acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Quantum Attack on Public-Key Algorithm
From Schneier on Security

Quantum Attack on Public-Key Algorithm

This talk (and paper) describe a lattice-based public-key algorithm called Soliloquy developed by GCHQ, and a quantum-computer attack on it. News article....

The Future of Auditory Surveillance
From Schneier on Security

The Future of Auditory Surveillance

Interesting essay on the future of speech recognition, microphone miniaturization, and the future ubiquity of auditory surveillance....

Putting NSA/GCHQ Spying Together
From Schneier on Security

Putting NSA/GCHQ Spying Together

This is a really good analysis of how the NSA/GCHQ spying programs actually work. It's nice that we finally have enough documents public that we can start putting...

Friday Squid Blogging: Squid Bikes
From Schneier on Security

Friday Squid Blogging: Squid Bikes

Squid Bikes is a California brand. Article from Velo News. As usual, you can also use this squid post to talk about the security stories in the news that I haven't...

Economic Failures of HTTPS Encryption
From Schneier on Security

Economic Failures of HTTPS Encryption

Interesting paper: "Security Collapse of the HTTPS Market." From the conclusion: Recent breaches at CAs have exposed several systemic vulnerabilities and market...

"Cooperating with the Future"
From Schneier on Security

"Cooperating with the Future"

This is an interesting paper -- the full version is behind a paywall -- about how we as humans can motivate people to cooperate with future generations. Abstract...

New Snowden Documents Show GCHQ Paying Cable & Wireless for Access
From Schneier on Security

New Snowden Documents Show GCHQ Paying Cable & Wireless for Access

A new story based on the Snowden documents and published in the German newspaper Süddeutsche Zeitung shows how the GCHQ worked with Cable & Wireless -- acquired...

FBI Agents Pose as Repairmen to Bypass Warrant Process
From Schneier on Security

FBI Agents Pose as Repairmen to Bypass Warrant Process

This is a creepy story. The FBI wanted access to a hotel guest's room without a warrant. So agents broke his Internet connection, and then posed as Internet technicians...

Regin: Another Military-Grade Malware
From Schneier on Security

Regin: Another Military-Grade Malware

Regin is another military-grade surveillance malware (tech details from Symantec and Kaspersky). It seems to have been in operation between 2008 and 2011. The Intercept...

The Security Underpinnnings of Cryptography
From Schneier on Security

The Security Underpinnnings of Cryptography

Nice article on some of the security assumptions we rely on in cryptographic algorithms....

New Kryptos Clue
From Schneier on Security

New Kryptos Clue

Jim Sanborn has given he world another clue to the fourth cyphertext in his Kryptos sculpture at the CIA headquarters. Older posts on Kryptos....

Friday Squid Blogging: Cephalopod Cognition
From Schneier on Security

Friday Squid Blogging: Cephalopod Cognition

Tales of cephalopod behavior, including octopuses, squid, cuttlefish and nautiluses. Cephalopod Cognition, published by Cambridge University Press, is currently...

Pre-Snowden Debate About NSA Call-Records Collection Program
From Schneier on Security

Pre-Snowden Debate About NSA Call-Records Collection Program

Reuters is reporting that in 2009, several senior NSA officials objected to the NSA call-records collection program. The now-retired NSA official, a longtime code...

Citadel Malware Steals Password Manager Master Passwords
From Schneier on Security

Citadel Malware Steals Password Manager Master Passwords

Citadel is the first piece of malware I know of that specifically steals master passwords from password managers. Note that my own Password Safe is a target....

A New Free CA
From Schneier on Security

A New Free CA

Announcing Let's Encrypt, a new free certificate authority. This is a joint project of EFF, Mozilla, Cisco, Akamai, and the University of Michigan. This is an absolutely...

Whatsapp Is Now End-to-End Encrypted
From Schneier on Security

Whatsapp Is Now End-to-End Encrypted

Whatapp is now offering end-to-end message encryption: Whatsapp will integrate the open-source software Textsecure, created by privacy-focused non-profit Open Whisper...

Snarky 1992 NSA Report on Academic Cryptography
From Schneier on Security

Snarky 1992 NSA Report on Academic Cryptography

The NSA recently declassified a report on the Eurocrypt '92 conference. Honestly, I share some of the writer's opinions on the more theoretical stuff. I know it's...

The NSA's Efforts to Ban Cryptographic Research in the 1970s
From Schneier on Security

The NSA's Efforts to Ban Cryptographic Research in the 1970s

New article on the NSA's efforts to control academic cryptographic research in the 1970s. It includes new interviews with public-key cryptography inventor Martin...

Friday Squid Blogging: The Story of Inventing the SQUID
From Schneier on Security

Friday Squid Blogging: The Story of Inventing the SQUID

The interesting story of how engineers at Ford Motor Co. invented the superconducting quantum interference device, or SQUID. As usual, you can also use this squid...

The Return of Crypto Export Controls?
From Schneier on Security

The Return of Crypto Export Controls?

Last month, for the first time since US export restrictions on cryptography were relaxed two decades ago, the US government has fined a company for exporting crypto...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account