acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

The Problems with CALEA-II
From Schneier on Security

The Problems with CALEA-II

The FBI wants a new law that will make it easier to wiretap the Internet. Although its claim is that the new law will only maintain the status quo, it's reallyeverything...

The Security Risks of Unregulated Google Search
From Schneier on Security

The Security Risks of Unregulated Google Search

Someday I need to write an essay on the security risks of secret algorithms that become part of our infrastructure. This paper gives one example of that. Could...

The Problems with Managing Privacy by Asking and Giving Consent
From Schneier on Security

The Problems with Managing Privacy by Asking and Giving Consent

New paper from the Harvard Law Review by Daniel Solove: "Privacy Self-Management and the Consent Dilemma": Privacy self-management takes refuge in consent. It...

Friday Squid Blogging: Squid Pronouns
From Schneier on Security

Friday Squid Blogging: Squid Pronouns

The translated version of a Spanish menu contains the entry "squids in his (her, your) ink." As usual, you can also use this squid post to talk about the security...

The Rise of Amateurs Recording Events
From Schneier on Security

The Rise of Amateurs Recording Events

Interesting article on a greatly increased aspect of surveillance: "the ordinary citizen who by chance finds himself in a position to record events of great public...

Why We Lie
From Schneier on Security

Why We Lie

This, by Judge Kozinski, is from a Federal court ruling about false statements and First Amendment protection Saints may always tell the truth, but for mortals...

Are We Finally Thinking Sensibly About Terrorism?
From Schneier on Security

Are We Finally Thinking Sensibly About Terrorism?

This article wonders if we are: Yet for pretty much the first time there has been a considerable amount of media commentary seeking to put terrorism in context...

Nassim Nicholas Taleb on Risk Perception
From Schneier on Security

Nassim Nicholas Taleb on Risk Perception

From his Facebook page: An illustration of how the news are largely created, bloated and magnified by journalists. I have been in Lebanon for the past 24h, and...

The Politics of Security in a Democracy
From Schneier on Security

The Politics of Security in a Democracy

Terrorism causes fear, and we overreact to that fear. Our brains aren't very good at probability and risk analysis. We tend to exaggerate spectacular, strange and...

Friday Squid Blogging: Eating Giant Squid
From Schneier on Security

Friday Squid Blogging: Eating Giant Squid

How does he know this? Chris Cosentino, the Bay Area’s "Offal Chef" at Incanto in San Francisco and PIGG at Umamicatessen in Los Angeles, opted for the most intimidating...

Training Baggage Screeners
From Schneier on Security

Training Baggage Screeners

The research in G. Giguère and B.C. Love, "Limits in decision making arise from limits in memory retrieval," Proceedings of the National Academy of Sciences v.Abstract...

New Report on Teens, Social Media, and Privacy
From Schneier on Security

New Report on Teens, Social Media, and Privacy

Interesting report from the From the Pew Internet and American Life Project: Teens are sharing more information about themselves on their social media profiles...

One-Shot vs. Iterated Prisoner's Dilemma
From Schneier on Security

One-Shot vs. Iterated Prisoner's Dilemma

This post by Aleatha Parker-Wood is very applicable to the things I wrote in Liars & Outliers: A lot of fundamental social problems can be modeled as a disconnection...

"The Global Cyber Game"
From Schneier on Security

"The Global Cyber Game"

This 127-page report was just published by the UK Defence Academy. I have not read it yet, but it looks really interesting. Executive Summary: This report presents...

DDOS as Civil Disobedience
From Schneier on Security

DDOS as Civil Disobedience

For a while now, I have been thinking about what civil disobedience looks like in the Internet Age. Certainly DDOS attacks, and politically motivated hacking in...

Surveillance and the Internet of Things
From Schneier on Security

Surveillance and the Internet of Things

The Internet has turned into a massive surveillance tool. We're constantly monitored on the Internet by hundreds of companies -- both familiar and unfamiliar. Everything...

Security Risks of Too Much Security
From Schneier on Security

Security Risks of Too Much Security

All of the anti-counterfeiting features of the new Canadian $100 bill are resulting in people not bothering to verify them. The fanfare about the security features...

Friday Squid Blogging: Striped Pyjama Squid Pet Sculpture
From Schneier on Security

Friday Squid Blogging: Striped Pyjama Squid Pet Sculpture

Technically, it's a cuttlefish and not a squid. But it's still nice art. I posted a photo of a real striped pyjama squid way back in 2006. As usual, you can...

<i>Applied Cryptography</i> on <i>Elementary</i>
From Schneier on Security

Applied Cryptography on Elementary

In the episode that aired on May 9th, about eight or nine minutes in, there's a scene with a copy of Applied Cryptography prominently displayed on the coffee table...

Bluetooth-Controlled Door Lock
From Schneier on Security

Bluetooth-Controlled Door Lock

Here is a new lock that you can control via Bluetooth and an iPhone app. That's pretty cool, and I can imagine all sorts of reasons to get one of those. But I'm...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account