Schneier, Bruce, 2001-08, Cryptogram newsletter, 2018-08-12 https://www.schneier.com/essays/archives/2000/08/the_fallacy_of_trust.html,
Digital Rights Management
American Elections Are Too Easy to Hack. We Must Take Action Now, Schneier, Bruce, 2018-04-18, The Guardian, 2018-08-12 https://www.theguardian.com/commentisfree/2018/apr/18/american-elections-hack-bruce-scheier,
Elections
“Technical problems can be remediated. A dishonest corporate culture is much harder to fix.”
Visa and Amex Drop CardSystems, Schneier, Bruce, 2005-08-15, Cryptogram newsletter, 2006-09-08 http://www.schneier.com/crypto-gram-0508.html#16,
[Hartford Advocate, 2006-04-27, Your computer is not secure]
Politics and societal issues of the digital age
“Only amateurs attack machines; professionals target people.”
Semantic Attacks: The Third Wave of Network Attacks, 2000-10-15, Schneier, Bruce, Schneier on Security blog, 2010-08-31 http://www.schneier.com/crypto-gram-0010.html#1,
“We can't keep weapons out of prisons; we can't possibly expect to keep them out of airports.”
Prison Shivs, Schneier, Bruce, 2005-05-15, Cryptogram newsletter, 2009-12-27 http://www.schneier.com/blog/archives/2006/08/prison_shivs.html,
Human perception of reality, risk and terrorism
[John Wiley & Sons, 1996, Applied Cryptography 2nd edition Source Code in C, Bruce Schneier, http://www.schneier.com/book-applied.html]
Cryptography
I'm sorry, but I don't know that, either.
Protecting Copyright in the Digital World, Schneier, Bruce, 2001-08-15, Cryptogram newsletter, 2016-05-02 https://www.schneier.com/crypto-gram/archives/2001/0815.html#7,
Digital Rights Management
“It is poor civic hygiene to install technologies that could someday facilitate a police state.”
Secrets and Lies (2000), p. 53
Politics and societal issues of the digital age
“Not being angels is expensive”
Liars & Outliers, Bruce Schneier, ISBN 978-1-118-14330-8, p. 43
[The Guardian, 2008-09-04, A fetishistic approach to security is a perverse way to keep us safe, http://www.guardian.co.uk/technology/2008/sep/04/terrorism.terrorismandtravel, Schneier, Bruce, 2012-08-01]
Human perception of reality, risk and terrorism
Computer Crime Hype, 2005-12-16, Schneier, Bruce, Schneier on Security blog, 2006-09-08 http://www.schneier.com/blog/archives/2005/12/computer_crime_1.html,
Politics and societal issues of the digital age
Biancuzzi, Federico, 2005-05-10, 2006-09-08, Bruce Schneier on Cryptography, SecurityFocus http://www.securityfocus.com/columnists/324,
Politics and societal issues of the digital age
[Schneier, Bruce (speaker), 19 June 2013, 2013, Bruce Schneier: Talks at Google, English, https://www.youtube.com/watch?v=m3NJ-Ow2Lvg, 18:56, Google Inc.]
Should Terrorism be Reported in the News?, Schneier, Bruce, 2005-05-15, Cryptogram newsletter, 2006-09-08 http://www.schneier.com/crypto-gram-0505.html#3,
Human perception of reality, risk and terrorism
[John Wiley & Sons, 1996, Applied Cryptography 2nd edition Source Code in C, Bruce Schneier, http://www.schneier.com/book-applied.html]
Cryptography
“Digital files cannot be made uncopyable, any more than water can be made not wet.”
The Futility of Digital Copy Prevention, Schneier, Bruce, 2001-05-15, Cryptogram newsletter, 2006-09-08 http://www.schneier.com/crypto-gram-0105.html#3,
Digital Rights Management
Politics and societal issues of the digital age
[Wired, 2006-08-24, http://www.wired.com/news/columns/0,71642-0.html, Refuse to be Terrorized, Schneier, Bruce, 2006-09-08]
Human perception of reality, risk and terrorism
IT Conversations: Bruce Schneier, Schneier, Bruce, Doug Kaye, 2004-04-16 http://www.itconversations.com/shows/detail119.html,
Human perception of reality, risk and terrorism
Memo to the Amateur Cipher Designer, Schneier, Bruce, 1998-10-15, Cryptogram newsletter http://www.schneier.com/crypto-gram-9810.html#cipherdesign, (aka Schneier's Law)
Cryptography
Secrets and Lies: Digital Security in a Networked World - Bruce Schneier
Cryptography
“Well-designed security systems fail gracefully.”
Airport Security Failure, Schneier, Bruce, 2006-03-14, Schneier on Security, 2022-06-31 https://www.schneier.com/blog/archives/2006/03/airport_securit_2.html,
Human perception of reality, risk and terrorism