acm-header
Sign In

Communications of the ACM

Blogroll


Refine your search:
dateMore Than a Year Ago
authorschneier
bg-corner

Life Recorder
From Schneier on Security

Life Recorder

In 2006, writing about future threats on privacy, I described a life recorder: A "life recorder" you can wear on your lapel that constantly records is still abeen...

Friday Squid Blogging: Tentacle Tie
From Schneier on Security

Friday Squid Blogging: Tentacle Tie

Very nice.

Fake CCTV Cameras
From Schneier on Security

Fake CCTV Cameras

CCTV cameras in Moscow have been accused of streaming prerecorded video instead of live images. What I can't figure out is why? To me, it seems easier for the...

Guns Painted to Look Like Toys
From Schneier on Security

Guns Painted to Look Like Toys

Last weekend I was in New York, and saw posters on the subways warning people about real guns painted to look like toys. And today I find these pictures from the...

Security for Implantable Medical Devices
From Schneier on Security

Security for Implantable Medical Devices

Interesting study: "Patients, Pacemakers, and Implantable Defibrillators: Human Values and Security for Wireless Implantable Medical Devices," Tamara Denning,Abstract...

Storing Cryptographic Keys with Invisible Tattoos
From Schneier on Security

Storing Cryptographic Keys with Invisible Tattoos

This idea, by Stuart Schechter at Microsoft Research, is -- I think -- clever: Abstract: Implantable medical devices, such as implantable cardiac defibrillators...

Matt Blaze Comments on his 15-Year-Old "Afterword"
From Schneier on Security

Matt Blaze Comments on his 15-Year-Old "Afterword"

Fifteen years ago, Matt Blaze wrote an Afterword to my book Applied Cryptography. Here are his current thoughts on that piece of writing.

Externalities and Identity Theft
From Schneier on Security

Externalities and Identity Theft

Chris Hoofnagle has a new paper: "Internalizing Identity Theft." Basically, he shows that one of the problems is that lenders extend credit even when credit applications...

Terrorist Attacks and Comparable Risks, Part 2
From Schneier on Security

Terrorist Attacks and Comparable Risks, Part 2

John Adams argues that our irrationality about comparative risks depends on the type of risk: With "pure" voluntary risks, the risk itself, with its associated...

Terrorist Attacks and Comparable Risks, Part 1
From Schneier on Security

Terrorist Attacks and Comparable Risks, Part 1

Nice analysis by John Mueller and Mark G. Stewart: There is a general agreement about risk, then, in the established regulatory practices of several developed...

Man-in-the-Middle Attacks Againt SSL
From Schneier on Security

Man-in-the-Middle Attacks Againt SSL

Says Matt Blaze: A decade ago, I observed that commercial certificate authorities protect you from anyone from whom they are unwilling to take money. That turns...

Makeup to Fool Face Recognition Software
From Schneier on Security

Makeup to Fool Face Recognition Software

An NYU student has been reverse-engineering facial recognition algorithms to devise makeup patterns to confuse face recognition software.

Friday Squid Blogging: Another Squid T-Shirt
From Schneier on Security

Friday Squid Blogging: Another Squid T-Shirt

Cute..

Me in CRN
From Schneier on Security

Me in CRN

CRN Magazine named me as one of its security superstars of 2010.

Schneier on "Security, Privacy, and the Generation Gap"
From Schneier on Security

Schneier on "Security, Privacy, and the Generation Gap"

Last month at the RSA Conference, I gave a talk titled "Security, Privacy, and the Generation Gap." It was pretty good, but it was the first time I gave that talk...

The Economics of Dueling
From Schneier on Security

The Economics of Dueling

Dueling has a rational economic basis.

Cryptanalysis of the DECT
From Schneier on Security

Cryptanalysis of the DECT

New cryptanalysis of the proprietrary encryption algorithm used in the Digital Enhanced Cordless Telecommunications (DECT) standard for cordless phones. Abstract...

The Effectiveness of Air Marshals
From Schneier on Security

The Effectiveness of Air Marshals

Air marshals are being arrested faster than air marshals are making arrests. Actually, there have been many more arrests of Federal air marshals than that story...

Cryptography Broken on American Military Attack Video
From Schneier on Security

Cryptography Broken on American Military Attack Video

Any ideas? At a news conference at the National Press Club, WikiLeaks said it had acquired the video from whistle-blowers in the military and viewed it after breaking...

New York and the Moscow Subway Bombing
From Schneier on Security

New York and the Moscow Subway Bombing

People intent on preventing a Moscow-style terrorist attack against the New York subway system are proposing a range of expensive new underground security measures...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account