acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Hacking Scientific Citations
From Schneier on Security

Hacking Scientific Citations

Some scholars are inflating their reference counts by sneaking them into metadata: Citations of scientific work abide by a standardized referencing system: Each...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m speaking on “Reimagining Democracy in the Age of AI” at the Bozeman Library in Bozeman, Montana...

Friday Squid Blogging: 1994 Lair of Squid Game
From Schneier on Security

Friday Squid Blogging: 1994 Lair of Squid Game

I didn’t know: In 1994, Hewlett-Packard released a miracle machine: the HP 200LX pocket-size PC. In the depths of the device, among the MS-DOS productivity apps...

The NSA Has a Long-Lost Lecture by Adm. Grace Hopper
From Schneier on Security

The NSA Has a Long-Lost Lecture by Adm. Grace Hopper

The NSA has a video recording of a 1982 lecture by Adm. Grace Hopper titled “Future Possibilities: Data, Hardware, Software, and People.” The agency is (so far)...

Apple Is Alerting iPhone Users of Spyware Attacks
From Schneier on Security

Apple Is Alerting iPhone Users of Spyware Attacks

Not a lot of details: Apple has issued a new round of threat notifications to iPhone users across 98 countries, warning them of potential mercenary spyware attacks...

RADIUS Vulnerability
From Schneier on Security

RADIUS Vulnerability

New attack against the RADIUS authentication protocol: The Blast-RADIUS attack allows a man-in-the-middle attacker between the RADIUS client and server to forge...

Friday Squid Blogging: Newly Discovered Vampire Squid
From Schneier on Security

Friday Squid Blogging: Newly Discovered Vampire Squid

A new vampire squid species was discovered in the South China Sea. Blog moderation policy.

New Open SSH Vulnerability
From Schneier on Security

New Open SSH Vulnerability

It’s a serious one: The vulnerability, which is a signal handler race condition in OpenSSH’s server (sshd), allows unauthenticated remote code execution (RCE)...

Public Surveillance of Bars
From Schneier on Security

Public Surveillance of Bars

This article about an app that lets people remotely view bars to see if they’re crowded or not is filled with commentary—on both sides—about privacy and openness...

Upcoming Book on AI and Democracy
From Schneier on Security

Upcoming Book on AI and Democracy

If you’ve been reading my blog, you’ve noticed that I have written a lot about AI and democracy, mostly with my co-author Nathan Sanders. I am pleased to announce...

Model Extraction from Neural Networks
From Schneier on Security

Model Extraction from Neural Networks

A new paper, “Polynomial Time Cryptanalytic Extraction of Neural Network Models,” by Adi Shamir and others, uses ideas from differential cryptanalysis to extract...

Friday Squid Blogging: New Squid Species
From Schneier on Security

Friday Squid Blogging: New Squid Species

A new squid species—of the Gonatidae family—was discovered. The video shows her holding a brood of very large eggs. Research paper.

James Bamford on Section 702 Extension
From Schneier on Security

James Bamford on Section 702 Extension

Longtime NSA-watcher James Bamford has a long article on the reauthorization of Section 702 of the Foreign Intelligence Surveillance Act (FISA).

The US Is Banning Kaspersky
From Schneier on Security

The US Is Banning Kaspersky

This move has been coming for a long time. The Biden administration on Thursday said it’s banning the company from selling its products to new US-based customers...

Breaking the M-209
From Schneier on Security

Breaking the M-209

Interesting paper about a German cryptanalysis machine that helped break the US M-209 mechanical ciphering machine. The paper contains a good description of how...

Friday Squid Blogging: Squid Nebula
From Schneier on Security

Friday Squid Blogging: Squid Nebula

Beautiful astronomical photo.

Recovering Public Keys from Signatures
From Schneier on Security

Recovering Public Keys from Signatures

Interesting summary of various ways to derive the public key from digitally signed files. Normally, with a signature scheme, you have the public key and want to...

New Blog Moderation Policy
From Schneier on Security

New Blog Moderation Policy

There has been a lot of toxicity in the comments section of this blog. Recently, we’re having to delete more and more comments. Not just spam and off-topic comments...

The Hacking of Culture and the Creation of Socio-Technical Debt
From Schneier on Security

The Hacking of Culture and the Creation of Socio-Technical Debt

Culture is increasingly mediated through algorithms. These algorithms have splintered the organization of culture, a result of states and tech companies vying for...

Rethinking Democracy for the Age of AI
From Schneier on Security

Rethinking Democracy for the Age of AI

There is a lot written about technology’s threats to democracy. Polarization. Artificial intelligence. The concentration of wealth and power. I have a more general...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account