acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Rabbit Beating Up Snake
From Schneier on Security

Rabbit Beating Up Snake

It's the Internet, which means there must be cute animal videos on this blog. But this one is different. Watch a mother rabbit beat up a snake to protect her children...

Clever System of Secure Distributed Computation
From Schneier on Security

Clever System of Secure Distributed Computation

This is really clever: Enigma's technique -- what cryptographers call "secure multiparty computation" -- works by mimicking a few of the features of bitcoin's decentralized...

Details of the NSA's XKEYSCORE
From Schneier on Security

Details of the NSA's XKEYSCORE

The Intercept has published a highly detailed two-part article on how the NSA's XKEYSCORE works, including a huge number of related documents from the Snowden archive...

Office of Personnel Management Data Hack
From Schneier on Security

Office of Personnel Management Data Hack

I don't have much to say about the recent hack of the US Office of Personnel Management, which has been attributed to China (and seems to be getting worse all the...

Twitter Followers: Please Use the Correct Feed
From Schneier on Security

Twitter Followers: Please Use the Correct Feed

The official Twitter feed for my blog is @schneierblog. The account @Bruce_Schneier also mirrors my blog, but it is not mine. I have nothing to do with it, and...

Tracking the Psychological Effects of the 9/11 Attacks
From Schneier on Security

Tracking the Psychological Effects of the 9/11 Attacks

Interesting research from 2012: "The Dynamics of Evolving Beliefs, Concerns, Emotions, and Behavioral Avoidance Following 9/11: A Longitudinal Analysis of Representative...

TEMPEST Attack
From Schneier on Security

TEMPEST Attack

There's a new paper on a low-cost TEMPEST attack against PC cryptography: We demonstrate the extraction of secret decryption keys from laptop computers, by nonintrusively...

Migrating from SHA-1 to SHA-2
From Schneier on Security

Migrating from SHA-1 to SHA-2

Here's a comprehensive document on migrating from SHA-1 to SHA-2 in Active Directory certificates....

Friday Squid Blogging: Classic Gary Larson Squid Cartoon
From Schneier on Security

Friday Squid Blogging: Classic Gary Larson Squid Cartoon

I have always liked this one. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Other GCHQ News from Snowden
From Schneier on Security

Other GCHQ News from Snowden

There are two other Snowden stories this week about GCHQ: one about its hacking practices, and the other about its propaganda and psychology research. The second...

NSA and GCHQ Attacked Antivirus Companies
From Schneier on Security

NSA and GCHQ Attacked Antivirus Companies

On Monday, the Intercept published a new story from the Snowden documents: The spy agencies have reverse engineered software products, sometimes under questionable...

Yet Another Leaker -- with the NSA's French Intercepts
From Schneier on Security

Yet Another Leaker -- with the NSA's French Intercepts

Wikileaks has published some NSA SIGINT documents describing intercepted French government communications. This seems not be from the Snowden documents. It could...

Baseball Hacking: Cardinals vs. Astros
From Schneier on Security

Baseball Hacking: Cardinals vs. Astros

I think this is the first case of one professional sports team hacking another. No idea if it was an official operation, or a couple of employees doing it on their...

What is the DoD's Position on Backdoors in Security Systems?
From Schneier on Security

What is the DoD's Position on Backdoors in Security Systems?

In May, Admiral James A. Winnefeld, Jr., vice-chairman of the Joint Chiefs of Staff, gave an address at the Joint Service Academies Cyber Security Summit at West...

Hayden Mocks NSA Reforms
From Schneier on Security

Hayden Mocks NSA Reforms

Former NSA Director Michael recently mocked the NSA reforms in the recently passed USA Freedom Act: If somebody would come up to me and say, "Look, Hayden, here's...

Why We Encrypt
From Schneier on Security

Why We Encrypt

Encryption protects our data. It protects our data when it's sitting on our computers and in data centers, and it protects it when it's being transmitted around...

History of the First Crypto War
From Schneier on Security

History of the First Crypto War

As we're all gearing up to fight the Second Crypto War over governments' demands to be able to back-door any cryptographic system, it pays for us to remember the...

The Secrecy of the Snowden Documents
From Schneier on Security

The Secrecy of the Snowden Documents

Last weekend, the Sunday Times published a front-page story (full text here), citing anonymous British sources claiming that both China and Russia have copies of...

Friday Squid Blogging: Squid Salad Servers
From Schneier on Security

Friday Squid Blogging: Squid Salad Servers

Nice. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Counterfeit Social Media Accounts
From Schneier on Security

Counterfeit Social Media Accounts

Interesting article on the inner workings of a Facebook account farm, with commentary on fake social media accounts in general....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account