acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

The Quantified Toilet Hoax
From Schneier on Security

The Quantified Toilet Hoax

Good essay on the Quantified Toilet hoax, and the difference between public surveillance and private self-surveillance....

Details of Apple's Fingerprint Recognition
From Schneier on Security

Details of Apple's Fingerprint Recognition

This is interesting: Touch ID takes a 88x88 500ppi scan of your finger and temporarily sends that data to a secure cache located near the RAM, after the data is...

A New Pencil-and-Paper Encryption Algorithm
From Schneier on Security

A New Pencil-and-Paper Encryption Algorithm

Handycipher is a new pencil-and-paper symmetric encryption algorithm. I'd bet a gazillion dollars that it's not secure, although I haven't done the cryptanalysis...

Friday Squid Blogging: New Squid Exhibit at the Monterey Bay Aquarium.
From Schneier on Security

Friday Squid Blogging: New Squid Exhibit at the Monterey Bay Aquarium.

It's called "Tentacles." As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Is Google Too Big to Trust?
From Schneier on Security

Is Google Too Big to Trust?

Interesting essay about how Google's lack of transparency is hurting their trust: The reality is that Google's business is and has always been about mining as much...

Conversnitch
From Schneier on Security

Conversnitch

Surveillance is getting cheaper and easier: Two artists have revealed Conversnitch, a device they built for less than $100 that resembles a lightbulb or lamp and...

The Security of Various Programming Languages
From Schneier on Security

The Security of Various Programming Languages

Interesting research on the security of code written in different programming languages. We don't know whether the security is a result of inherent properties of...

Dan Geer on Heartbleed and Software Monocultures
From Schneier on Security

Dan Geer on Heartbleed and Software Monocultures

Good essay: To repeat, Heartbleed is a common mode failure. We would not know about it were it not open source (Good). That it is open source has been shown to...

Info on Russian Bulk Surveillance
From Schneier on Security

Info on Russian Bulk Surveillance

Good information: Russian law gives Russia’s security service, the FSB, the authority to use SORM (“System for Operative Investigative Activities”) to collect,...

Friday Squid Blogging: Squid Jigging
From Schneier on Security

Friday Squid Blogging: Squid Jigging

Good news from Malaysia: The Terengganu International Squid Jigging Festival (TISJF) will be continued and become an annual event as one of the state's main tourism...

Metaphors of Surveillance
From Schneier on Security

Metaphors of Surveillance

There's a new study looking at the metaphors we use to describe surveillance. Over 62 days between December and February, we combed through 133 articles by 105...

Reverse Heartbleed
From Schneier on Security

Reverse Heartbleed

Heartbleed can affect clients as well as servers....

Overreacting to Risk
From Schneier on Security

Overreacting to Risk

This is a crazy overreaction: A 19-year-old man was caught on camera urinating in a reservoir that holds Portland's drinking water Wednesday, according to city...

Tails
From Schneier on Security

Tails

Nice article on the Tails stateless operating system. I use it. Initially I would boot my regular computer with Tails on a USB stick, but I went out and bought...

Book Title
From Schneier on Security

Book Title

I previously posted that I am writing a book on security and power. Here are some title suggestions: Permanent Record: The Hidden Battles to Capture Your Data and...

Schneier Speaking Schedule: April–May
From Schneier on Security

Schneier Speaking Schedule: April–May

Here's my upcoming speaking schedule for April and May: Stanford Law School on April 15. Brown University in Providence, RI -- two times -- on April 24. The Global...

Schneier Talks and Interviews
From Schneier on Security

Schneier Talks and Interviews

Here are three articles about me from the last month. Also these three A/V links....

Auditing TrueCrypt
From Schneier on Security

Auditing TrueCrypt

Recently, Matthew Green has been leading an independent project to audit TrueCrypt. Phase I, a source code audit by iSEC Partners, is complete. Next up is Phase...

GoGo Wireless Adds Surveillance Capabilities for Government
From Schneier on Security

GoGo Wireless Adds Surveillance Capabilities for Government

The important piece of this story is not that GoGo complies with the law, but that it goes above and beyond what is required by law. It has voluntarily decided...

Friday Squid Blogging: Bronze Giant Squid Sculpture
From Schneier on Security

Friday Squid Blogging: Bronze Giant Squid Sculpture

A little too big for my house....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account