acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorSchneier
bg-corner

Friday Squid Blogging: Hawaiian Bobtail Squid
From Schneier on Security

Friday Squid Blogging: Hawaiian Bobtail Squid

Symbiotic relationship between the Hawaiian bobtail squid and bioluminescent bacteria, with bonus security implications.

Skype's Cryptography Reverse-Engineered
From Schneier on Security

Skype's Cryptography Reverse-Engineered

Someone claims to have reverse-engineered Skype's proprietary encryption protocols, and has published pieces of it. If the crypto is good, this is less of a big...

The NSA's Perfect Citizen
From Schneier on Security

The NSA's Perfect Citizen

In what creepy back room do they come up with these names? The federal government is launching an expansive program dubbed "Perfect Citizen" to detect cyber assaults...

Russian Intelligence Gets Source Code to Windows 7
From Schneier on Security

Russian Intelligence Gets Source Code to Windows 7

I don't think this is a good idea.

Random Numbers from Quantum Noise
From Schneier on Security

Random Numbers from Quantum Noise

Not that we need more ways to get random numbers, but the research is interesting.

Burglary Detection through Video Analytics
From Schneier on Security

Burglary Detection through Video Analytics

This is interesting: Some of the scenarios where we have installed video analytics for our clients include: to detect someone walking in an area of their yard...

Caller ID Spoofing on the Android
From Schneier on Security

Caller ID Spoofing on the Android

It's easy to access someone else's voicemail by spoofing the caller ID. This isn't new; what is new is that many people now have easy access to caller ID spoofing...

Hemingway Authentication Scheme
From Schneier on Security

Hemingway Authentication Scheme

From 1955, intended as humor: In the future when I should ever call on the telephone to make a request or issue an order I will identify myself as follows: This...

The Chaocipher
From Schneier on Security

The Chaocipher

The Chaocipher is a mechanical encryption algorithm invented in 1918. No one was able to reverse-engineer the algorithm, given sets of plaintexts and ciphertexts...

Serial Killers Are Now Terrorists
From Schneier on Security

Serial Killers Are Now Terrorists

Try to keep up: Leslie Van Houten, a one-time member of Charles Manson's infamous 'family' is up for parole for the 17th time today.... "These are serial killers...

Internet Kill Switch
From Schneier on Security

Internet Kill Switch

Last month, Sen. Joe Lieberman, I-Conn., introduced a bill that might -- we're not really sure -- give the president the authority to shut down all or portionsproposed...

Friday Squid Blogging: Squid Sex Organs
From Schneier on Security

Friday Squid Blogging: Squid Sex Organs

Riddles of squid sex: All cephalopods are hindered by their body shape, which comprises a closed hood-type structure called a mantle, which forms most of what...

TSA Blocks Access to Websites with "Controversial Opinions"
From Schneier on Security

TSA Blocks Access to Websites with "Controversial Opinions"

I wonder if my blog counts.

Detecting Cheating at Colleges
From Schneier on Security

Detecting Cheating at Colleges

The measures used to prevent cheating during tests remind me of casino security measures: No gum is allowed during an exam: chewing could disguise a student

The Toronto 18
From Schneier on Security

The Toronto 18

Long and interesting article from The Toronto Star on the Toronto 18, a terrorist cell arrested in 2006. Lots of stuff in this article I had not read before....

Surveillance and Morality
From Schneier on Security

Surveillance and Morality

"Does Surveillance Make Us Morally Better?": Conclusion The upshot of these reflections is that the relation between surveillance and moral edification is complicated...

The Threat of Cyberwar Has Been Grossly Exaggerated
From Schneier on Security

The Threat of Cyberwar Has Been Grossly Exaggerated

There's a power struggle going on in the U.S. government right now. It's about who is in charge of cyber security, and how much control the government will exert...

"Don't Commit Crime"
From Schneier on Security

"Don't Commit Crime"

This sign is from a gas station in the U.K. My first reaction was to laugh, but then I started thinking about it. We know that signs like "No Shoplifting"...

Research Report on Cyberattack Capabilities
From Schneier on Security

Research Report on Cyberattack Capabilities

From the National Academies in 2009: Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. It's 390 pages.

Tracking Location Based on Water Isotope Ratios
From Schneier on Security

Tracking Location Based on Water Isotope Ratios

Interesting: ...water molecules differ slightly in their isotope ratios depending on the minerals at their source. ...researchers found that water samples from...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account