acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Will Keccak = SHA-3?
From Schneier on Security

Will Keccak = SHA-3?

Last year, NIST selected Keccak as the winner of the SHA-3 hash function competition. Yes, I would have rather my own Skein had won, but it was a good choice. ...

WhoIs Privacy and Proxy Service Abuse
From Schneier on Security

WhoIs Privacy and Proxy Service Abuse

ICANN has a draft study that looks at abuse of the Whois database. This study, conducted by the National Physical Laboratory (NPL) in the United Kingdom, analyzes...

Senator Feinstein Admits the NSA Taps the Internet Backbone
From Schneier on Security

Senator Feinstein Admits the NSA Taps the Internet Backbone

We know from the Snowden documents (and other sources) that the NSA taps Internet backbone through secret-agreements with major U.S. telcos., but the U.S. government...

Friday Squid Blogging: A Squid that Fishes
From Schneier on Security

Friday Squid Blogging: A Squid that Fishes

The Grimalditeuthis bonplandi is the only known squid to use its tenticles to fish: Its tentacles are thin and fragile, and almost always break off when it's captured...

Another Schneier Interview
From Schneier on Security

Another Schneier Interview

I was interviewed for Technology Review on the NSA and the Snowden documents.

3D-Printed Robot to Break Android PINs
From Schneier on Security

3D-Printed Robot to Break Android PINs

Neat project. The reason it works is that the Android system doesn't start putting in very long delays between PIN attempts after a whole bunch of unsuccessful...

Paradoxes of Big Data
From Schneier on Security

Paradoxes of Big Data

Interesting paper: "Three Paradoxes of Big Data," by Neil M. Richards and Jonathan H. King, Stanford Law Review Online, 2013. Abstract: Big data is all the rage...

Good Summary of Potential NSA Involvement in a NIST RNG Standard
From Schneier on Security

Good Summary of Potential NSA Involvement in a NIST RNG Standard

Kim Zetter has written the definitive story -- at least so far -- of the possible backdoor in the Dual_EC_DRBG random number generator that's part of the NIST SP800...

Apple's iPhone Fingerprint Reader Successfully Hacked
From Schneier on Security

Apple's iPhone Fingerprint Reader Successfully Hacked

Nice hack from the Chaos Computer Club: The method follows the steps outlined in this how-to with materials that can be found in almost every household: First,...

NSA Job Opening
From Schneier on Security

NSA Job Opening

The NSA is looking for a Civil Liberties & Privacy Officer. It appears to be an internal posting. The NSA Civil Liberties & Privacy Officer (CLPO) is conceived...

Metadata Equals Surveillance
From Schneier on Security

Metadata Equals Surveillance

Back in June, when the contents of Edward Snowden's cache of NSA documents were just starting to be revealed and we learned about the NSA collecting phone metadata...

Friday Squid Blogging: How Bacteria Terraform a Squid
From Schneier on Security

Friday Squid Blogging: How Bacteria Terraform a Squid

Fascinating: The bacterium Vibrio fischeri is a squid terraformer. Although it can live independently in seawater, it also colonises the body of the adorable Hawaiian...

Legally Justifying NSA Surveillance of Americans
From Schneier on Security

Legally Justifying NSA Surveillance of Americans

Kit Walsh has an interesting blog post where he looks at how existing law can be used to justify the surveillance of Americans. Just to challenge ourselves, we'll...

Google Knows Every Wi-Fi Password in the World
From Schneier on Security

Google Knows Every Wi-Fi Password in the World

This article points out that as people are logging into Wi-Fi networks from their Android phones, and backing up those passwords along with everything else into...

Yochai Benkler on the NSA
From Schneier on Security

Yochai Benkler on the NSA

Excellent essay: We have learned that in pursuit of its bureaucratic mission to obtain signals intelligence in a pervasively networked world, the NSA has mounted...

The Limitations of Intelligence
From Schneier on Security

The Limitations of Intelligence

We recently learned that US intelligence agencies had at least three days' warning that Syrian President Bashar al-Assad was preparing to launch a chemical attack...

Surreptitiously Tampering with Computer Chips
From Schneier on Security

Surreptitiously Tampering with Computer Chips

This is really interesting research: "Stealthy Dopant-Level Hardware Trojans." Basically, you can tamper with a logic gate to be either stuck-on or stuck-off by...

Tom Tomorrow from 1994
From Schneier on Security

Tom Tomorrow from 1994

This was published during the battle about the Clipper Chip, and is remarkably prescient.

Reforming the NSA
From Schneier on Security

Reforming the NSA

Leaks from the whistleblower Edward Snowden have catapulted the NSA into newspaper headlines and demonstrated that it has become one of the most powerful government...

Take Back the Internet
From Schneier on Security

Take Back the Internet

Government and industry have betrayed the Internet, and us. By subverting the Internet at every level to make it a vast, multi-layered and robust surveillanceWe...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account