acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Insecurities in the Linux /dev/random
From Schneier on Security

Insecurities in the Linux /dev/random

New paper: "Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust, by Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien...

Fingerprinting Burner Phones
From Schneier on Security

Fingerprinting Burner Phones

In one of the documents recently released by the NSA as a result of an EFF lawsuit, there's discussion of a specific capability of a call records database to identify...

Friday Squid Blogging: 30-Foot Giant Squid Washes Ashore
From Schneier on Security

Friday Squid Blogging: 30-Foot Giant Squid Washes Ashore

A 30-foot-long giant squid has washed ashore in Cantabria, Spain. It died at sea, with a broken tentacle. As usual, you can also use this squid post to talk about...

Stuff I Say
From Schneier on Security

Stuff I Say

It's a Tumblr feed. Right now there are only six posts, all a year old. Presumably that will change soon. To clarify: I have nothing to do with the feed, and...

New Low in Election Fraud
From Schneier on Security

New Low in Election Fraud

Azerbaijan achieves a new low in voter fraud. They government accidentally publishes the results of the election before the polls open. The mistake came whenanother...

Air Gaps
From Schneier on Security

Air Gaps

Since I started working with Snowden's documents, I have been using a number of tools to try to stay secure from the NSA. The advice I shared included using Tor...

Build Your Own Enigma
From Schneier on Security

Build Your Own Enigma

Neat.

Breaking Taiwan's Digital ID
From Schneier on Security

Breaking Taiwan's Digital ID

There's a serious random-number generation flaw in the cryptographic systems used to protect the Taiwanese digital ID. Article and paper.

A New Postal Privacy Product
From Schneier on Security

A New Postal Privacy Product

The idea is basically to use indirection to hide physical addresses. You would get a random number to give to your correspondents, and the post office would use...

The NSA's New Risk Analysis
From Schneier on Security

The NSA's New Risk Analysis

As I recently reported in the Guardian, the NSA has secret servers on the Internet that hack into other computers, codename FOXACID. These servers provide an excellent...

Me on Surveillance
From Schneier on Security

Me on Surveillance

This is a video of me talking about surveillance and privacy, both relating to the NSA and more generally.

Why It's Important to Publish the NSA Programs
From Schneier on Security

Why It's Important to Publish the NSA Programs

The Guardian recently reported on how the NSA targets Tor users, along with details of how it uses centrally placed servers on the Internet to attack individual...

Silk Road Author Arrested Due to Bad Operational Security
From Schneier on Security

Silk Road Author Arrested Due to Bad Operational Security

Details of how the FBI found the administrator of Silk Road, a popular black market e-commerce site. Despite the elaborate technical underpinnings, however, the...

How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID
From Schneier on Security

How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID

The online anonymity network Tor is a high-priority target for the National Security Agency. The work of attacking Tor is done by the NSA's application vulnerabilities...

Friday Squid Blogging: Squid Exhibit at the Monterey Bay Aquarium
From Schneier on Security

Friday Squid Blogging: Squid Exhibit at the Monterey Bay Aquarium

Opens spring 2014. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

"Trust the Math"
From Schneier on Security

"Trust the Math"

I like this piece of art. Someone should do T-shirts.

Developments in Microphone Technology
From Schneier on Security

Developments in Microphone Technology

What's interesting is that this matchstick-sized microphone can be attached to drones. Conventional microphones work when sound waves make a diaphragm move, creating...

Is Cybersecurity a Profession?
From Schneier on Security

Is Cybersecurity a Profession?

A National Academy of Sciences panel says no: Sticking to the quality control aspect of the report, professionalization, it says, has the potential to attractreport...

On Anonymous
From Schneier on Security

On Anonymous

Gabriella Coleman has published an interesting analysis of the hacker group Anonymous: Abstract: Since 2010, digital direct action, including leaks, hacking and...

On Secrecy
From Schneier on Security

On Secrecy

"When everything is classified, then nothing is classified." I should suppose that moral, political, and practical considerations would dictate that a very first...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account