acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Corporations Misusing Our Data
From Schneier on Security

Corporations Misusing Our Data

In the Internet age, we have no choice but to entrust our data with private companies: e-mail providers, service providers, retailers, and so on. We realize that...

Olfactory Surveillance
From Schneier on Security

Olfactory Surveillance

The Denver police are using olfactometers to measure the concentration of cannabis in the air. I haven't found any technical information about these devices, their...

Quantum Attack on Public-Key Algorithm
From Schneier on Security

Quantum Attack on Public-Key Algorithm

This talk (and paper) describe a lattice-based public-key algorithm called Soliloquy developed by GCHQ, and a quantum-computer attack on it. News article....

The Future of Auditory Surveillance
From Schneier on Security

The Future of Auditory Surveillance

Interesting essay on the future of speech recognition, microphone miniaturization, and the future ubiquity of auditory surveillance....

Putting NSA/GCHQ Spying Together
From Schneier on Security

Putting NSA/GCHQ Spying Together

This is a really good analysis of how the NSA/GCHQ spying programs actually work. It's nice that we finally have enough documents public that we can start putting...

Friday Squid Blogging: Squid Bikes
From Schneier on Security

Friday Squid Blogging: Squid Bikes

Squid Bikes is a California brand. Article from Velo News. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...

Economic Failures of HTTPS Encryption
From Schneier on Security

Economic Failures of HTTPS Encryption

Interesting paper: "Security Collapse of the HTTPS Market." From the conclusion: Recent breaches at CAs have exposed several systemic vulnerabilities and market...

"Cooperating with the Future"
From Schneier on Security

"Cooperating with the Future"

This is an interesting paper -- the full version is behind a paywall -- about how we as humans can motivate people to cooperate with future generations. Abstract...

New Snowden Documents Show GCHQ Paying Cable & Wireless for Access
From Schneier on Security

New Snowden Documents Show GCHQ Paying Cable & Wireless for Access

A new story based on the Snowden documents and published in the German newspaper Süddeutsche Zeitung shows how the GCHQ worked with Cable & Wireless -- acquired...

FBI Agents Pose as Repairmen to Bypass Warrant Process
From Schneier on Security

FBI Agents Pose as Repairmen to Bypass Warrant Process

This is a creepy story. The FBI wanted access to a hotel guest's room without a warrant. So agents broke his Internet connection, and then posed as Internet technicians...

Regin: Another Military-Grade Malware
From Schneier on Security

Regin: Another Military-Grade Malware

Regin is another military-grade surveillance malware (tech details from Symantec and Kaspersky). It seems to have been in operation between 2008 and 2011. The Intercept...

The Security Underpinnnings of Cryptography
From Schneier on Security

The Security Underpinnnings of Cryptography

Nice article on some of the security assumptions we rely on in cryptographic algorithms....

New Kryptos Clue
From Schneier on Security

New Kryptos Clue

Jim Sanborn has given he world another clue to the fourth cyphertext in his Kryptos sculpture at the CIA headquarters. Older posts on Kryptos....

Friday Squid Blogging: Cephalopod Cognition
From Schneier on Security

Friday Squid Blogging: Cephalopod Cognition

Tales of cephalopod behavior, including octopuses, squid, cuttlefish and nautiluses. Cephalopod Cognition, published by Cambridge University Press, is currently...

Pre-Snowden Debate About NSA Call-Records Collection Program
From Schneier on Security

Pre-Snowden Debate About NSA Call-Records Collection Program

Reuters is reporting that in 2009, several senior NSA officials objected to the NSA call-records collection program. The now-retired NSA official, a longtime code...

Citadel Malware Steals Password Manager Master Passwords
From Schneier on Security

Citadel Malware Steals Password Manager Master Passwords

Citadel is the first piece of malware I know of that specifically steals master passwords from password managers. Note that my own Password Safe is a target....

A New Free CA
From Schneier on Security

A New Free CA

Announcing Let's Encrypt, a new free certificate authority. This is a joint project of EFF, Mozilla, Cisco, Akamai, and the University of Michigan. This is an absolutely...

Whatsapp Is Now End-to-End Encrypted
From Schneier on Security

Whatsapp Is Now End-to-End Encrypted

Whatapp is now offering end-to-end message encryption: Whatsapp will integrate the open-source software Textsecure, created by privacy-focused non-profit Open Whisper...

Snarky 1992 NSA Report on Academic Cryptography
From Schneier on Security

Snarky 1992 NSA Report on Academic Cryptography

The NSA recently declassified a report on the Eurocrypt '92 conference. Honestly, I share some of the writer's opinions on the more theoretical stuff. I know it's...

The NSA's Efforts to Ban Cryptographic Research in the 1970s
From Schneier on Security

The NSA's Efforts to Ban Cryptographic Research in the 1970s

New article on the NSA's efforts to control academic cryptographic research in the 1970s. It includes new interviews with public-key cryptography inventor Martin...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account