Hacking the “Bike Angels” System for Moving Bikeshares

I always like a good hack. And this story delivers. Basically, the New York City bikeshare program has a system to reward people who move ... https://www.schneier.com/blog/archives/2024/09/hacking-the-bike-angels-system-for-moving-bikeshares.html

#noncomputerhacks #Uncategorized #hacking #scams

Hacking the “Bike Angels” System for Moving Bikeshares - Schneier on Security

The Hacking of Culture and the Creation of Socio-Technical Debt

Culture is increasingly mediated through algorithms. These algorithms have splintered the organization of culture, a result of states and tech companies vying for influence over mass audiences. One byproduct of this splintering is a shift from imp... https://www.schneier.com/blog/archives/2024/06/the-hacking-of-culture-and-the-creation-of-socio-technical-debt.html

#noncomputerhacks #datacollection #Uncategorized #hacking

The Hacking of Culture and the Creation of Socio-Technical Debt - Schneier on Security

LLMs’ Data-Control Path Insecurity

Back in the 1960s, if you played a 2,600Hz tone into an AT&T pay phone, you could make calls without paying. A phone hacker named John Draper noticed that the <a href="https://www.atlasob... https://www.schneier.com/blog/archives/2024/05/llms-data-control-path-insecurity.html

#computersecurity #noncomputerhacks #vulnerabilities #Uncategorized #hacking #phones #LLM

LLMs’ Data-Control Path Insecurity - Schneier on Security

Back in the 1960s, if you played a 2,600Hz tone into an AT&T pay phone, you could make calls without paying. A phone hacker named John Draper noticed that the plastic whistle that came free in a box of Captain Crunch cereal worked to make the right sound. That became his hacker name, and everyone who knew the trick made free pay-phone calls. There were all sorts of related hacks, such as faking the tones that signaled coins dropping into a pay phone and faking tones used by repair equipment. AT&T could sometimes change the signaling tones, make them more complicated, or try to keep them secret. But the general class of exploit was impossible to fix because the problem was general: Data and control used the same channel. That is, the commands that told the phone switch what to do were sent along the same path as voices...

Schneier on Security

Using AI-Generated Legislative Amendments as a Delaying Technique

Canadian legislators proposed 19,600 amendments—almost certainly AI-generated—to a bill in an attempt to delay its adoption.
I wrote about... https://www.schneier.com/blog/archives/2024/04/using-ai-generated-legislative-amendments-as-a-delaying-technique.html

#artificialintelligence #noncomputerhacks #Uncategorized

Using AI-Generated Legislative Amendments as a Delaying Technique - Schneier on Security

Using AI-Generated Legislative Amendments as a Delaying Technique - Schneier on Security

Online Retail Hack

Selling miniature replicas to unsuspecting shoppers:
<... https://www.schneier.com/blog/archives/2023/11/online-retail-hack.html

#noncomputerhacks #Uncategorized #AHacker'sMind #hacking #retail #fraud

Online Retail Hack - Schneier on Security

Online Retail Hack - Schneier on Security

Hacking Scandinavian Alcohol Tax

The islands of Åland are an important tax hack:
Although Åland is part of the Republic of Finland,... https://www.schneier.com/blog/archives/2023/10/hacking-scandinavian-alcohol-tax.html

#noncomputerhacks #Uncategorized #AHacker'sMind #hacking

Hacking Scandinavian Alcohol Tax - Schneier on Security

Hacking Scandinavian Alcohol Tax - Schneier on Security