Hacking the “Bike Angels” System for Moving Bikeshares
I always like a good hack. And this story delivers. Basically, the New York City bikeshare program has a system to reward people who move ... https://www.schneier.com/blog/archives/2024/09/hacking-the-bike-angels-system-for-moving-bikeshares.html
#noncomputerhacks #Uncategorized #hacking #scams
Hacking the “Bike Angels” System for Moving Bikeshares - Schneier on Security
The Hacking of Culture and the Creation of Socio-Technical Debt
Culture is increasingly mediated through algorithms. These algorithms have splintered the organization of culture, a result of states and tech companies vying for influence over mass audiences. One byproduct of this splintering is a shift from imp... https://www.schneier.com/blog/archives/2024/06/the-hacking-of-culture-and-the-creation-of-socio-technical-debt.html
#noncomputerhacks #datacollection #Uncategorized #hacking
The Hacking of Culture and the Creation of Socio-Technical Debt - Schneier on Security
LLMs’ Data-Control Path Insecurity
Back in the 1960s, if you played a 2,600Hz tone into an AT&T pay phone, you could make calls without paying. A phone hacker named John Draper noticed that the <a href="https://www.atlasob... https://www.schneier.com/blog/archives/2024/05/llms-data-control-path-insecurity.html
#computersecurity #noncomputerhacks #vulnerabilities #Uncategorized #hacking #phones #LLM
LLMs’ Data-Control Path Insecurity - Schneier on Security
Back in the 1960s, if you played a 2,600Hz tone into an AT&T pay phone, you could make calls without paying. A phone hacker named John Draper noticed that the plastic whistle that came free in a box of Captain Crunch cereal worked to make the right sound. That became his hacker name, and everyone who knew the trick made free pay-phone calls. There were all sorts of related hacks, such as faking the tones that signaled coins dropping into a pay phone and faking tones used by repair equipment. AT&T could sometimes change the signaling tones, make them more complicated, or try to keep them secret. But the general class of exploit was impossible to fix because the problem was general: Data and control used the same channel. That is, the commands that told the phone switch what to do were sent along the same path as voices...
Schneier on SecurityUsing AI-Generated Legislative Amendments as a Delaying Technique
Canadian legislators proposed 19,600 amendments—almost certainly AI-generated—to a bill in an attempt to delay its adoption.
I wrote about... https://www.schneier.com/blog/archives/2024/04/using-ai-generated-legislative-amendments-as-a-delaying-technique.html
#artificialintelligence #noncomputerhacks #Uncategorized
Using AI-Generated Legislative Amendments as a Delaying Technique - Schneier on Security
Using AI-Generated Legislative Amendments as a Delaying Technique - Schneier on Security
Online Retail Hack - Schneier on Security
Hacking Scandinavian Alcohol Tax
The islands of Åland are an important tax hack:
Although Åland is part of the Republic of Finland,... https://www.schneier.com/blog/archives/2023/10/hacking-scandinavian-alcohol-tax.html
#noncomputerhacks #Uncategorized #AHacker'sMind #hacking
Hacking Scandinavian Alcohol Tax - Schneier on Security
Hacking Scandinavian Alcohol Tax - Schneier on Security