acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

The Effectiveness of Privacy Audits
From Schneier on Security

The Effectiveness of Privacy Audits

This study concludes that there is a benefit to forcing companies to undergo privacy audits: "The results show that there are empirical regularities consistent...

Another Perspective on the Value of Privacy
From Schneier on Security

Another Perspective on the Value of Privacy

A philosophical perspective: But while Descartes's overall view has been rightly rejected, there is something profoundly right about the connection between privacy...

Big Data Surveillance Results in Bad Policy
From Schneier on Security

Big Data Surveillance Results in Bad Policy

Evgeny Morozov makes a point about surveillance and big data: it just looks for useful correlations without worrying about causes, and leads people to implement...

Protecting E-Mail from Eavesdropping
From Schneier on Security

Protecting E-Mail from Eavesdropping

In the wake of the Snowden NSA documents, reporters have been asking me whether encryption can solve the problem. Leaving aside the fact that much of what theadvice...

Friday Squid Blogging: Giant Origami Squid
From Schneier on Security

Friday Squid Blogging: Giant Origami Squid

Giant origami squid photo found -- without explanation -- on Reddit. As usual, you can also use this squid post to talk about the security stories in the news...

How Apple Continues to Make Security Invisible
From Schneier on Security

How Apple Continues to Make Security Invisible

Interesting article: Apple is famously focused on design and human experience as their top guiding principles. When it comes to security, that focus created a...

Sixth Movie-Plot Threat Contest Winner
From Schneier on Security

Sixth Movie-Plot Threat Contest Winner

On April 1, I announced the Sixth Mostly-Annual Movie-Plot Threat Contest: For this year's contest, I want a cyberwar movie-plot threat. (For those who don't know...

Is Cryptography Engineering or Science?
From Schneier on Security

Is Cryptography Engineering or Science?

Responding to a tweet by Thomas Ptacek saying, "If you're not learning crypto by coding attacks, you might not actually be learning crypto," Colin Percival published...

The Office of the Director of National Intelligence Defends NSA Surveillance Programs
From Schneier on Security

The Office of the Director of National Intelligence Defends NSA Surveillance Programs

Here's a transcript of a panel discussion about NSA surveillance. There's a lot worth reading here, but I want to quote Bob Litt's opening remarks. He's the General...

Privacy Protests
From Schneier on Security

Privacy Protests

Interesting law journal article: "Privacy Protests: Surveillance Evasion and Fourth Amendment Suspicion," by Elizabeth E. Joh. Abstract: The police tend to think...

US Department of Defense Censors Snowden Story
From Schneier on Security

US Department of Defense Censors Snowden Story

The US Department of Defense is blocking sites that are reporting about the Snowden documents. I presume they're not censoring sites that are smearing him personally...

Security Analysis of Children
From Schneier on Security

Security Analysis of Children

This is a really good paper describing the unique threat model of children in the home, and the sorts of security philosophies that are effective in dealing with...

NSA E-Mail Eavesdropping
From Schneier on Security

NSA E-Mail Eavesdropping

More Snowden documents analyzed by the Guardian -- two articles -- discuss how the NSA collected e-mails and data on Internet activity of both Americans and foreigners...

I've Joined the EFF Board
From Schneier on Security

I've Joined the EFF Board

I'm now on the board of directors of the EFF.

How the NSA Eavesdrops on Americans
From Schneier on Security

How the NSA Eavesdrops on Americans

Two weeks ago, the Guardian published two new Snowden documents. These outline how the NSA's data-collection procedures allow it to collect lots of data on Americans...

SIMON and SPECK: New NSA Encryption Algorithms
From Schneier on Security

SIMON and SPECK: New NSA Encryption Algorithms

The NSA has published some new symmetric algorithms: Abstract: In this paper we propose two families of block ciphers, SIMON and SPECK, each of which comes in...

Friday Squid Blogging: Man Pulled Under by Squids
From Schneier on Security

Friday Squid Blogging: Man Pulled Under by Squids

Video story on Animal Planet. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Me on EconTalk
From Schneier on Security

Me on EconTalk

Another audio interview; this one is mostly about security and power.

My Talk at Google
From Schneier on Security

My Talk at Google

Last week, I gave a talk at Google. It's another talk about power and security, my continually evolving topic-of-the-moment that could very well become my next...

Preventing Cell Phone Theft through Benefit Denial
From Schneier on Security

Preventing Cell Phone Theft through Benefit Denial

Adding a remote kill switch to cell phones would deter theft. Here we can see how the rise of the surveillance state permeates everything about computer security...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account