acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Friday Squid Blogging: How Bacteria Terraform a Squid
From Schneier on Security

Friday Squid Blogging: How Bacteria Terraform a Squid

Fascinating: The bacterium Vibrio fischeri is a squid terraformer. Although it can live independently in seawater, it also colonises the body of the adorable Hawaiian...

Legally Justifying NSA Surveillance of Americans
From Schneier on Security

Legally Justifying NSA Surveillance of Americans

Kit Walsh has an interesting blog post where he looks at how existing law can be used to justify the surveillance of Americans. Just to challenge ourselves, we'll...

Google Knows Every Wi-Fi Password in the World
From Schneier on Security

Google Knows Every Wi-Fi Password in the World

This article points out that as people are logging into Wi-Fi networks from their Android phones, and backing up those passwords along with everything else into...

Yochai Benkler on the NSA
From Schneier on Security

Yochai Benkler on the NSA

Excellent essay: We have learned that in pursuit of its bureaucratic mission to obtain signals intelligence in a pervasively networked world, the NSA has mounted...

The Limitations of Intelligence
From Schneier on Security

The Limitations of Intelligence

We recently learned that US intelligence agencies had at least three days' warning that Syrian President Bashar al-Assad was preparing to launch a chemical attack...

Surreptitiously Tampering with Computer Chips
From Schneier on Security

Surreptitiously Tampering with Computer Chips

This is really interesting research: "Stealthy Dopant-Level Hardware Trojans." Basically, you can tamper with a logic gate to be either stuck-on or stuck-off by...

Tom Tomorrow from 1994
From Schneier on Security

Tom Tomorrow from 1994

This was published during the battle about the Clipper Chip, and is remarkably prescient.

Reforming the NSA
From Schneier on Security

Reforming the NSA

Leaks from the whistleblower Edward Snowden have catapulted the NSA into newspaper headlines and demonstrated that it has become one of the most powerful government...

Take Back the Internet
From Schneier on Security

Take Back the Internet

Government and industry have betrayed the Internet, and us. By subverting the Internet at every level to make it a vast, multi-layered and robust surveillanceWe...

How to Remain Secure Against the NSA
From Schneier on Security

How to Remain Secure Against the NSA

Now that we have enough details about how the >NSA eavesdrops on the Internet, including today's disclosures of the NSA's deliberate weakening of cryptographicits...

Friday Squid Blogging: Squid Fishing in the Cook Islands
From Schneier on Security

Friday Squid Blogging: Squid Fishing in the Cook Islands

Diamondback squid could be a source of food. No word on taste. As usual, you can also use this squid post to talk about the security stories in the news that...

Radio Interviews with Me
From Schneier on Security

Radio Interviews with Me

Four interviews with me on the NSA.

New NSA Leak Shows MITM Attacks Against Major Internet Services
From Schneier on Security

New NSA Leak Shows MITM Attacks Against Major Internet Services

The Brazilian television show "Fantastico" has exposed an NSA training presentation that discusses how the agency runs man-in-the-middle attacks on the Internet...

Did I Actually Say That?
From Schneier on Security

Did I Actually Say That?

I'm quoted (also here) as using this analogy to explain how IT companies will be damaged by the news that they've been collaborating with the NSA: "How would it...

Ed Felten on the NSA Disclosures
From Schneier on Security

Ed Felten on the NSA Disclosures

Ed Felten has an excellent essay on the damage caused by the NSA secretly breaking the security of Internet systems: In security, the worst case -- the thing you...

Matthew Green Speculates on How the NSA Defeats Encryption
From Schneier on Security

Matthew Green Speculates on How the NSA Defeats Encryption

This blog post is well worth reading, and not just because Johns Hopkins University asked him to remove it, and then backed down a few hours later.

iPhone Fingerprint Authentication
From Schneier on Security

iPhone Fingerprint Authentication

When Apple bought AuthenTec for its biometrics technology -- reported as one of its most expensive purchases -- there was a lot of speculation about how the company...

The TSA Is Legally Allowed to Lie to Us
From Schneier on Security

The TSA Is Legally Allowed to Lie to Us

The TSA does not have to tell the truth: Can the TSA (or local governments as directed by the TSA) lie in response to a FOIA request? Sure, no problem! Evenclassified...

Government Secrecy and the Generation Gap
From Schneier on Security

Government Secrecy and the Generation Gap

Big-government secrets require a lot of secret-keepers. As of October 2012, almost 5m people in the US have security clearances, with 1.4m at the top-secret level...

Excess Automobile Deaths as a Result of 9/11
From Schneier on Security

Excess Automobile Deaths as a Result of 9/11

People commented about a point I made in a recent essay: In the months after 9/11, so many people chose to drive instead of fly that the resulting deaths dwarfed...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account