Liars and Outliers

Last updated
Liars and Outliers: Enabling the Trust that Society Needs to Thrive
Liars and Outliers Cover.jpg
First edition
Author Bruce Schneier
CountryUnited States
LanguageEnglish
GenreAnthropology, Security, Sociology
Publisher Wiley
Publication date
2012
Pages384
ISBN 978-1118143308

Liars and Outliers: Enabling the Trust that Society Needs to Thrive is a 2012 nonfiction book by Bruce Schneier about security in the context of a larger society. [1]

The book covers a wide array of disciplines, from game theory and security to sociology and evolution in its attempt to explain how trust scales from a small village in which people know and trust each other to a global economy where individuals cannot possibly trust every person they must work with, but trust the systems of law and physical security instead.

The book received generally positive reviews for its combination of disparate disciplines and relevance to current events. [1] [2] [3]

Related Research Articles

<span class="mw-page-title-main">Advanced Encryption Standard</span> Standard for the encryption of electronic data

The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.

<span class="mw-page-title-main">Bruce Schneier</span> American computer scientist

Bruce Schneier is an American cryptographer, computer security professional, privacy specialist, and writer. Schneier is an Adjunct Lecturer in Public Policy at the Harvard Kennedy School and a Fellow at the Berkman Klein Center for Internet & Society as of November, 2013. He is a board member of the Electronic Frontier Foundation, Access Now, and The Tor Project; and an advisory board member of Electronic Privacy Information Center and VerifiedVoting.org. He is the author of several books on general security topics, computer security and cryptography and is a squid enthusiast.

A cypherpunk is any individual advocating widespread use of strong cryptography and privacy-enhancing technologies as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal groups aimed to achieve privacy and security through proactive use of cryptography. Cypherpunks have been engaged in an active movement since at least the late 1980s.

In computing, a trusted client is a device or program controlled by the user of a service, but with restrictions designed to prevent its use in ways not authorized by the provider of the service. That is, the client is a device that vendors trust and then sell to the consumers, whom they do not trust. Examples include video games played over a computer network or the Content Scramble System (CSS) in DVDs.

<i>The Transparent Society</i>

The Transparent Society (1998) is a non-fiction book by the science-fiction author David Brin in which he forecasts social transparency and some degree of erosion of privacy, as it is overtaken by low-cost surveillance, communication and database technology, and proposes new institutions and practices that he believes would provide benefits that would more than compensate for lost privacy. The work first appeared as a magazine article by Brin in Wired in late 1996. In 2008, security expert Bruce Schneier called the transparent society concept a "myth", claiming it ignores wide differences in the relative power of those who access information.

The Point-to-Point Tunneling Protocol (PPTP) is an obsolete method for implementing virtual private networks. PPTP has many well known security issues.

<span class="mw-page-title-main">David A. Wagner</span> American computer scientist

David A. Wagner is a professor of computer science at the University of California, Berkeley and a well-known researcher in cryptography and computer security. He is a member of the Election Assistance Commission's Technical Guidelines Development Committee, tasked with assisting the EAC in drafting the Voluntary Voting System Guidelines. He was also a member of the ACCURATE project.

<span class="mw-page-title-main">Alice and Bob</span> Characters used in cryptography and science literature

Alice and Bob are fictional characters commonly used as placeholders in discussions about cryptographic systems and protocols, and in other science and engineering literature where there are several participants in a thought experiment. The Alice and Bob characters were invented by Ron Rivest, Adi Shamir, and Leonard Adleman in their 1978 paper "A Method for Obtaining Digital Signatures and Public-key Cryptosystems". Subsequently, they have become common archetypes in many scientific and engineering fields, such as quantum cryptography, game theory and physics. As the use of Alice and Bob became more widespread, additional characters were added, sometimes each with a particular meaning. These characters do not have to refer to people; they refer to generic agents which might be different computers or even different programs running on a single computer.

<span class="mw-page-title-main">Malcolm Gladwell</span> Canadian journalist and science writer (born 1963)

Malcolm Timothy Gladwell is a Canadian journalist, author, and public speaker. He has been a staff writer for The New Yorker since 1996. He has published seven books. He is also the host of the podcast Revisionist History and co-founder of the podcast company Pushkin Industries.

