acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Analysis of the FBI's Failure to Stop the Boston Marathon Bombings
From Schneier on Security

Analysis of the FBI's Failure to Stop the Boston Marathon Bombings

Detailed response and analysis of the inspectors general report on the Boston Marathon bombings: Two opposite mistakes in an after-the-fact review of a terrorist...

Really Weird Keith Alexander Interview
From Schneier on Security

Really Weird Keith Alexander Interview

Comedian John Oliver interviewed now-retired NSA director General Keith Alexander. It's truly weird....

The Federal Reserve System's Cyberdefense Force
From Schneier on Security

The Federal Reserve System's Cyberdefense Force

Interesting article on the cybersecurity branch of the Federal Reserve System....

Tracking People from Smartphone Accelerometers
From Schneier on Security

Tracking People from Smartphone Accelerometers

It's been long known that individual analog devices have their own fingerprints. Decades ago, individual radio transmitters were identifiable and trackable. Now...

The Quantified Toilet Hoax
From Schneier on Security

The Quantified Toilet Hoax

Good essay on the Quantified Toilet hoax, and the difference between public surveillance and private self-surveillance....

Details of Apple's Fingerprint Recognition
From Schneier on Security

Details of Apple's Fingerprint Recognition

This is interesting: Touch ID takes a 88x88 500ppi scan of your finger and temporarily sends that data to a secure cache located near the RAM, after the data is...

A New Pencil-and-Paper Encryption Algorithm
From Schneier on Security

A New Pencil-and-Paper Encryption Algorithm

Handycipher is a new pencil-and-paper symmetric encryption algorithm. I'd bet a gazillion dollars that it's not secure, although I haven't done the cryptanalysis...

Friday Squid Blogging: New Squid Exhibit at the Monterey Bay Aquarium.
From Schneier on Security

Friday Squid Blogging: New Squid Exhibit at the Monterey Bay Aquarium.

It's called "Tentacles." As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Is Google Too Big to Trust?
From Schneier on Security

Is Google Too Big to Trust?

Interesting essay about how Google's lack of transparency is hurting their trust: The reality is that Google's business is and has always been about mining as much...

Conversnitch
From Schneier on Security

Conversnitch

Surveillance is getting cheaper and easier: Two artists have revealed Conversnitch, a device they built for less than $100 that resembles a lightbulb or lamp and...

The Security of Various Programming Languages
From Schneier on Security

The Security of Various Programming Languages

Interesting research on the security of code written in different programming languages. We don't know whether the security is a result of inherent properties of...

Dan Geer on Heartbleed and Software Monocultures
From Schneier on Security

Dan Geer on Heartbleed and Software Monocultures

Good essay: To repeat, Heartbleed is a common mode failure. We would not know about it were it not open source (Good). That it is open source has been shown to...

Info on Russian Bulk Surveillance
From Schneier on Security

Info on Russian Bulk Surveillance

Good information: Russian law gives Russia’s security service, the FSB, the authority to use SORM (“System for Operative Investigative Activities”) to collect,...

Friday Squid Blogging: Squid Jigging
From Schneier on Security

Friday Squid Blogging: Squid Jigging

Good news from Malaysia: The Terengganu International Squid Jigging Festival (TISJF) will be continued and become an annual event as one of the state's main tourism...

Metaphors of Surveillance
From Schneier on Security

Metaphors of Surveillance

There's a new study looking at the metaphors we use to describe surveillance. Over 62 days between December and February, we combed through 133 articles by 105...

Reverse Heartbleed
From Schneier on Security

Reverse Heartbleed

Heartbleed can affect clients as well as servers....

Overreacting to Risk
From Schneier on Security

Overreacting to Risk

This is a crazy overreaction: A 19-year-old man was caught on camera urinating in a reservoir that holds Portland's drinking water Wednesday, according to city...

Tails
From Schneier on Security

Tails

Nice article on the Tails stateless operating system. I use it. Initially I would boot my regular computer with Tails on a USB stick, but I went out and bought...

Book Title
From Schneier on Security

Book Title

I previously posted that I am writing a book on security and power. Here are some title suggestions: Permanent Record: The Hidden Battles to Capture Your Data and...

Schneier Speaking Schedule: April–May
From Schneier on Security

Schneier Speaking Schedule: April–May

Here's my upcoming speaking schedule for April and May: Stanford Law School on April 15. Brown University in Providence, RI -- two times -- on April 24. The Global...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account