acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Cognitive Biases About Violence as a Negotiating Tactic
From Schneier on Security

Cognitive Biases About Violence as a Negotiating Tactic

Interesting paper: Max Abrahms, "The Credibility Paradox: Violence as a Double-Edged Sword in International Politics," International Studies Quarterly, 2013: ...

DARPA Contest for Fully-Automated Network Defense
From Schneier on Security

DARPA Contest for Fully-Automated Network Defense

DARPA is looking for a fully-automated network defense system: What if computers had a "check engine" light that could indicate new, novel security problems? What...

Code Names for NSA Exploit Tools
From Schneier on Security

Code Names for NSA Exploit Tools

This is from a Snowden document released by Le Monde: General Term Descriptions: HIGHLANDS: Collection from Implants VAGRANT: Collection of Computer Screens MAGNETIC...

Dry Ice Bombs at LAX
From Schneier on Security

Dry Ice Bombs at LAX

The news story about the guy who left dry ice bombs in restricted areas of LAX is really weird. I can't get worked up over it, though. Dry ice bombs are a harmless...

Can I Be Trusted?
From Schneier on Security

Can I Be Trusted?

SlashDot asks the question: I'm a big fan of Bruce Schneier, but just to play devil's advocate, let's say, hypothetically, that Schneier is actually in cahoots...

Defending Against Crypto Backdoors
From Schneier on Security

Defending Against Crypto Backdoors

We already know the NSA wants to eavesdrop on the Internet. It has secret agreements with telcos to get direct access to bulk Internet traffic. It has massive systems...

The Trajectories of Government and Corporate Surveillance
From Schneier on Security

The Trajectories of Government and Corporate Surveillance

Historically, surveillance was difficult and expensive. Over the decades, as technology advanced, surveillance became easier and easier. Today, we find ourselves...

Friday Squid Blogging: Fiona Apple Wears a Squid as a Hat in New Video
From Schneier on Security

Friday Squid Blogging: Fiona Apple Wears a Squid as a Hat in New Video

Even I think this is weird.

D-Link Router Backdoor
From Schneier on Security

D-Link Router Backdoor

Several versions of D-Link router firmware contain a backdoor. Just set the browser's user agent string to "xmlset_roodkcableoj28840ybtide," and you're in. (Hint...

Identifying Cell Phones Through Sensor Imperfections
From Schneier on Security

Identifying Cell Phones Through Sensor Imperfections

There seems to be a bunch of research into uniquely identifying cell phones through unique analog characteristics of the various embedded sensors. These sortsSlashdot...

"A Court Order Is an Insider Attack"
From Schneier on Security

"A Court Order Is an Insider Attack"

Ed Felten makes a strong argument that a court order is exactly the same thing as an insider attack: To see why, consider two companies, which we'll call Lavabit...

SecureDrop
From Schneier on Security

SecureDrop

SecureDrop is an open-source whistleblower support system, originally written by Aaron Swartz and now run by the Freedom of the Press Foundation. The first instance...

iPhone Sensor Surveillance
From Schneier on Security

iPhone Sensor Surveillance

The new iPhone has a motion sensor chip, and that opens up new opportunities for surveillance: The M7 coprocessors introduce functionality that some may instinctively...

NSA Harvesting Contact Lists
From Schneier on Security

NSA Harvesting Contact Lists

A new Snowden document shows that the NSA is harvesting contact lists -- e-mail address books, IM buddy lists, etc. -- from Google, Yahoo, Microsoft, Facebook,...

New Secure Smart Phone App
From Schneier on Security

New Secure Smart Phone App

It's hard not to poke fun at this press release for Safeslinger, a new cell phone security app from Carnegie Mellon. "SafeSlinger provides you with the confidence...

Massive MIMO Cryptosystem
From Schneier on Security

Massive MIMO Cryptosystem

New paper: "Physical-Layer Cryptography Through Massive MIMO." Abstract: We propose the new technique of physical-layer cryptography based on using a massive MIMO...

Insecurities in the Linux /dev/random
From Schneier on Security

Insecurities in the Linux /dev/random

New paper: "Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust, by Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien...

Fingerprinting Burner Phones
From Schneier on Security

Fingerprinting Burner Phones

In one of the documents recently released by the NSA as a result of an EFF lawsuit, there's discussion of a specific capability of a call records database to identify...

Friday Squid Blogging: 30-Foot Giant Squid Washes Ashore
From Schneier on Security

Friday Squid Blogging: 30-Foot Giant Squid Washes Ashore

A 30-foot-long giant squid has washed ashore in Cantabria, Spain. It died at sea, with a broken tentacle. As usual, you can also use this squid post to talk about...

Stuff I Say
From Schneier on Security

Stuff I Say

It's a Tumblr feed. Right now there are only six posts, all a year old. Presumably that will change soon. To clarify: I have nothing to do with the feed, and...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account