acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Surveillance in Schools
From Schneier on Security

Surveillance in Schools

This essay, "Grooming students for a lifetime of surveillance," talks about the general trends in student surveillance. Related: essay on the need for student privacy...

How James Bamford Came to Write The Puzzle Palace
From Schneier on Security

How James Bamford Came to Write The Puzzle Palace

Interesting essay about James Bamford and his efforts to publish The Puzzle Palace over the NSA's objections. Required reading for those who think the NSA's excesses...

NSA Has Undercover Operatives in Foreign Companies
From Schneier on Security

NSA Has Undercover Operatives in Foreign Companies

The latest Intercept article on the Snowden NSA documents talks about their undercover operatives working in foreign companies. There are no specifics, although...

Friday Squid Blogging: Flash-Fried Squid Recipe
From Schneier on Security

Friday Squid Blogging: Flash-Fried Squid Recipe

Recipe from Tom Douglas. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Online Activism and the Computer Fraud and Abuse Act
From Schneier on Security

Online Activism and the Computer Fraud and Abuse Act

Good essay by Molly Sauter: basically, there is no legal avenue for activism and protest on the Internet. Also note Sauter's new book, The Coming Swarm....

Dynamic Encryption for Voice
From Schneier on Security

Dynamic Encryption for Voice

This article reads like snake oil. But the company was founded by Lars Knudsen, so it can't possibly be. I'm curious....

USB Cufflinks
From Schneier on Security

USB Cufflinks

Just the thing for smuggling data out of secure locations....

BadUSB Code Has Been Published
From Schneier on Security

BadUSB Code Has Been Published

In July, I wrote about an unpatchable USB vulnerability called BadUSB. Code for the vulnerability has been published....

Data and Goliath Is Finished
From Schneier on Security

Data and Goliath Is Finished

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World is finished. I submitted it to my publisher, Norton, this morning. In a few weeks...

iPhone Encryption and the Return of the Crypto Wars
From Schneier on Security

iPhone Encryption and the Return of the Crypto Wars

Last week Apple announced that it is closing a serious security vulnerability in the iPhone. It used to be that the phone's encryption only protected a small amount...

Friday Squid Blogging: Squid Burger
From Schneier on Security

Friday Squid Blogging: Squid Burger

McDonald's has a Halloween-themed burger with a squid-ink bun. Only in Japan. As usual, you can also use this squid post to talk about the security stories in the...

William Binney Explains NSA Surveillance Using Snowden's Documents
From Schneier on Security

William Binney Explains NSA Surveillance Using Snowden's Documents

Former NSA employee -- not technical director, as the link says -- explains how NSA bulk surveillance works, using some of the Snowden documents. Very interesting...

The NSA's Private Cloud
From Schneier on Security

The NSA's Private Cloud

The NSA is building a private cloud with its own security features: As a result, the agency can now track every instance of every individual accessing what is in...

Firechat
From Schneier on Security

Firechat

Firechat is a secure wireless peer-to-peer chat app: Firechat is theoretically resistant to the kind of centralized surveillance that the Chinese government (as...

Security Theater in China
From Schneier on Security

Security Theater in China

The Chinese government checked ten thousand pigeons for "dangerous materials." Because fear....

NSA Patents Available for License
From Schneier on Security

NSA Patents Available for License

There's a new article on NSA's Technology Transfer Program, a 1990s-era program to license NSA patents to private industry. I was pretty dismissive about the offerings...

Friday Squid Blogging: Squid Fishing Moves North in California
From Schneier on Security

Friday Squid Blogging: Squid Fishing Moves North in California

Warmer waters are moving squid fishing up the California coast. As usual, you can also use this squid post to talk about the security stories in the news that I...

Medical Records Theft and Fraud
From Schneier on Security

Medical Records Theft and Fraud

There's a Reuters article on new types of fraud using stolen medical records. I don't know how much of this is real and how much is hype, but I'm certain that criminals...

Security Trade-offs of Cloud Backup
From Schneier on Security

Security Trade-offs of Cloud Backup

This is a good essay on the security trade-offs with cloud backup: iCloud backups have not eliminated this problem, but they have made it far less common. This...

Nasty Vulnerability found in Bash
From Schneier on Security

Nasty Vulnerability found in Bash

It's a big and nasty one. Invariably we're going to see articles pointing at this and at Heartbleed and claim a trend in vulnerabilities in open-source software...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account