acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Walls Around Nations
From Schneier on Security

Walls Around Nations

A political history of walls: Roman walls such as Hadrian's Wall, the Great Wall of China, the Berlin Wall, and the wall between Mexico and the U.S. Moral: they...

My Fellowship at the Berkman Center
From Schneier on Security

My Fellowship at the Berkman Center

I have been awarded a fellowship at the Berkman Center for Internet and Society at Harvard University, for the 2013–2014 academic year. I'm excited about this;...

Friday Squid Blogging: Squid–Bacteria Symbiotic Relationships
From Schneier on Security

Friday Squid Blogging: Squid–Bacteria Symbiotic Relationships

This is really interesting research. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

F2P Monetization Tricks
From Schneier on Security

F2P Monetization Tricks

This is a really interesting article about something I never even thought about before: how games ("F2P" means "free to play") trick players into paying for stuff...

More NSA Code Names
From Schneier on Security

More NSA Code Names

We don't know what they mean, but there are a bunch of NSA code names on LinkedIn profiles. ANCHORY, AMHS, NUCLEON, TRAFFICTHIEF, ARCMAP, SIGNAV, COASTLINE, DISHFIRE...

The NSA's Project SHAMROCK
From Schneier on Security

The NSA's Project SHAMROCK

Nice history of Project SHAMROCK, the NSA's illegal domestic surveillance program from the 1970s. It targeted telegrams.

Musing on Secret Languages
From Schneier on Security

Musing on Secret Languages

This is really interesting. It starts by talking about a "cant" dictionary of 16th-century thieves' argot, and ends up talking about secret languages in general...

The Effectiveness of Privacy Audits
From Schneier on Security

The Effectiveness of Privacy Audits

This study concludes that there is a benefit to forcing companies to undergo privacy audits: "The results show that there are empirical regularities consistent...

Another Perspective on the Value of Privacy
From Schneier on Security

Another Perspective on the Value of Privacy

A philosophical perspective: But while Descartes's overall view has been rightly rejected, there is something profoundly right about the connection between privacy...

Big Data Surveillance Results in Bad Policy
From Schneier on Security

Big Data Surveillance Results in Bad Policy

Evgeny Morozov makes a point about surveillance and big data: it just looks for useful correlations without worrying about causes, and leads people to implement...

Protecting E-Mail from Eavesdropping
From Schneier on Security

Protecting E-Mail from Eavesdropping

In the wake of the Snowden NSA documents, reporters have been asking me whether encryption can solve the problem. Leaving aside the fact that much of what theadvice...

Friday Squid Blogging: Giant Origami Squid
From Schneier on Security

Friday Squid Blogging: Giant Origami Squid

Giant origami squid photo found -- without explanation -- on Reddit. As usual, you can also use this squid post to talk about the security stories in the news...

How Apple Continues to Make Security Invisible
From Schneier on Security

How Apple Continues to Make Security Invisible

Interesting article: Apple is famously focused on design and human experience as their top guiding principles. When it comes to security, that focus created a...

Sixth Movie-Plot Threat Contest Winner
From Schneier on Security

Sixth Movie-Plot Threat Contest Winner

On April 1, I announced the Sixth Mostly-Annual Movie-Plot Threat Contest: For this year's contest, I want a cyberwar movie-plot threat. (For those who don't know...

Is Cryptography Engineering or Science?
From Schneier on Security

Is Cryptography Engineering or Science?

Responding to a tweet by Thomas Ptacek saying, "If you're not learning crypto by coding attacks, you might not actually be learning crypto," Colin Percival published...

The Office of the Director of National Intelligence Defends NSA Surveillance Programs
From Schneier on Security

The Office of the Director of National Intelligence Defends NSA Surveillance Programs

Here's a transcript of a panel discussion about NSA surveillance. There's a lot worth reading here, but I want to quote Bob Litt's opening remarks. He's the General...

Privacy Protests
From Schneier on Security

Privacy Protests

Interesting law journal article: "Privacy Protests: Surveillance Evasion and Fourth Amendment Suspicion," by Elizabeth E. Joh. Abstract: The police tend to think...

US Department of Defense Censors Snowden Story
From Schneier on Security

US Department of Defense Censors Snowden Story

The US Department of Defense is blocking sites that are reporting about the Snowden documents. I presume they're not censoring sites that are smearing him personally...

Security Analysis of Children
From Schneier on Security

Security Analysis of Children

This is a really good paper describing the unique threat model of children in the home, and the sorts of security philosophies that are effective in dealing with...

NSA E-Mail Eavesdropping
From Schneier on Security

NSA E-Mail Eavesdropping

More Snowden documents analyzed by the Guardian -- two articles -- discuss how the NSA collected e-mails and data on Internet activity of both Americans and foreigners...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account