acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Friday Squid Blogging: "What Does the Squid Say?"
From Schneier on Security

Friday Squid Blogging: "What Does the Squid Say?"

Minecraft parody. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Yes, I'm Leaving BT
From Schneier on Security

Yes, I'm Leaving BT

The Register reported that I am leaving BT at the end of the year. It quoted BT as saying: We hired Bruce because of his thought leadership in security and as...

Eben Moglen and I Talk about the NSA
From Schneier on Security

Eben Moglen and I Talk about the NSA

Last week, Eben Moglen and I had a conversation about NSA surveillance. Audio and video are online.

Acoustic Cryptanalysis
From Schneier on Security

Acoustic Cryptanalysis

This is neat: Here, we describe a new acoustic cryptanalysis key extraction attack, applicable to GnuPG's current implementation of RSA. The attack can extract...

Tor User Identified by FBI
From Schneier on Security

Tor User Identified by FBI

Eldo Kim sent an e-mail bomb threat to Harvard so he could skip a final exam. (It's just a coincidence that I was on the Harvard campus that day.) Even though...

Security Vulnerabilities of Legacy Code
From Schneier on Security

Security Vulnerabilities of Legacy Code

An interesting research paper documents a "honeymoon effect" when it comes to software and vulnerabilities: attackers are more likely to find vulnerabilities in...

Attacking Online Poker Players
From Schneier on Security

Attacking Online Poker Players

This story is about how at least two professional online poker players had their hotel rooms broken into and their computers infected with malware. I agree with...

Friday Squid Blogging: Squid Bow Tie
From Schneier on Security

Friday Squid Blogging: Squid Bow Tie

Snappy-looking bow tie. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

President Obama and the Intelligence Community
From Schneier on Security

President Obama and the Intelligence Community

Really good article from the New Yorker.

World War II Anecdote about Trust and Security
From Schneier on Security

World War II Anecdote about Trust and Security

This is an interesting story from World War II about trust: Jones notes that the Germans doubted their system because they knew the British could radio false orders...

How the NSA Tracks Mobile Phone Data
From Schneier on Security

How the NSA Tracks Mobile Phone Data

Last week the Washington Post reported on how the NSA tracks mobile phones world-wide, and this week they followed up with source documents and more detail. Barton...

NSA Tracks People Using Google Cookies
From Schneier on Security

NSA Tracks People Using Google Cookies

The Washington Post has a detailed article on how the NSA uses cookie data to track individuals. The EFF also has a good post on this. I have been writing and...

NSA Spying on Online Gaming Worlds
From Schneier on Security

NSA Spying on Online Gaming Worlds

The NSA is spying on chats in World of Warcraft and other games. There's lots of information -- and a good source document. While it's fun to joke about the NSA...

Bitcoin Explanation
From Schneier on Security

Bitcoin Explanation

This is the best explanation of the Bitcoin protocol that I have read.

Friday Squid Blogging: Hoax Squid-Like Creature
From Schneier on Security

Friday Squid Blogging: Hoax Squid-Like Creature

The weird squid-like creature floating around Bristol Harbour is a hoax. As usual, you can also use this squid post to talk about the security stories in the news...

New Book: <i>Carry On</i>
From Schneier on Security

New Book: Carry On

I have a new book. It's Carry On: Sound Advice from Schneier on Security, and it's my second collection of essays. This book covers my writings from March 2008...

Bruce Schneier Facts T-Shirts
From Schneier on Security

Bruce Schneier Facts T-Shirts

0-Day Clothing has taken 25 Bruce Schneier Facts and turned them into T-shirts just in time for Christmas.

Telepathwords: A New Password Strength Estimator
From Schneier on Security

Telepathwords: A New Password Strength Estimator

Telepathwords is a pretty clever research project that tries to evaluate password strength. It's different from normal strength meters, and I think better. Telepathwords...

Heartwave Biometric
From Schneier on Security

Heartwave Biometric

Here's a new biometric I know nothing about: The wristband relies on authenticating identity by matching the overall shape of the user's heartwave (captured via...

The Problem with EULAs
From Schneier on Security

The Problem with EULAs

Some apps are being distributed with secret Bitcoin-mining software embedded in them. Coins found are sent back to the app owners, of course. And to make it legal...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account