acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Operating a Fake Bank
From Schneier on Security

Operating a Fake Bank

Here's a story of a fake bank in China -- a real bank, not an online bank -- that stole $32m from depositors over a year. Pro tip: real banks never offer 2%/week...

Canada Spies on Internet Downloads
From Schneier on Security

Canada Spies on Internet Downloads

Another story from the Snowden documents: According to the documents, the LEVITATION program can monitor downloads in several countries across Europe, the Middle...

Subconscious Keys
From Schneier on Security

Subconscious Keys

I missed this paper when it was first published in 2012: "Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks" Abstract...

Police Using Radar that Sees Through Walls
From Schneier on Security

Police Using Radar that Sees Through Walls

In the latest example of a military technology that has secretly been used by the police, we have radar guns that can see through walls....

The IDEA Encryption Algorithm with a 128-bit Block Length
From Schneier on Security

The IDEA Encryption Algorithm with a 128-bit Block Length

Here's an IDEA-variant with a 128-bit block length. While I think it's a great idea to bring IDEA up to a modern block length, the paper has none of the cryptanalysis...

Basaaly Moalin: The One "Terrorist" Caught by Section 215 Surveillance
From Schneier on Security

Basaaly Moalin: The One "Terrorist" Caught by Section 215 Surveillance

Remember back in 2013 when the then-director of the NSA Keith Alexander claimed that Section 215 bulk telephone metadata surveillance stopped "fifty-four different...

My Conversation with Edward Snowden
From Schneier on Security

My Conversation with Edward Snowden

Today, as part of a Harvard computer science symposium, I had a public conversation with Edward Snowden. The topics were largely technical, ranging from cryptography...

Friday Squid Blogging: Giggling Squid Restaurant
From Schneier on Security

Friday Squid Blogging: Giggling Squid Restaurant

Giggling Squid is a Thai restaurant chain in the UK. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...

When Thinking Machines Break the Law
From Schneier on Security

When Thinking Machines Break the Law

Last year, two Swiss artists programmed a Random Botnot Shopper, which every week would spend $100 in bitcoin to buy a random item from an anonymous Internet black...

Defending Against Liar Buyer Fraud
From Schneier on Security

Defending Against Liar Buyer Fraud

It's a common fraud on sites like eBay: buyers falsely claim that they never received a purchased item in the mail. Here's a paper on defending against this fraud...

Accountability as a Security System
From Schneier on Security

Accountability as a Security System

At a CATO surveillance event last month, Ben Wittes talked about inherent presidential powers of surveillance with this hypothetical: "What should Congress have...

US Law Enforcement Also Conducting Mass Telephone Surveillance
From Schneier on Security

US Law Enforcement Also Conducting Mass Telephone Surveillance

Late last year, in a criminal case involving export violations, the US government disclosed a mysterious database of telephone call records that it had queried...

New NSA Documents on Offensive Cyberoperations
From Schneier on Security

New NSA Documents on Offensive Cyberoperations

Appelbaum, Poitras and others have another NSA aticle with an enormous Snowden document dump on Der Spiegel, giving details on a variety of offensive NSA cyberoperations...

Friday Squid Blogging: "Squid Jiggin' Ground"
From Schneier on Security

Friday Squid Blogging: "Squid Jiggin' Ground"

Classic song written by Arthur Scammell and performed by Hank Snow. As usual, you can also use this squid post to talk about the security stories in the news that...

My Superpower
From Schneier on Security

My Superpower

For its "Top Influencers in Security You Should Be Following in 2015" blog post, TripWire asked me: "If you could have one infosec-related superpower, what would...

Common Risks in America: Cars and Guns
From Schneier on Security

Common Risks in America: Cars and Guns

I have long said that driving a car is the most dangerous thing regularly do in our lives. Turns out deaths due to automobiles are declining, while deaths due to...

3-1-1 for Encryption
From Schneier on Security

3-1-1 for Encryption

An excellent idea: 3­1­1 for encryption. RSA, DSA, and ECDSA must be 3.4 ounces (100bits) or less per container; must be in 1 quart-sized, clear, plastic, zip-top...

The Security of Data Deletion
From Schneier on Security

The Security of Data Deletion

Thousands of articles have called the December attack against Sony Pictures a wake-up call to industry. Regardless of whether the attacker was the North Korean...

Surveillance Detection for Android Phones
From Schneier on Security

Surveillance Detection for Android Phones

It's called SnoopSnitch: SnoopSnitch is an app for Android devices that analyses your mobile radio traffic to tell if someone is listening in on your phone conversations...

Keystroke Logger Disguised as a USB Charger
From Schneier on Security

Keystroke Logger Disguised as a USB Charger

It's called KeySweeper. More articles. Source code....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account