<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
			xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
		>

<channel>
	<title>Gigaom Search &#187; People &#187; Bruce Schneier</title>
	<atom:link href="http://search.gigaom.com/person/bruce-schneier/feed/" rel="self" type="application/rss+xml" />
	<link>http://search.gigaom.com</link>
	<description></description>
	<lastBuildDate>Wed, 11 Mar 2015 04:34:30 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1</generator>
	<item>
		<title>Computer experts push Supreme Court to hear Google&#8217;s appeal in API copyright case</title>
		<link>https://gigaom.com/2014/11/10/computer-experts-push-supreme-court-to-hear-googles-appeal-in-api-copyright-case/</link>
		<comments>https://gigaom.com/2014/11/10/computer-experts-push-supreme-court-to-hear-googles-appeal-in-api-copyright-case/#comments</comments>
		<pubDate>Mon, 10 Nov 2014 14:39:36 +0000</pubDate>
		<dc:creator><![CDATA[Jeff Roberts]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[copyright]]></category>
		<category><![CDATA[federal circuit]]></category>
<category domain="http://search.gigaom.com/stock/"><![CDATA[NASDAQ:GOOG]]></category>
		<category domain="http://search.gigaom.com/stock/"><![CDATA[NASDAQ:ORCL]]></category>
		<category domain="http://search.gigaom.com/stock/"><![CDATA[NSDQ:GOOG]]></category>
		
		<guid isPermaLink="false">http://gigaom.com/?p=887494</guid>
		<description><![CDATA[Can companies like Oracle exert copyright over basic software instructions? A new petition from leading computer scientists makes it more likely the Supreme Court will hear an appeal of a decision&#8230;]]></description>
		<wfw:commentRss>https://gigaom.com/2014/11/10/computer-experts-push-supreme-court-to-hear-googles-appeal-in-api-copyright-case/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>As security startups heat up, a reminder that security is not a product or service: it&#8217;s a value</title>
		<link>https://gigaom.com/2014/07/05/as-security-startups-heat-up-a-reminder-that-security-is-not-a-product-or-service-its-a-value/</link>
		<comments>https://gigaom.com/2014/07/05/as-security-startups-heat-up-a-reminder-that-security-is-not-a-product-or-service-its-a-value/#comments</comments>
		<pubDate>Sat, 05 Jul 2014 15:00:51 +0000</pubDate>
		<dc:creator><![CDATA[Jonathan Vanian]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Cyber Hacking]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[software testing]]></category>

		<guid isPermaLink="false">http://gigaom.com/?p=855305</guid>
		<description><![CDATA[There's a lot of funding going on in security these days, but it's hard to tell whether or not these new services are actually going to help things. It's more important&#8230;]]></description>
		<wfw:commentRss>https://gigaom.com/2014/07/05/as-security-startups-heat-up-a-reminder-that-security-is-not-a-product-or-service-its-a-value/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Silent Circle will &#8220;move on&#8221; from NSA-associated encryption standards, but is that necessary?</title>
		<link>https://gigaom.com/2013/09/30/silent-circle-will-move-on-from-nsa-associated-encryption-standards-but-is-that-necessary/</link>
		<comments>https://gigaom.com/2013/09/30/silent-circle-will-move-on-from-nsa-associated-encryption-standards-but-is-that-necessary/#comments</comments>
		<pubDate>Mon, 30 Sep 2013 10:44:41 +0000</pubDate>
		<dc:creator><![CDATA[David Meyer]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Alan Woodward]]></category>
		<category><![CDATA[Jon Callas]]></category>
		<category><![CDATA[Phil Zimmermann]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Silent Circle]]></category>
		<category><![CDATA[Suite B]]></category>
		<category><![CDATA[surveillance]]></category>

		<guid isPermaLink="false">http://gigaom.com/?p=698497</guid>
		<description><![CDATA[The secure communications firm will bring in default replacements for widely-used encryption standards that came out of the U.S. National Institute of Standards and Technology (NIST). However, at least one security&#8230;]]></description>
		<wfw:commentRss>https://gigaom.com/2013/09/30/silent-circle-will-move-on-from-nsa-associated-encryption-standards-but-is-that-necessary/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Hacking your fingerprints: security expert explains limits of biometrics on the iPhone</title>
		<link>https://gigaom.com/2013/09/11/hacking-your-fingerprints-security-expert-explains-limits-of-biometrics-on-the-iphone/</link>
		<comments>https://gigaom.com/2013/09/11/hacking-your-fingerprints-security-expert-explains-limits-of-biometrics-on-the-iphone/#comments</comments>
		<pubDate>Wed, 11 Sep 2013 13:30:55 +0000</pubDate>
		<dc:creator><![CDATA[Jeff Roberts]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[fingerprints]]></category>
<category domain="http://search.gigaom.com/stock/"><![CDATA[NASDAQ:AAPL]]></category>
		<category domain="http://search.gigaom.com/stock/"><![CDATA[NSDQ:AAPL]]></category>
		
		<guid isPermaLink="false">http://gigaom.com/?p=688926</guid>
		<description><![CDATA[Bruce Schneier offers an easy-to-follow account of how fingerprint authentication can be subverted and how the technology will be used on the new iPhone(s aapl). Some highlights: "Your fingerprint isn't a&#8230;]]></description>
		<wfw:commentRss>https://gigaom.com/2013/09/11/hacking-your-fingerprints-security-expert-explains-limits-of-biometrics-on-the-iphone/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>