acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Google Knows Every Wi-Fi Password in the World
From Schneier on Security

Google Knows Every Wi-Fi Password in the World

This article points out that as people are logging into Wi-Fi networks from their Android phones, and backing up those passwords along with everything else into...

Yochai Benkler on the NSA
From Schneier on Security

Yochai Benkler on the NSA

Excellent essay: We have learned that in pursuit of its bureaucratic mission to obtain signals intelligence in a pervasively networked world, the NSA has mounted...

The Limitations of Intelligence
From Schneier on Security

The Limitations of Intelligence

We recently learned that US intelligence agencies had at least three days' warning that Syrian President Bashar al-Assad was preparing to launch a chemical attack...

Surreptitiously Tampering with Computer Chips
From Schneier on Security

Surreptitiously Tampering with Computer Chips

This is really interesting research: "Stealthy Dopant-Level Hardware Trojans." Basically, you can tamper with a logic gate to be either stuck-on or stuck-off by...

Tom Tomorrow from 1994
From Schneier on Security

Tom Tomorrow from 1994

This was published during the battle about the Clipper Chip, and is remarkably prescient.

Reforming the NSA
From Schneier on Security

Reforming the NSA

Leaks from the whistleblower Edward Snowden have catapulted the NSA into newspaper headlines and demonstrated that it has become one of the most powerful government...

Take Back the Internet
From Schneier on Security

Take Back the Internet

Government and industry have betrayed the Internet, and us. By subverting the Internet at every level to make it a vast, multi-layered and robust surveillanceWe...

How to Remain Secure Against the NSA
From Schneier on Security

How to Remain Secure Against the NSA

Now that we have enough details about how the >NSA eavesdrops on the Internet, including today's disclosures of the NSA's deliberate weakening of cryptographicits...

Friday Squid Blogging: Squid Fishing in the Cook Islands
From Schneier on Security

Friday Squid Blogging: Squid Fishing in the Cook Islands

Diamondback squid could be a source of food. No word on taste. As usual, you can also use this squid post to talk about the security stories in the news that...

Radio Interviews with Me
From Schneier on Security

Radio Interviews with Me

Four interviews with me on the NSA.

New NSA Leak Shows MITM Attacks Against Major Internet Services
From Schneier on Security

New NSA Leak Shows MITM Attacks Against Major Internet Services

The Brazilian television show "Fantastico" has exposed an NSA training presentation that discusses how the agency runs man-in-the-middle attacks on the Internet...

Did I Actually Say That?
From Schneier on Security

Did I Actually Say That?

I'm quoted (also here) as using this analogy to explain how IT companies will be damaged by the news that they've been collaborating with the NSA: "How would it...

Ed Felten on the NSA Disclosures
From Schneier on Security

Ed Felten on the NSA Disclosures

Ed Felten has an excellent essay on the damage caused by the NSA secretly breaking the security of Internet systems: In security, the worst case -- the thing you...

Matthew Green Speculates on How the NSA Defeats Encryption
From Schneier on Security

Matthew Green Speculates on How the NSA Defeats Encryption

This blog post is well worth reading, and not just because Johns Hopkins University asked him to remove it, and then backed down a few hours later.

iPhone Fingerprint Authentication
From Schneier on Security

iPhone Fingerprint Authentication

When Apple bought AuthenTec for its biometrics technology -- reported as one of its most expensive purchases -- there was a lot of speculation about how the company...

The TSA Is Legally Allowed to Lie to Us
From Schneier on Security

The TSA Is Legally Allowed to Lie to Us

The TSA does not have to tell the truth: Can the TSA (or local governments as directed by the TSA) lie in response to a FOIA request? Sure, no problem! Evenclassified...

Government Secrecy and the Generation Gap
From Schneier on Security

Government Secrecy and the Generation Gap

Big-government secrets require a lot of secret-keepers. As of October 2012, almost 5m people in the US have security clearances, with 1.4m at the top-secret level...

Excess Automobile Deaths as a Result of 9/11
From Schneier on Security

Excess Automobile Deaths as a Result of 9/11

People commented about a point I made in a recent essay: In the months after 9/11, so many people chose to drive instead of fly that the resulting deaths dwarfed...

My New PGP/GPG and OTR Keys
From Schneier on Security

My New PGP/GPG and OTR Keys

You can find my new PGP public key and my OTR key fingerprint here.

Friday Squid Blogging: Giant Squid Found Off the Coast of Spain
From Schneier on Security

Friday Squid Blogging: Giant Squid Found Off the Coast of Spain

The incomplete specimen weighs over 160 lbs. And here's a map of squid spottings. As usual, you can also use this squid post to talk about the security stories...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account