acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Friday Squid Blogging: North Coast Squid
From Schneier on Security

Friday Squid Blogging: North Coast Squid

North Coast Squid is a local writing journal from Manzanita, Oregon. It's going to publish its fifth edition this year. As usual, you can also use this squid post...

UK Government Promoting Backdoor-Enabled Voice Encryption Protocol
From Schneier on Security

UK Government Promoting Backdoor-Enabled Voice Encryption Protocol

The UK government is pushing something called the MIKEY-SAKKE protocol to secure voice. Basically, it's an identity-based system that necessarily requires a trusted...

Security Trade-offs in the Longbow vs. Crossbow Decision
From Schneier on Security

Security Trade-offs in the Longbow vs. Crossbow Decision

Interesting research: Douglas W. Allen and Peter T. Leeson, "Institutionally Constrained Technology Adoption: Resolving the Longbow Puzzle," Journal of Law and...

El Chapo's Opsec
From Schneier on Security

El Chapo's Opsec

I've already written about Sean Penn's opsec while communicating with El Chapo. Here's the technique of mirroring, explained: El chapo then switched to a complex...

France Rejects Back Doors in Encryption Products
From Schneier on Security

France Rejects Back Doors in Encryption Products

For the right reasons too: Axelle Lemaire, the Euro nation's digital affairs minister, shot down the amendment during the committee stage of the forthcoming omnibus...

Reverse-Engineering a Zero-Day Exploit from the Hacking Team Data Dump
From Schneier on Security

Reverse-Engineering a Zero-Day Exploit from the Hacking Team Data Dump

Last July, a still-anonymous hacker broke into the network belonging to the cyberweapons arms manufacturer Hacking Team, and dumped an enormous amount of its proprietary...

Counterfeit Theater Tickets in New York
From Schneier on Security

Counterfeit Theater Tickets in New York

Counterfeiters are makingtickets for the Broadway show "Hamilton." Counterfeiting is much easier when the person you're passing the fakes off to doesn't know what...

Match Fixing in Tennis
From Schneier on Security

Match Fixing in Tennis

The BBC and Buzzfeed are jointly reporting on match fixing in tennis. Their story is based partially on leaked documents and partly on data analysis. BuzzFeed News...

Should We Allow Bulk Searching of Cloud Archives?
From Schneier on Security

Should We Allow Bulk Searching of Cloud Archives?

Jonathan Zittrain proposes a very interesting hypothetical: Suppose a laptop were found at the apartment of one of the perpetrators of last year's Paris attacks...

Spamming Someone from PayPal
From Schneier on Security

Spamming Someone from PayPal

Troy Hunt has identified a new spam vector. PayPal allows someone to send someone else a $0 invoice. The spam is in the notes field. But it's a legitimate e-mail...

Fighting DRM in the W3C
From Schneier on Security

Fighting DRM in the W3C

Cory Doctorow has a good post on the EFF website about how they're trying to fight digital rights management software in the World Wide Web Consortium. So we came...

Sean Penn's Opsec
From Schneier on Security

Sean Penn's Opsec

This article talks about the opsec used by Sean Penn surrounding his meeting with El Chapo. Security experts say there aren't enough public details to fully analyze...

The Internet of Things that Talks About You Behind Your Back
From Schneier on Security

The Internet of Things that Talks About You Behind Your Back

SilverPush is an Indian startup that's trying to figure out all the different computing devices you own. It embeds inaudible sounds into the webpages you read and...

Michael Hayden and the Dutch Government Are against Crypto Backdoors
From Schneier on Security

Michael Hayden and the Dutch Government Are against Crypto Backdoors

Last week, former NSA Director Michael Hayden made a very strong argument against deliberately weakening security products by adding backdoors: Americans' safety...

Mac OS X, iOS, and Flash Had the Most Discovered Vulnerabilities in 2015
From Schneier on Security

Mac OS X, iOS, and Flash Had the Most Discovered Vulnerabilities in 2015

Interesting analysis: Which software had the most publicly disclosed vulnerabilities this year? The winner is none other than Apple's Mac OS X, with 384 vulnerabilities...

IT Security and the Normalization of Deviance
From Schneier on Security

IT Security and the Normalization of Deviance

Professional pilot Ron Rapp has written a fascinating article on a 2014 Gulfstream plane that crashed on takeoff. The accident was 100% human error and entirely...

Friday Squid Blogging: Squid Ink Pasta
From Schneier on Security

Friday Squid Blogging: Squid Ink Pasta

Squid ink pasta is not hard to make, and is a really good side for a wide variety of fish recipes. As usual, you can also use this squid post to talk about the...

Podcast Interview with Me
From Schneier on Security

Podcast Interview with Me

The Technoskeptic has posted a good interview with me on its website. Normally it charges for its content, but this interview is available for free....

"How Stories Deceive"
From Schneier on Security

"How Stories Deceive"

Fascinating New Yorker article about Samantha Azzopardi, serial con artist and deceiver. The article is really about how our brains allow stories to deceive us:...

Replacing Judgment with Algorithms
From Schneier on Security

Replacing Judgment with Algorithms

China is considering a new "social credit" system, designed to rate everyone's trustworthiness. Many fear that it will become a tool of social control -- but in...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account