acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Tor Appliance
From Schneier on Security

Tor Appliance

Safeplug is an easy-to-use Tor appliance. I like that it can also act as a Tor exit node.

The FBI Might Do More Domestic Surveillance than the NSA
From Schneier on Security

The FBI Might Do More Domestic Surveillance than the NSA

This is a long article about the FBI's Data Intercept Technology Unit (DITU), which is basically its own internal NSA. It carries out its own signals intelligence...

US Working to Kill UN Resolutions to Limit International Surveillance
From Schneier on Security

US Working to Kill UN Resolutions to Limit International Surveillance

This story should get more publicity than it has.

Surveillance as a Business Model
From Schneier on Security

Surveillance as a Business Model

Google recently announced that it would start including individual users' names and photos in some ads. This means that if you rate some product positively, your...

Friday Squid Blogging: <i>Magnapinna</i> Squid Photo
From Schneier on Security

Friday Squid Blogging: Magnapinna Squid Photo

Neat photo. Video, too. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Reddit "Ask Me Anything"
From Schneier on Security

Reddit "Ask Me Anything"

I just did an AMA on Reddit.

Rerouting Internet Traffic by Attacking BGP
From Schneier on Security

Rerouting Internet Traffic by Attacking BGP

Renesys is reporting that Internet traffic is being manipulatively rerouted, presumably for eavesdropping purposes. The attacks exploit flaws in the Border Gateway...

How to Avoid Getting Arrested
From Schneier on Security

How to Avoid Getting Arrested

The tips are more psychological than security.

Fokirtor
From Schneier on Security

Fokirtor

Fokirtor is a Linux Trojan that exfiltrates traffic by inserting it into SSH connections. It looks very well-designed and -constructed.

Explaining and Speculating About QUANTUM
From Schneier on Security

Explaining and Speculating About QUANTUM

Nicholas Weaver has a great essay explaining how the NSA's QUANTUM packet injection system works, what we know it does, what else it can possibly do, and how to...

Friday Squid Blogging: Squid Fishermen Seen from Space
From Schneier on Security

Friday Squid Blogging: Squid Fishermen Seen from Space

Cool photo. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Various Schneier Audio and Video Talks and Interviews
From Schneier on Security

Various Schneier Audio and Video Talks and Interviews

News articles about me (or with good quotes by me). My talk at the IETF Vancouver meeting on NSA and surveillance. I'm the first speaker after the administrivia...

Security Tents
From Schneier on Security

Security Tents

The US government sets up secure tents for the president and other officials to deal with classified material while traveling abroad. Even when Obama travels to...

A Fraying of the Public/Private Surveillance Partnership
From Schneier on Security

A Fraying of the Public/Private Surveillance Partnership

The public/private surveillance partnership between the NSA and corporate data collectors is starting to fray. The reason is sunlight. The publicity resulting from...

Microsoft Retiring SHA-1 in 2016
From Schneier on Security

Microsoft Retiring SHA-1 in 2016

I think this is a good move on Microsoft's part: Microsoft is recommending that customers and CA's stop using SHA-1 for cryptographic applications, including use...

Another QUANTUMINSERT Attack Example
From Schneier on Security

Another QUANTUMINSERT Attack Example

Der Speigel is reporting that the GCHQ used QUANTUMINSERT to direct users to fake LinkedIn and Slashdot pages run by -- this code name is not in the article --reacted...

Cryptographic Blunders Revealed by Adobe's Password Leak
From Schneier on Security

Cryptographic Blunders Revealed by Adobe's Password Leak

Adobe lost 150 million customer passwords. Even worse, they had a pretty dumb cryptographic hash system protecting those passwords.

Bizarre Online Gambling Movie-Plot Threat
From Schneier on Security

Bizarre Online Gambling Movie-Plot Threat

This article argues that online gambling is a strategic national threat because terrorists could use it to launder money. The Harper demonstration showed the technology...

Dan Geer Explains the Government Surveillance Mentality
From Schneier on Security

Dan Geer Explains the Government Surveillance Mentality

This talk by Dan Geer explains the NSA mindset of "collect everything": I previously worked for a data protection company. Our product was, and I believe still...

Friday Squid Blogging: Tree Yarn-Bombed
From Schneier on Security

Friday Squid Blogging: Tree Yarn-Bombed

This tree in San Mateo, CA, has been turned into a giant blue squid. As usual, you can also use this squid post to talk about the security stories in the news...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account