acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Apple's iMessage Encryption Seems to Be Pretty Good
From Schneier on Security

Apple's iMessage Encryption Seems to Be Pretty Good

The U.S. Drug Enforcement Agency has complained (in a classified report, not publicly) that Apple's iMessage end-to-end encryption scheme can't be broken. On the...

Skein Collision Competition
From Schneier on Security

Skein Collision Competition

Xkcd had a Skein collision competition. The contest is over -- Carnegie Mellon University won, with 384 (out of 1024) mismatched bits -- but it's explained here...

NSA Crossword Puzzles
From Schneier on Security

NSA Crossword Puzzles

Two puzzles from a 1977 issue of Cryptolog.

IT for Oppression
From Schneier on Security

IT for Oppression

Whether it's Syria using Facebook to help identify and arrest dissidents or China using its "Great Firewall" to limit access to international news throughout the...

Narratives of Secrecy
From Schneier on Security

Narratives of Secrecy

How people talked about the secrecy surrounding the Manhattan project.

Sixth Movie-Plot Threat Contest
From Schneier on Security

Sixth Movie-Plot Threat Contest

It's back, after a two-year hiatus. Terrorism is boring; cyberwar is in. Cyberwar, and its kin: cyber Pearl Harbor, cyber 9/11, cyber Armageddon. (Or make up...

What I've Been Thinking About
From Schneier on Security

What I've Been Thinking About

I'm starting to think about my next book, which will be about power and the Internet -- from the perspective of security. My objective will be to describe current...

Friday Squid Blogging: Bomb Discovered in Squid at Market
From Schneier on Security

Friday Squid Blogging: Bomb Discovered in Squid at Market

Really: An unexploded bomb was found inside a squid when the fish was slaughtered at a fish market in Guangdong province. Oddly enough, this doesn't seem to be...

The Dangers of Surveillance
From Schneier on Security

The Dangers of Surveillance

Interesting article, "The Dangers of Surveillance," by Neil M. Richards, Harvard Law Review, 2013. From the abstract: ....We need a better account of the dangers...

New RC4 Attack
From Schneier on Security

New RC4 Attack

This is a really clever attack on the RC4 encryption algorithm as used in TLS. We have found a new attack against TLS that allows an attacker to recover a limited...

Unwitting Drug Smugglers
From Schneier on Security

Unwitting Drug Smugglers

This is a story about a physicist who got taken in by an imaginary Internet girlfriend and ended up being arrested in Argentina for drug smuggling. Readers of...

Security Awareness Training
From Schneier on Security

Security Awareness Training

Should companies spend money on security awareness training for their employees? It's a contentious topic, with respected experts on both sides of the debate.right...

The NSA's Cryptolog
From Schneier on Security

The NSA's Cryptolog

The NSA has published declassified versions of its Cryptolog newsletter. All the issues from Aug 1974 through Summer 1997 are on the web, although there are some...

Identifying People from Mobile Phone Location Data
From Schneier on Security

Identifying People from Mobile Phone Location Data

Turns out that it's pretty easy: Researchers at the Massachusetts Institute of Technology (MIT) and the Catholic University of Louvain studied 15 months' worth...

Our Internet Surveillance State
From Schneier on Security

Our Internet Surveillance State

I'm going to start with three data points. One: Some of the Chinese military hackers who were implicated in a broad set of attacks against the U.S. governmentaccessed...

Friday Squid Blogging: Giant Squid Genetics
From Schneier on Security

Friday Squid Blogging: Giant Squid Genetics

Despite looking very different from each other and being distributed across the world's oceans, all giant squid are the same species. There's also not a lot of...

Changes to the Blog
From Schneier on Security

Changes to the Blog

I have made a few changes to my blog that I'd like to talk about. The first is the various buttons associated with each post: a Facebook Like button, a Retweet...

FBI Secretly Spying on Cloud Computer Users
From Schneier on Security

FBI Secretly Spying on Cloud Computer Users

Both Google and recently ruled National Security Letters unconstitutional. Not that this changes anything yet.

Text Message Retention Policies
From Schneier on Security

Text Message Retention Policies

The FBI wants cell phone carriers to store SMS messages for a long time, enabling them to conduct surveillance backwards in time. Nothing new there -- data retention...

When Technology Overtakes Security
From Schneier on Security

When Technology Overtakes Security

A core, not side, effect of technology is its ability to magnify power and multiply force -- for both attackers and defenders. One side creates ceramic handguns...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account