acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Why DRM Doesn't Work
From Schneier on Security

Why DRM Doesn't Work

Funny comic.

More Hollow Coins
From Schneier on Security

More Hollow Coins

A hollowed-out U.S. nickel can hold a microSD card. Pound and euro coins are also available. I blogged about this about a year ago as well.

Wikibooks Cryptography Textbook
From Schneier on Security

Wikibooks Cryptography Textbook

Over at Wikibooks, they're trying to write an open source cryptography textbook.

Wanted: Trust Detector
From Schneier on Security

Wanted: Trust Detector

It's good to dream: IARPA's five-year plan aims to design experiments that can measure trust with high certainty -- a tricky proposition for a psychological study...

Nose Biometrics
From Schneier on Security

Nose Biometrics

Really: Since they are hard to conceal, the study says, noses would work well for identification in covert surveillance. The researchers say noses have been overlooked...

The Limits of Identity Cards
From Schneier on Security

The Limits of Identity Cards

Good legal paper on the limits of identity cards: Stephen Mason and Nick Bohm, "Identity and its Verification," in Computer Law & Security Review, Volume 26, Number...

Marc Rotenberg on Google's Italian Privacy Case
From Schneier on Security

Marc Rotenberg on Google's Italian Privacy Case

Interesting commentary: I don't think this is really a case about ISP liability at all. It is a case about the use of a person's image, without their consent,...

Guide to Microsoft Police Forensic Services
From Schneier on Security

Guide to Microsoft Police Forensic Services

The "Microsoft Online Services Global Criminal Compliance Handbook (U.S. Domestic Version)" (also can be found here, here, and here) outlines exactly what Microsoft...

Google in <i>The Onion</i>
From Schneier on Security

Google in The Onion

Funny: MOUNTAIN VIEW, CA

Eating a Flash Drive
From Schneier on Security

Eating a Flash Drive

How not to destroy evidence: In a bold and bizarre attempt to destroy evidence seized during a federal raid, a New York City man grabbed a flash drive and swallowed...

De-Anonymizing Social Network Users
From Schneier on Security

De-Anonymizing Social Network Users

Interesting paper: "A Practical Attack to De-Anonymize Social Network Users." Abstract. Social networking sites such as Facebook, LinkedIn, and Xing have been...

Friday Squid Blogging: Squid Teapot
From Schneier on Security

Friday Squid Blogging: Squid Teapot

Squid teapot. Could be squiddier.

Another Interview with Me
From Schneier on Security

Another Interview with Me

I gave this one two days ago, at the RSA Conference.

Mariposa Botnet Shut Down
From Schneier on Security

Mariposa Botnet Shut Down

The Spanish police arrested three people in connection with the 13-million-computer Mariposa botnet.

Comprehensive National Cybersecurity Initiative
From Schneier on Security

Comprehensive National Cybersecurity Initiative

On Tuesday, the White House published an unclassified summary of its Comprehensive National Cybersecurity Initiative (CNCI). Howard Schmidt made the announcement...

Crypto Implementation Failure
From Schneier on Security

Crypto Implementation Failure

Look at this new AES-encrypted USB memory stick. You enter the key directly into the stick via the keypad, thereby bypassing any eavesdropping software on the...

Tom Engelhardt on Fear on Terrorism
From Schneier on Security

Tom Engelhardt on Fear on Terrorism

Nice essay. Similar sentiment from Newsweek.

More on the Al-Madhouh Assassination
From Schneier on Security

More on the Al-Madhouh Assassination

Interesting essay by a former CIA field officer on the al-Mabhouh assassination: The truth is that Mr. Mabhouh's assassination was conducted according to the book...

Breaking in to Hotel Rooms
From Schneier on Security

Breaking in to Hotel Rooms

Is this how the al-Mabhouh assassins got in?

Friday Squid Blogging: Squid Homophone Lessons
From Schneier on Security

Friday Squid Blogging: Squid Homophone Lessons

Squids make great examples.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account