End-to-end encryption (E2EE) is a private communication system in which only communicating users can participate. As such, no one, including the communication system provider, telecom providers, Internet providers or malicious actors, can access the cryptographic keys needed to converse.

Security theater is the practice of implementing security measures that are considered to provide the feeling of improved security while doing little or nothing to achieve it.

<span class="mw-page-title-main">Password Safe</span> Free password manager by Bruce Schneier

Password Safe is a free and open-source password manager program originally written for Microsoft Windows but supporting a wide array of operating systems, with compatible clients available for Linux, FreeBSD, Android, IOS, BlackBerry and other operating systems.

<span class="mw-page-title-main">Rainbow Series</span>

The Rainbow Series is a series of computer security standards and guidelines published by the United States government in the 1980s and 1990s. They were originally published by the U.S. Department of Defense Computer Security Center, and then by the National Computer Security Center.

<span class="mw-page-title-main">2007 Boston Mooninite panic</span> 2007 mass panic

On the morning of January 31, 2007, the Boston Police Department and the Boston Fire Department mistakenly identified battery-powered LED placards depicting the Mooninites, characters from the Adult Swim animated television series Aqua Teen Hunger Force, as improvised explosive devices (IEDs), leading to a massive panic. Placed throughout Boston, Massachusetts, and the surrounding cities of Cambridge and Somerville by Peter "Zebbler" Berdovsky and Sean Stevens, these devices were part of a nationwide guerrilla marketing advertising campaign for Aqua Teen Hunger Force Colon Movie Film for Theaters.

Open-source software security is the measure of assurance or guarantee in the freedom from danger and risk inherent to an open-source software system.

<span class="mw-page-title-main">Twofish</span> Block cipher

In cryptography, Twofish is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits. It was one of the five finalists of the Advanced Encryption Standard contest, but it was not selected for standardization. Twofish is related to the earlier block cipher Blowfish.

<span class="mw-page-title-main">Tails (operating system)</span> Linux distribution for anonymity and privacy

Tails, or "The Amnesic Incognito Live System", is a security-focused Debian-based Linux distribution aimed at preserving Internet privacy and anonymity. It connects to the Internet exclusively through the anonymity network Tor. The system is designed to be booted as a live DVD or live USB and never writes to the hard drive or SSD, leaving no digital footprint on the machine unless explicitly told to do so. It can also be run as a virtual machine, with some additional security risks.

<span class="mw-page-title-main">Nothing to hide argument</span> Argument that one does not need privacy unless they are doing something wrong

The nothing to hide argument states that individuals have no reason to fear or oppose surveillance programs unless they are afraid it will uncover their own illicit activities. An individual using this argument may claim that an average person should not worry about government surveillance, as they would have "nothing to hide".

<span class="mw-page-title-main">Bullrun (decryption program)</span> Code name of a decryption program run by the NSA

Bullrun is a clandestine, highly classified program to crack encryption of online communications and data, which is run by the United States National Security Agency (NSA). The British Government Communications Headquarters (GCHQ) has a similar program codenamed Edgehill. According to the Bullrun classification guide published by The Guardian, the program uses multiple methods including computer network exploitation, interdiction, industry relationships, collaboration with other intelligence community entities, and advanced mathematical techniques.

<i>Click Here to Kill Everybody</i> 2018 non-fiction book by Bruce Schneier

Click Here to Kill Everybody: Security and Survival in a Hyper-connected World is a 2018 nonfiction book by Bruce Schneier that explores the risks and security implications of the proliferation of Internet of Things devices and increases in widespread automation, and lays out suggestions as to how these might be best mitigated at a societal level.

References

  1. 1 2 ""Liars and Outliers" by Bruce Schneier". Byte. InformationWeek. 1 Feb 2012. Retrieved 22 September 2012.[ dead link ]
  2. Jordan Ellenberg (2 September 2012). "You Can't Trust Airport Security". Wall Street Journal. Retrieved 22 September 2012.
  3. Ben Rothke (22 Feb 2012). "Book Review: Liars and Outliers". Slashdot. Retrieved 22 September 2012.