acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Michael Ellis as NSA General Counsel
From Schneier on Security

Michael Ellis as NSA General Counsel

Over at Lawfare, Susan Hennessey has an excellent primer on how Trump loyalist Michael Ellis got to be the NSA General Counsel, over the objections of NSA Director...

On Blockchain Voting
From Schneier on Security

On Blockchain Voting

Blockchain voting is a spectacularly dumb idea for a whole bunch of reasons. I have generally quoted Matt Blaze: Why is blockchain voting a dumb idea? Glad you...

Friday Squid Blogging: Bigfin Squid Found in Australian Waters
From Schneier on Security

Friday Squid Blogging: Bigfin Squid Found in Australian Waters

A bigfin squid has been found — and filmed — in Australian waters for the first time. As usual, you can also use this squid post to talk about the security stories...

Inrupt’s Solid Announcement
From Schneier on Security

Inrupt’s Solid Announcement

Earlier this year, I announced that I had joined Inrupt, the company commercializing Tim Berners-Lee’s Solid specification: The idea behind Solid is both simple...

Friday Squid Blogging: Diplomoceras Maximum
From Schneier on Security

Friday Squid Blogging: Diplomoceras Maximum

Diplomoceras maximum is an ancient squid-like creature. It lived about 68 million years ago, looked kind of like a giant paperclip, and may have had a lifespanhere...

Upcoming Speaking Engagements
From Schneier on Security

Upcoming Speaking Engagements

This is a current list of where and when I am scheduled to speak: I’m speaking at the (ISC)² Security Congress 2020, November 16, 2020. I’ll be on a panel at the...

“Privacy Nutrition Labels” in Apple’s App Store
From Schneier on Security

“Privacy Nutrition Labels” in Apple’s App Store

Apple will start requiring standardized privacy labels for apps in its app store, starting in December: Apple allows data disclosure to be optional if all of the...

New Zealand Election Fraud
From Schneier on Security

New Zealand Election Fraud

It seems that this election season has not gone without fraud. In New Zealand, a vote for “Bird of the Year” has been marred by fraudulent votes: More than 1,500...

The Security Failures of Online Exam Proctoring
From Schneier on Security

The Security Failures of Online Exam Proctoring

Proctoring an online exam is hard. It’s hard to be sure that the student isn’t cheating, maybe by having reference materials at hand, or maybe by substituting someone...

2020 Was a Secure Election
From Schneier on Security

2020 Was a Secure Election

Over at Lawfare: “2020 Is An Election Security Success Story (So Far).” What’s more, the voting itself was remarkably smooth. It was only a few months ago that...

Detecting Phishing Emails
From Schneier on Security

Detecting Phishing Emails

Research paper: Rick Wash, “How Experts Detect Phishing Scam Emails“: Abstract: Phishing scam emails are emails that pretend to be something they are not in order...

California Proposition 24 Passes
From Schneier on Security

California Proposition 24 Passes

California’s Proposition 24, aimed at improving the California Consumer Privacy Act, passed this week. Analyses are very mixed. I was very mixed on the proposition...

Determining What Video Conference Participants Are Typing from Watching Shoulder Movements
From Schneier on Security

Determining What Video Conference Participants Are Typing from Watching Shoulder Movements

Accuracy isn’t great, but that it can be done at all is impressive. Murtuza Jadiwala, a computer science professor heading the research project, said his team...

New Windows Zero-Day
From Schneier on Security

New Windows Zero-Day

Google’s Project Zero has discovered and published a buffer overflow vulnerability in the Windows Kernel Cryptography Driver. The exploit doesn’t affect the cryptography...

The Legal Risks of Security Research
From Schneier on Security

The Legal Risks of Security Research

Sunoo Park and Kendra Albert have published “A Researcher’s Guide to Some Legal Risks of Security Research.” From a summary: Such risk extends beyond anti-hacking...

Friday Squid Blogging: Ram’s Horn Squid Video
From Schneier on Security

Friday Squid Blogging: Ram’s Horn Squid Video

This is the first video footage of a ram’s horn squid (Spirula spirula) . As usual, you can also use this squid post to talk about the security stories in the news...

Tracking Users on Waze
From Schneier on Security

Tracking Users on Waze

A security researcher discovered a wulnerability in Waze that breaks the anonymity of users: I found out that I can visit Waze from any web browser at waze.com/livemap...

Friday Squid Blogging: Underwater Robot Uses Squid-Like Propulsion
From Schneier on Security

Friday Squid Blogging: Underwater Robot Uses Squid-Like Propulsion

This is neat: By generating powerful streams of water, UCSD’s squid-like robot can swim untethered. The “squidbot” carries its own power source, and has the room...

The NSA is Refusing to Disclose its Policy on Backdooring Commercial Products
From Schneier on Security

The NSA is Refusing to Disclose its Policy on Backdooring Commercial Products

Senator Ron Wyden asked, and the NSA didn’t answer: The NSA has long sought agreements with technology companies under which they would build special access for...

Reverse-Engineering the Redactions in the Ghislaine Maxwell Deposition
From Schneier on Security

Reverse-Engineering the Redactions in the Ghislaine Maxwell Deposition

Slate magazine was able to cleverly read the Ghislaine Maxwell deposition and reverse-engineer many of the redacted names. We’ve long known that redacting is hard...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account