acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID
From Schneier on Security

How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID

The online anonymity network Tor is a high-priority target for the National Security Agency. The work of attacking Tor is done by the NSA's application vulnerabilities...

Friday Squid Blogging: Squid Exhibit at the Monterey Bay Aquarium
From Schneier on Security

Friday Squid Blogging: Squid Exhibit at the Monterey Bay Aquarium

Opens spring 2014. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

"Trust the Math"
From Schneier on Security

"Trust the Math"

I like this piece of art. Someone should do T-shirts.

Developments in Microphone Technology
From Schneier on Security

Developments in Microphone Technology

What's interesting is that this matchstick-sized microphone can be attached to drones. Conventional microphones work when sound waves make a diaphragm move, creating...

Is Cybersecurity a Profession?
From Schneier on Security

Is Cybersecurity a Profession?

A National Academy of Sciences panel says no: Sticking to the quality control aspect of the report, professionalization, it says, has the potential to attractreport...

On Anonymous
From Schneier on Security

On Anonymous

Gabriella Coleman has published an interesting analysis of the hacker group Anonymous: Abstract: Since 2010, digital direct action, including leaks, hacking and...

On Secrecy
From Schneier on Security

On Secrecy

"When everything is classified, then nothing is classified." I should suppose that moral, political, and practical considerations would dictate that a very first...

My TEDx Talk
From Schneier on Security

My TEDx Talk

I spoke at TEDxCambridge last month on security and power. Here's the video.

NSA Storing Internet Data, Social Networking Data, on Pretty Much Everybody
From Schneier on Security

NSA Storing Internet Data, Social Networking Data, on Pretty Much Everybody

Two new stories based on the Snowden documents. This is getting silly. General Alexander just lied about this to Congress last week. The old NSA tactic of hiding...

Will Keccak = SHA-3?
From Schneier on Security

Will Keccak = SHA-3?

Last year, NIST selected Keccak as the winner of the SHA-3 hash function competition. Yes, I would have rather my own Skein had won, but it was a good choice. ...

WhoIs Privacy and Proxy Service Abuse
From Schneier on Security

WhoIs Privacy and Proxy Service Abuse

ICANN has a draft study that looks at abuse of the Whois database. This study, conducted by the National Physical Laboratory (NPL) in the United Kingdom, analyzes...

Senator Feinstein Admits the NSA Taps the Internet Backbone
From Schneier on Security

Senator Feinstein Admits the NSA Taps the Internet Backbone

We know from the Snowden documents (and other sources) that the NSA taps Internet backbone through secret-agreements with major U.S. telcos., but the U.S. government...

Friday Squid Blogging: A Squid that Fishes
From Schneier on Security

Friday Squid Blogging: A Squid that Fishes

The Grimalditeuthis bonplandi is the only known squid to use its tenticles to fish: Its tentacles are thin and fragile, and almost always break off when it's captured...

Another Schneier Interview
From Schneier on Security

Another Schneier Interview

I was interviewed for Technology Review on the NSA and the Snowden documents.

3D-Printed Robot to Break Android PINs
From Schneier on Security

3D-Printed Robot to Break Android PINs

Neat project. The reason it works is that the Android system doesn't start putting in very long delays between PIN attempts after a whole bunch of unsuccessful...

Paradoxes of Big Data
From Schneier on Security

Paradoxes of Big Data

Interesting paper: "Three Paradoxes of Big Data," by Neil M. Richards and Jonathan H. King, Stanford Law Review Online, 2013. Abstract: Big data is all the rage...

Good Summary of Potential NSA Involvement in a NIST RNG Standard
From Schneier on Security

Good Summary of Potential NSA Involvement in a NIST RNG Standard

Kim Zetter has written the definitive story -- at least so far -- of the possible backdoor in the Dual_EC_DRBG random number generator that's part of the NIST SP800...

Apple's iPhone Fingerprint Reader Successfully Hacked
From Schneier on Security

Apple's iPhone Fingerprint Reader Successfully Hacked

Nice hack from the Chaos Computer Club: The method follows the steps outlined in this how-to with materials that can be found in almost every household: First,...

NSA Job Opening
From Schneier on Security

NSA Job Opening

The NSA is looking for a Civil Liberties & Privacy Officer. It appears to be an internal posting. The NSA Civil Liberties & Privacy Officer (CLPO) is conceived...

Metadata Equals Surveillance
From Schneier on Security

Metadata Equals Surveillance

Back in June, when the contents of Edward Snowden's cache of NSA documents were just starting to be revealed and we learned about the NSA collecting phone metadata...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account