acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

New Jersey Allows Voting by E-Mail
From Schneier on Security

New Jersey Allows Voting by E-Mail

I'm not filled with confidence, but this seems like the best of a bunch of bad alternatives.

New WWII Cryptanalysis
From Schneier on Security

New WWII Cryptanalysis

I'd sure like to know more about this: Government code-breakers are working on deciphering a message that has remained a secret for 70 years. It was found onSome...

On the Ineffectiveness of Airport Security Pat-Downs
From Schneier on Security

On the Ineffectiveness of Airport Security Pat-Downs

I've written about it before, but not half as well as this story: "That search was absolutely useless." I said. "And just shows how much of all of this is security...

Loopholes
From Schneier on Security

Loopholes

Interesting This American Life show on loopholes. The first part is about getting around the Church's ban against suicide. The second part is about an interesting...

Friday Squid Blogging: Squid Costume
From Schneier on Security

Friday Squid Blogging: Squid Costume

This is great.

Peter Neumann Profile
From Schneier on Security

Peter Neumann Profile

Really nice profile in the New York Times. It includes a discussion of the Clean Slate program: Run by Dr. Howard Shrobe, an M.I.T. computer scientist who is...

Doping in Professional Sports
From Schneier on Security

Doping in Professional Sports

I updated a 2006 essay of mine on the security issues around sports doping.

Rap News on Internet Surveillance
From Schneier on Security

Rap News on Internet Surveillance

Wow.

Dan Ariely on Dishonesty
From Schneier on Security

Dan Ariely on Dishonesty

Good talk, and I've always liked these animators.

Detecting Fake Hurricane Photographs
From Schneier on Security

Detecting Fake Hurricane Photographs

A short tutorial here. Actually, it's good advice even if there weren't a hurricane.

Protecting (and Collecting) the DNA of World Leaders
From Schneier on Security

Protecting (and Collecting) the DNA of World Leaders

There's a lot of hype and hyperbole in this story, but here's the interesting bit: According to Ronald Kessler, the author of the 2009 book In the President’s,...

Sony Playstation 3 Master Key Leaked
From Schneier on Security

Sony Playstation 3 Master Key Leaked

Oops.

Friday Squid Blogging: Squid from the Power Ranger Universe
From Schneier on Security

Friday Squid Blogging: Squid from the Power Ranger Universe

Ika Origami.

Hacking TSA PreCheck
From Schneier on Security

Hacking TSA PreCheck

I have a hard time getting worked up about this story: I have X'd out any information that you could use to change my reservation. But it's all there, PNR, seat...

The Risks of Trusting Experts
From Schneier on Security

The Risks of Trusting Experts

I'm not sure what to think about this story: Six Italian scientists and an ex-government official have been sentenced to six years in prison over the 2009 deadly...

Risks of Data Portability
From Schneier on Security

Risks of Data Portability

Peter Swire and Yianni Lagos have pre-published a law journal article on the risks of data portability. It specifically addresses an EU data protection regulation...

Weaponizing Office Supplies
From Schneier on Security

Weaponizing Office Supplies

Now this is interesting.

Camera Jammer that Protects Licence Plates
From Schneier on Security

Camera Jammer that Protects Licence Plates

noPhoto reacts to a camera flash, and then jams the image with a bright light. The website makes the point that this is legal, but that can't last.

Friday Squid Blogging: Squid Insurance
From Schneier on Security

Friday Squid Blogging: Squid Insurance

This was once a real insurance product. Squid Insurance Marketing was the low-end offering at Astonish, complete with the tagline "Nothing Kills a Squid!" As...

Stoking Cyber Fears
From Schneier on Security

Stoking Cyber Fears

A lot of the debate around President Obama's cubsersecurity initiative center on how much of a burden it would be on industry, and how that should be financed.originally...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account