acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Anonymization and the Law
From Schneier on Security

Anonymization and the Law

Interesting paper: "Anonymization and Risk," by Ira S. Rubinstein and Woodrow Hartzog: Abstract: Perfect anonymization of data sets has failed. But the process...

Dallas Police Use a Robot to Kill a Person
From Schneier on Security

Dallas Police Use a Robot to Kill a Person

This seems to be a first....

Friday Squid Blogging: How Squids See Color Despite Black-and-White Vision
From Schneier on Security

Friday Squid Blogging: How Squids See Color Despite Black-and-White Vision

It's chromatic aberration. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

I'm on an "Adam Ruins Everything" Podcast
From Schneier on Security

I'm on an "Adam Ruins Everything" Podcast

Adam Conover interviewed me on his podcast. If you remember, I was featured on his "Adam Ruins Everything" TV episode on security....

Researchers Discover Tor Nodes Designed to Spy on Hidden Services
From Schneier on Security

Researchers Discover Tor Nodes Designed to Spy on Hidden Services

Two researchers have discovered over 100 Tor nodes that are spying on hidden services. Cory Doctorow explains: These nodes -- ordinary nodes, not exit nodes --...

Hijacking Someone's Facebook Account with a Fake Passport Copy
From Schneier on Security

Hijacking Someone's Facebook Account with a Fake Passport Copy

BBC has the story. The confusion is that a scan of a passport is much easier to forge than an actual passport. This is a truly hard problem: how do you give people...

The Difficulty of Routing around Internet Surveillance States
From Schneier on Security

The Difficulty of Routing around Internet Surveillance States

Interesting research: "Characterizing and Avoiding Routing Detours Through Surveillance States," by Anne Edmundson, Roya Ensafi, Nick Feamster, and Jennifer Rexford...

Good Article on Airport Security
From Schneier on Security

Good Article on Airport Security

The New York Times wrote a good piece comparing airport security around the world, and pointing out that moving the security perimeter doesn't make any difference...

Intellectual Property as National Security
From Schneier on Security

Intellectual Property as National Security

Interesting research: Debora Halbert, "Intellectual property theft and national security: Agendas and assumptions": Abstract: About a decade ago, intellectual property...

"Dogs Raise Fireworks Threat Level to 'Gray'"
From Schneier on Security

"Dogs Raise Fireworks Threat Level to 'Gray'"

Funny: The Department of Canine Security urges dogs to remain on high alert and employ the tactic of See Something, Say Something. Remember to bark upon spotting...

Friday Squid Blogging: Squid-Ink Cocktails
From Schneier on Security

Friday Squid Blogging: Squid-Ink Cocktails

Here's a Corpse Reviver #2 variant with squid ink. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...

Anti-Paparazzi Scarf
From Schneier on Security

Anti-Paparazzi Scarf

It reflects light....

Interview with an NSA Hacker
From Schneier on Security

Interview with an NSA Hacker

Peter Maas interviewed the former NSA official who wrote the infamous "I Hunt Sysadmins" memo. It's interesting, but I wanted to hear less of Peter Maas -- I already...

Security Analysis of TSA PreCheck
From Schneier on Security

Security Analysis of TSA PreCheck

Interesting research: Mark G. Stewart and John Mueller, "Risk-based passenger screening: risk and economic assessment of TSA PreCheck increased security at reduced...

Facebook Using Physical Location to Suggest Friends
From Schneier on Security

Facebook Using Physical Location to Suggest Friends

This could go badly: "People You May Know are people on Facebook that you might know," a Facebook spokesperson said. "We show you people based on mutual friends...

Crowdsourcing a Database of Hotel Rooms
From Schneier on Security

Crowdsourcing a Database of Hotel Rooms

There's an app that allows people to submit photographs of hotel rooms around the world into a centralized database. The idea is that photographs of victims of...

Friday Squid Blogging: Bioluminescence as Camouflage
From Schneier on Security

Friday Squid Blogging: Bioluminescence as Camouflage

Interesting: There is one feature of the squid that is not transparent and which could act as a signal to prey ­ the eyes. However, the squid has a developed protection...

Using Social Media to Discover Hidden Wealth
From Schneier on Security

Using Social Media to Discover Hidden Wealth

Stories of burglars using social media to figure out who's on vacation are old hat. Now financial investigators are using social media to find hidden wealth....

Comparing Messaging Apps
From Schneier on Security

Comparing Messaging Apps

Michah Lee has a nice comparison among Signal, WhatsApp, and Allo. In this article, I'm going to compare WhatsApp, Signal, and Allo from a privacy perspective....

Fraudsters are Buying IPv4 Addresses
From Schneier on Security

Fraudsters are Buying IPv4 Addresses

IPv4 addresses are valuable, so criminals are figuring out how to buy or steal them. Hence criminals' interest in ways to land themselves IP addresses, some of...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account