acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Evading Internet Censorship
From Schneier on Security

Evading Internet Censorship

This research project by Brandon Wiley -- the tool is called "Dust" -- looks really interesting. Here's the description of his Defcon talk: Abstract: The greatest...

More on NSA Data Collection
From Schneier on Security

More on NSA Data Collection

There's an article from Wednesday's Wall Street Journal that gives more details about the NSA's data collection efforts. The system has the capacity to reach roughly...

Detaining David Miranda
From Schneier on Security

Detaining David Miranda

Last Sunday, David Miranda was detained while changing planes at London Heathrow Airport by British authorities for nine hours under a controversial British law...

Protecting Against Leakers
From Schneier on Security

Protecting Against Leakers

Ever since Edward Snowden walked out of a National Security Agency facility in May with electronic copies of thousands of classified documents, the finger-pointing...

"The Next Generation Communications Privacy Act"
From Schneier on Security

"The Next Generation Communications Privacy Act"

Orin Kerr envisions what the ECPA should look like today: Abstract: In 1986, Congress enacted the Electronic Communications Privacy Act (ECPA) to regulate government...

Friday Squid Blogging: New Research in How Squids Change Color
From Schneier on Security

Friday Squid Blogging: New Research in How Squids Change Color

Interesting: Structural colors rely exclusively on the density and shape of the material rather than its chemical properties. The latest research from the UCSB...

How Security Becomes Banal
From Schneier on Security

How Security Becomes Banal

Interesting paper: "The Banality of Security: The Curious Case of Surveillance Cameras," by Benjamin Goold, Ian Loader, and Angélica Thumala (full paper is behind...

Hacking Consumer Devices
From Schneier on Security

Hacking Consumer Devices

Last weekend, a Texas couple apparently discovered that the electronic baby monitor in their children's bedroom had been hacked. According to a local TV station...

Susan Landau Article on the Snowden Documents
From Schneier on Security

Susan Landau Article on the Snowden Documents

Really good article by Susan Landau on the Snowden documents and what they mean.

Measuring Entropy and its Applications to Encryption
From Schneier on Security

Measuring Entropy and its Applications to Encryption

There have been a bunch of articles about an information theory paper with vaguely sensational headlines like "Encryption is less secure than we thought" and "Research...

Teens and Privacy
From Schneier on Security

Teens and Privacy

Not much surprising in this new survey. Many teens ages 12-17 report that they usually figure out how to manage content sharing and privacy settings on their own...

The Cryptopocalypse
From Schneier on Security

The Cryptopocalypse

There was a presentation at Black Hat last month warning us of a "factoring cryptopocalypse": a moment when factoring numbers and solving the discrete log problem...

Friday Squid Blogging: Squid Ink as Food Coloring
From Schneier on Security

Friday Squid Blogging: Squid Ink as Food Coloring

Alton Brown suggests it for ice cream. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

<i>Wired</i> Names "Schneier on Security" to Best Blog List
From Schneier on Security

Wired Names "Schneier on Security" to Best Blog List

I made the list of Wired's best "Government and Security" blogs.

Management Issues in Terrorist Organizations
From Schneier on Security

Management Issues in Terrorist Organizations

Terrorist organizations have the same management problems as other organizations, and new ones besides: Terrorist leaders also face a stubborn human resources...

The NSA is Commandeering the Internet
From Schneier on Security

The NSA is Commandeering the Internet

It turns out that the NSA's domestic and world-wide surveillance apparatus is even more extensive than we thought. Bluntly: The government has commandeered the...

<i>Time</i> Magazine Names "Schneier on Security" to Best Blog List
From Schneier on Security

Time Magazine Names "Schneier on Security" to Best Blog List

My blog as made the Time magazine "The 25 Best Bloggers 2013 Edition" list. I can't believe this was published ten days ago, and I'm only just finding out about...

Stories from MI5
From Schneier on Security

Stories from MI5

This essay is filled historical MI5 stories -- often bizarre, sometimes amusing. My favorite: It was recently revealed that back in the 1970s -- at the height...

Circumventing Communications Blackouts
From Schneier on Security

Circumventing Communications Blackouts

Rangzen looks like a really interesting ad hoc mesh networking system to circumvent government-imposed communications blackouts. I am particularly interested in...

Book Review: <i>Rise of the Warrior Cop</i>
From Schneier on Security

Book Review: Rise of the Warrior Cop

Rise of the Warrior Cop: The Militarization of America's Police Forces, by Radley Balko, PublicAffairs, 2013, 400 pages. War as a rhetorical concept is firmly...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account