acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

New Low in Election Fraud
From Schneier on Security

New Low in Election Fraud

Azerbaijan achieves a new low in voter fraud. They government accidentally publishes the results of the election before the polls open. The mistake came whenanother...

Air Gaps
From Schneier on Security

Air Gaps

Since I started working with Snowden's documents, I have been using a number of tools to try to stay secure from the NSA. The advice I shared included using Tor...

Build Your Own Enigma
From Schneier on Security

Build Your Own Enigma

Neat.

Breaking Taiwan's Digital ID
From Schneier on Security

Breaking Taiwan's Digital ID

There's a serious random-number generation flaw in the cryptographic systems used to protect the Taiwanese digital ID. Article and paper.

A New Postal Privacy Product
From Schneier on Security

A New Postal Privacy Product

The idea is basically to use indirection to hide physical addresses. You would get a random number to give to your correspondents, and the post office would use...

The NSA's New Risk Analysis
From Schneier on Security

The NSA's New Risk Analysis

As I recently reported in the Guardian, the NSA has secret servers on the Internet that hack into other computers, codename FOXACID. These servers provide an excellent...

Me on Surveillance
From Schneier on Security

Me on Surveillance

This is a video of me talking about surveillance and privacy, both relating to the NSA and more generally.

Why It's Important to Publish the NSA Programs
From Schneier on Security

Why It's Important to Publish the NSA Programs

The Guardian recently reported on how the NSA targets Tor users, along with details of how it uses centrally placed servers on the Internet to attack individual...

Silk Road Author Arrested Due to Bad Operational Security
From Schneier on Security

Silk Road Author Arrested Due to Bad Operational Security

Details of how the FBI found the administrator of Silk Road, a popular black market e-commerce site. Despite the elaborate technical underpinnings, however, the...

How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID
From Schneier on Security

How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID

The online anonymity network Tor is a high-priority target for the National Security Agency. The work of attacking Tor is done by the NSA's application vulnerabilities...

Friday Squid Blogging: Squid Exhibit at the Monterey Bay Aquarium
From Schneier on Security

Friday Squid Blogging: Squid Exhibit at the Monterey Bay Aquarium

Opens spring 2014. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

"Trust the Math"
From Schneier on Security

"Trust the Math"

I like this piece of art. Someone should do T-shirts.

Developments in Microphone Technology
From Schneier on Security

Developments in Microphone Technology

What's interesting is that this matchstick-sized microphone can be attached to drones. Conventional microphones work when sound waves make a diaphragm move, creating...

Is Cybersecurity a Profession?
From Schneier on Security

Is Cybersecurity a Profession?

A National Academy of Sciences panel says no: Sticking to the quality control aspect of the report, professionalization, it says, has the potential to attractreport...

On Anonymous
From Schneier on Security

On Anonymous

Gabriella Coleman has published an interesting analysis of the hacker group Anonymous: Abstract: Since 2010, digital direct action, including leaks, hacking and...

On Secrecy
From Schneier on Security

On Secrecy

"When everything is classified, then nothing is classified." I should suppose that moral, political, and practical considerations would dictate that a very first...

My TEDx Talk
From Schneier on Security

My TEDx Talk

I spoke at TEDxCambridge last month on security and power. Here's the video.

NSA Storing Internet Data, Social Networking Data, on Pretty Much Everybody
From Schneier on Security

NSA Storing Internet Data, Social Networking Data, on Pretty Much Everybody

Two new stories based on the Snowden documents. This is getting silly. General Alexander just lied about this to Congress last week. The old NSA tactic of hiding...

Will Keccak = SHA-3?
From Schneier on Security

Will Keccak = SHA-3?

Last year, NIST selected Keccak as the winner of the SHA-3 hash function competition. Yes, I would have rather my own Skein had won, but it was a good choice. ...

WhoIs Privacy and Proxy Service Abuse
From Schneier on Security

WhoIs Privacy and Proxy Service Abuse

ICANN has a draft study that looks at abuse of the Whois database. This study, conducted by the National Physical Laboratory (NPL) in the United Kingdom, analyzes...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account