acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorBruce Schneier
bg-corner

Friday Squid Blogging: Encounter Between a Submersible Robot and a Giant Squid
From Schneier on Security

Friday Squid Blogging: Encounter Between a Submersible Robot and a Giant Squid

Wow....

Creating Forensic Sketches from DNA
From Schneier on Security

Creating Forensic Sketches from DNA

This seems really science fictional: It's already possible to make some inferences about the appearance of crime suspects from their DNA alone, including their...

NSA Hacks Huawei
From Schneier on Security

NSA Hacks Huawei

Both Der Spiegel and the New York Times are reporting that the NSA has hacked Huawei pretty extensively, getting copies of the company's products' source code and...

Password Hashing Competition
From Schneier on Security

Password Hashing Competition

There's a private competition to identify new password hashing schemes. Submissions are due at the end of the month....

Smarter People are More Trusting
From Schneier on Security

Smarter People are More Trusting

Interesting research. Both vocabulary and question comprehension were positively correlated with generalized trust. Those with the highest vocab scores were 34...

Giant Squid as an Omen
From Schneier on Security

Giant Squid as an Omen

An omen of what? An increase in the number of giant squid being caught along the Sea of Japan coast is leading puzzled fishermen to fear their presence may be some...

Geolocating Twitter Users
From Schneier on Security

Geolocating Twitter Users

Interesting research into figuring out where Twitter users are located, based on similar tweets from other users: While geotags are the most definitive location...

Chilean Drug Trafficker Pencil-and-Paper Code
From Schneier on Security

Chilean Drug Trafficker Pencil-and-Paper Code

Interesting....

Automatic Face-Recognition Software Getting Better
From Schneier on Security

Automatic Face-Recognition Software Getting Better

Facebook has developed a face-recognition system that works almost as well as the human brain: Asked whether two unfamiliar photos of faces show the same person...

New Book on Data and Power
From Schneier on Security

New Book on Data and Power

I'm writing a new book, with the tentative title of Data and Power. While it's obvious that the proliferation of data affects power, it's less clear how it does...

An Open Letter to IBM's Open Letter
From Schneier on Security

An Open Letter to IBM's Open Letter

Last week, IBM published an "open letter" about "government access to data," where it tried to assure its customers that it's not handing everything over to the...

Liveblogging the Financial Cryptography Conference
From Schneier on Security

Liveblogging the Financial Cryptography Conference

Ross Anderson liveblogged Financial Cryptography 2014. Interesting stuff....

David Kilcullen on Security and Insurgency
From Schneier on Security

David Kilcullen on Security and Insurgency

Very interesting hour-long interview. Australian-born David Kilcullen was the senior advisor to US General David Petraeus during his time in Iraq, advising on...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account