acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Correspondence Between the NSA and Google Leaked
From Schneier on Security

Correspondence Between the NSA and Google Leaked

Al Jazeera is reporting on leaked emails (not leaked by Snowden, but by someone else) detailing close ties between the NSA and Google. There are no smoking guns...

Fearing Google
From Schneier on Security

Fearing Google

Mathias Dopfner writes an open letter explaining why he fears Google: We know of no alternative which could offer even partially comparable technological prerequisites...

The Economics of Video Game Cheating
From Schneier on Security

The Economics of Video Game Cheating

Interesting article on the business of selling enhancements that allow you to cheat in online video games....

Friday Squid Blogging: How Flying Squid Fly
From Schneier on Security

Friday Squid Blogging: How Flying Squid Fly

Someone has finally proven how: How do these squid go from swimming to flying? Four phases of flight are described in the research: launching, jetting, gliding...

Unusual Electronic Voting Machine Threat Model
From Schneier on Security

Unusual Electronic Voting Machine Threat Model

Rats have destroyed dozens of electronic voting machines by eating the cables. It would have been a better story if the rats had zeroed out the machines after the...

Analysis of the FBI's Failure to Stop the Boston Marathon Bombings
From Schneier on Security

Analysis of the FBI's Failure to Stop the Boston Marathon Bombings

Detailed response and analysis of the inspectors general report on the Boston Marathon bombings: Two opposite mistakes in an after-the-fact review of a terrorist...

Really Weird Keith Alexander Interview
From Schneier on Security

Really Weird Keith Alexander Interview

Comedian John Oliver interviewed now-retired NSA director General Keith Alexander. It's truly weird....

The Federal Reserve System's Cyberdefense Force
From Schneier on Security

The Federal Reserve System's Cyberdefense Force

Interesting article on the cybersecurity branch of the Federal Reserve System....

Tracking People from Smartphone Accelerometers
From Schneier on Security

Tracking People from Smartphone Accelerometers

It's been long known that individual analog devices have their own fingerprints. Decades ago, individual radio transmitters were identifiable and trackable. Now...

The Quantified Toilet Hoax
From Schneier on Security

The Quantified Toilet Hoax

Good essay on the Quantified Toilet hoax, and the difference between public surveillance and private self-surveillance....

Details of Apple's Fingerprint Recognition
From Schneier on Security

Details of Apple's Fingerprint Recognition

This is interesting: Touch ID takes a 88x88 500ppi scan of your finger and temporarily sends that data to a secure cache located near the RAM, after the data is...

A New Pencil-and-Paper Encryption Algorithm
From Schneier on Security

A New Pencil-and-Paper Encryption Algorithm

Handycipher is a new pencil-and-paper symmetric encryption algorithm. I'd bet a gazillion dollars that it's not secure, although I haven't done the cryptanalysis...

Friday Squid Blogging: New Squid Exhibit at the Monterey Bay Aquarium.
From Schneier on Security

Friday Squid Blogging: New Squid Exhibit at the Monterey Bay Aquarium.

It's called "Tentacles." As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Is Google Too Big to Trust?
From Schneier on Security

Is Google Too Big to Trust?

Interesting essay about how Google's lack of transparency is hurting their trust: The reality is that Google's business is and has always been about mining as much...

Conversnitch
From Schneier on Security

Conversnitch

Surveillance is getting cheaper and easier: Two artists have revealed Conversnitch, a device they built for less than $100 that resembles a lightbulb or lamp and...

The Security of Various Programming Languages
From Schneier on Security

The Security of Various Programming Languages

Interesting research on the security of code written in different programming languages. We don't know whether the security is a result of inherent properties of...

Dan Geer on Heartbleed and Software Monocultures
From Schneier on Security

Dan Geer on Heartbleed and Software Monocultures

Good essay: To repeat, Heartbleed is a common mode failure. We would not know about it were it not open source (Good). That it is open source has been shown to...

Info on Russian Bulk Surveillance
From Schneier on Security

Info on Russian Bulk Surveillance

Good information: Russian law gives Russia’s security service, the FSB, the authority to use SORM (“System for Operative Investigative Activities”) to collect,...

Friday Squid Blogging: Squid Jigging
From Schneier on Security

Friday Squid Blogging: Squid Jigging

Good news from Malaysia: The Terengganu International Squid Jigging Festival (TISJF) will be continued and become an annual event as one of the state's main tourism...

Metaphors of Surveillance
From Schneier on Security

Metaphors of Surveillance

There's a new study looking at the metaphors we use to describe surveillance. Over 62 days between December and February, we combed through 133 articles by 105...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account