acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Video Filter that Detects a Pulse
From Schneier on Security

Video Filter that Detects a Pulse

Fascinating. How long before someone claims he can use this technology to detect nervous people in airports?

Five "Neglects" in Risk Management
From Schneier on Security

Five "Neglects" in Risk Management

Good list, summarized here: 1. Probability neglect – people sometimes don’t consider the probability of the occurrence of an outcome, but focus on the consequences...

Poll: Americans Like the TSA
From Schneier on Security

Poll: Americans Like the TSA

Gallup has the results: Despite recent negative press, a majority of Americans, 54%, think the U.S. Transportation Security Administration is doing either an excellent...

Is iPhone Security Really this Good?
From Schneier on Security

Is iPhone Security Really this Good?

Simson Garfinkel writes that the iPhone has such good security that the police can't use it for forensics anymore: Technologies the company has adopted protect...

Help Cryptanalyze Gauss
From Schneier on Security

Help Cryptanalyze Gauss

Kaspersky is looking for help decrypting the Gauss payload.

Passive Sensor That Sees Through Walls
From Schneier on Security

Passive Sensor That Sees Through Walls

A new technology uses the radiation given off by wi-fi devices to sense the positions of people through a one-foot-thick brick wall.

The View from an Israeli Security Checkpoint
From Schneier on Security

The View from an Israeli Security Checkpoint

This is an extraordinary (and gut-wrenching) first-person account of what it's like to staff an Israeli security checkpoint. It shows how power corrupts: how it's...

Friday Squid Blogging: Efforts to Film a Live Giant Squid
From Schneier on Security

Friday Squid Blogging: Efforts to Film a Live Giant Squid

Japanese researchers are attempting to film the elusive giant squid. As usual, you can also use this squid post to talk about the security stories in the news...

$200 for a Fake Security System
From Schneier on Security

$200 for a Fake Security System

This is pretty funny: Moving red laser beams scare away potential intruders Laser beams move along floor and wall 180 degrees Easy to install, 110v comes on automatically...

Rudyard Kipling on Societal Pressures
From Schneier on Security

Rudyard Kipling on Societal Pressures

In the short story "A Wayside Comedy," published in 1888 in Under the Deodars, Kipling wrote: You must remember, though you will not understand, that all lawsmy...

An Analysis of Apple's FileVault 2
From Schneier on Security

An Analysis of Apple's FileVault 2

This is an analysis of Apple's disk encryption program, FileVault 2, that first appeared in the Lion operating system. Short summary: they couldn't break it....

Lousy Password Security on Tesco Website
From Schneier on Security

Lousy Password Security on Tesco Website

Good post, not because it picks on Tesco but because it's filled with good advice on how not to do it wrong.

Sexual Harassment at DefCon (and Other Hacker Cons)
From Schneier on Security

Sexual Harassment at DefCon (and Other Hacker Cons)

Excellent blog post by Valerie Aurora about sexual harassment at the DefCon hackers conference. Aside from the fact that this is utterly reprehensible behavior...

<i>Liars and Outliers</i> on Special Discount
From Schneier on Security

Liars and Outliers on Special Discount

Liars and Outliers has been out since late February, and while it's selling great, I'd like it to sell better. So I have a special offer for my regular readers...

Schneier in the News
From Schneier on Security

Schneier in the News

Here are links to three news articles about me, and two video interviews with me.

Measuring Cooperation and Defection using Shipwreck Data
From Schneier on Security

Measuring Cooperation and Defection using Shipwreck Data

In Liars and Outliers, I talk a lot about social norms and when people follow them. This research uses survival data from shipwrecks to measure it. The authors...

Cryptocat
From Schneier on Security

Cryptocat

I'm late writing about this one. Cryptocat is a web-based encrypted chat application. After Wired published a pretty fluffy profile on the program and its author...

Preventive vs. Reactive Security
From Schneier on Security

Preventive vs. Reactive Security

This is kind of a rambling essay on the need to spend more on infrastructure, but I was struck by this paragraph: Here's a news flash: There are some events that...

U.S. and China Talking About Cyberweapons
From Schneier on Security

U.S. and China Talking About Cyberweapons

Stuart Baker calls them "proxy talks" because they're not government to government, but it's a start.

Friday Squid Blogging: Dumpling Squid
From Schneier on Security

Friday Squid Blogging: Dumpling Squid

The sex life of the dumpling squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account