acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Security vs. Surveillance
From Schneier on Security

Security vs. Surveillance

Both the "going dark" metaphor of FBI Director James Comey and the contrasting "golden age of surveillance" metaphor of privacy law professor Peter Swire focus...

Paper on the Going Dark Debate
From Schneier on Security

Paper on the Going Dark Debate

I am pleased to have been a part of this report, part of the Berkman Center's Berklett Cybersecurity project: Don't Panic: Making Progress on the "Going Dark" Debate...

More Details on the NSA Switching to Quantum-Resistant Cryptography
From Schneier on Security

More Details on the NSA Switching to Quantum-Resistant Cryptography

The NSA is publicly moving away from cryptographic algorithms vulnerable to cryptanalysis using a quantum computer. It just published a FAQ about the process: Q...

NSA and GCHQ Hacked Israeli Drone Feeds
From Schneier on Security

NSA and GCHQ Hacked Israeli Drone Feeds

The NSA and GCHQ have successfully hacked Israel's drones, according to the Snowden documents. The story is being reported by the Intercept and Der Spiegel. The...

NSA's TAO Head on Internet Offense and Defense
From Schneier on Security

NSA's TAO Head on Internet Offense and Defense

Rob Joyce, the head of the NSA's Tailored Access Operations (TAO) group -- basically the country's chief hacker -- spoke in public earlier this week. He talked...

Friday Squid Blogging: Polynesian Squid Hook
From Schneier on Security

Friday Squid Blogging: Polynesian Squid Hook

From 1909, for squid fishing. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Encryption Backdoor Comic
From Schneier on Security

Encryption Backdoor Comic

"Support our Snoops."...

Integrity and Availability Threats
From Schneier on Security

Integrity and Availability Threats

Cyberthreats are changing. We're worried about hackers crashing airplanes by hacking into computer networks. We're worried about hackers remotely disabling cars...

Psychological Model of Selfishness
From Schneier on Security

Psychological Model of Selfishness

This is interesting: Game theory decision-making is based entirely on reason, but humans don't always behave rationally. David Rand, assistant professor of psychology...

Horrible Story of Digital Harassment
From Schneier on Security

Horrible Story of Digital Harassment

This is just awful. Their troll -- or trolls, as the case may be -- have harassed Paul and Amy in nearly every way imaginable. Bomb threats have been made under...

Data Driven Policing
From Schneier on Security

Data Driven Policing

Good article from The Washington Post....

Shodan Lets Your Browse Insecure Webcams
From Schneier on Security

Shodan Lets Your Browse Insecure Webcams

There's a lot out there: The feed includes images of marijuana plantations, back rooms of banks, children, kitchens, living rooms, garages, front gardens, back...

Friday Squid Blogging: North Coast Squid
From Schneier on Security

Friday Squid Blogging: North Coast Squid

North Coast Squid is a local writing journal from Manzanita, Oregon. It's going to publish its fifth edition this year. As usual, you can also use this squid post...

UK Government Promoting Backdoor-Enabled Voice Encryption Protocol
From Schneier on Security

UK Government Promoting Backdoor-Enabled Voice Encryption Protocol

The UK government is pushing something called the MIKEY-SAKKE protocol to secure voice. Basically, it's an identity-based system that necessarily requires a trusted...

Security Trade-offs in the Longbow vs. Crossbow Decision
From Schneier on Security

Security Trade-offs in the Longbow vs. Crossbow Decision

Interesting research: Douglas W. Allen and Peter T. Leeson, "Institutionally Constrained Technology Adoption: Resolving the Longbow Puzzle," Journal of Law and...

El Chapo's Opsec
From Schneier on Security

El Chapo's Opsec

I've already written about Sean Penn's opsec while communicating with El Chapo. Here's the technique of mirroring, explained: El chapo then switched to a complex...

France Rejects Back Doors in Encryption Products
From Schneier on Security

France Rejects Back Doors in Encryption Products

For the right reasons too: Axelle Lemaire, the Euro nation's digital affairs minister, shot down the amendment during the committee stage of the forthcoming omnibus...

Reverse-Engineering a Zero-Day Exploit from the Hacking Team Data Dump
From Schneier on Security

Reverse-Engineering a Zero-Day Exploit from the Hacking Team Data Dump

Last July, a still-anonymous hacker broke into the network belonging to the cyberweapons arms manufacturer Hacking Team, and dumped an enormous amount of its proprietary...

Counterfeit Theater Tickets in New York
From Schneier on Security

Counterfeit Theater Tickets in New York

Counterfeiters are makingtickets for the Broadway show "Hamilton." Counterfeiting is much easier when the person you're passing the fakes off to doesn't know what...

Match Fixing in Tennis
From Schneier on Security

Match Fixing in Tennis

The BBC and Buzzfeed are jointly reporting on match fixing in tennis. Their story is based partially on leaked documents and partly on data analysis. BuzzFeed News...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account