acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Friday Squid Blogging: Kim Jong Un Tours Frozen Squid Factory
From Schneier on Security

Friday Squid Blogging: Kim Jong Un Tours Frozen Squid Factory

Frozen squid makes him happy. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Operation Vula
From Schneier on Security

Operation Vula

"Talking to Vula" is the story of a 1980s secret communications channel between black South African leaders and others living in exile in the UK. The system used...

Christmas Comic
From Schneier on Security

Christmas Comic

Amusing.

Report on Syrian Malware
From Schneier on Security

Report on Syrian Malware

Fascinating report from Citizen Lab on the use of malware in the current Syrian conflict (EFF summary and Wired article).

NSA Spying: Who Do You Believe?
From Schneier on Security

NSA Spying: Who Do You Believe?

On Friday, Reuters reported that RSA entered a secret contract to make DUAL_EC_PRNG the default random number generator in the BSAFE toolkit. DUA_EC_PRNG is now...

Friday Squid Blogging: "What Does the Squid Say?"
From Schneier on Security

Friday Squid Blogging: "What Does the Squid Say?"

Minecraft parody. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Yes, I'm Leaving BT
From Schneier on Security

Yes, I'm Leaving BT

The Register reported that I am leaving BT at the end of the year. It quoted BT as saying: We hired Bruce because of his thought leadership in security and as...

Eben Moglen and I Talk about the NSA
From Schneier on Security

Eben Moglen and I Talk about the NSA

Last week, Eben Moglen and I had a conversation about NSA surveillance. Audio and video are online.

Acoustic Cryptanalysis
From Schneier on Security

Acoustic Cryptanalysis

This is neat: Here, we describe a new acoustic cryptanalysis key extraction attack, applicable to GnuPG's current implementation of RSA. The attack can extract...

Tor User Identified by FBI
From Schneier on Security

Tor User Identified by FBI

Eldo Kim sent an e-mail bomb threat to Harvard so he could skip a final exam. (It's just a coincidence that I was on the Harvard campus that day.) Even though...

Security Vulnerabilities of Legacy Code
From Schneier on Security

Security Vulnerabilities of Legacy Code

An interesting research paper documents a "honeymoon effect" when it comes to software and vulnerabilities: attackers are more likely to find vulnerabilities in...

Attacking Online Poker Players
From Schneier on Security

Attacking Online Poker Players

This story is about how at least two professional online poker players had their hotel rooms broken into and their computers infected with malware. I agree with...

Friday Squid Blogging: Squid Bow Tie
From Schneier on Security

Friday Squid Blogging: Squid Bow Tie

Snappy-looking bow tie. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

President Obama and the Intelligence Community
From Schneier on Security

President Obama and the Intelligence Community

Really good article from the New Yorker.

World War II Anecdote about Trust and Security
From Schneier on Security

World War II Anecdote about Trust and Security

This is an interesting story from World War II about trust: Jones notes that the Germans doubted their system because they knew the British could radio false orders...

How the NSA Tracks Mobile Phone Data
From Schneier on Security

How the NSA Tracks Mobile Phone Data

Last week the Washington Post reported on how the NSA tracks mobile phones world-wide, and this week they followed up with source documents and more detail. Barton...

NSA Tracks People Using Google Cookies
From Schneier on Security

NSA Tracks People Using Google Cookies

The Washington Post has a detailed article on how the NSA uses cookie data to track individuals. The EFF also has a good post on this. I have been writing and...

NSA Spying on Online Gaming Worlds
From Schneier on Security

NSA Spying on Online Gaming Worlds

The NSA is spying on chats in World of Warcraft and other games. There's lots of information -- and a good source document. While it's fun to joke about the NSA...

Bitcoin Explanation
From Schneier on Security

Bitcoin Explanation

This is the best explanation of the Bitcoin protocol that I have read.

Friday Squid Blogging: Hoax Squid-Like Creature
From Schneier on Security

Friday Squid Blogging: Hoax Squid-Like Creature

The weird squid-like creature floating around Bristol Harbour is a hoax. As usual, you can also use this squid post to talk about the security stories in the news...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account