acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Radio Interviews with Me
From Schneier on Security

Radio Interviews with Me

Four interviews with me on the NSA.

New NSA Leak Shows MITM Attacks Against Major Internet Services
From Schneier on Security

New NSA Leak Shows MITM Attacks Against Major Internet Services

The Brazilian television show "Fantastico" has exposed an NSA training presentation that discusses how the agency runs man-in-the-middle attacks on the Internet...

Did I Actually Say That?
From Schneier on Security

Did I Actually Say That?

I'm quoted (also here) as using this analogy to explain how IT companies will be damaged by the news that they've been collaborating with the NSA: "How would it...

Ed Felten on the NSA Disclosures
From Schneier on Security

Ed Felten on the NSA Disclosures

Ed Felten has an excellent essay on the damage caused by the NSA secretly breaking the security of Internet systems: In security, the worst case -- the thing you...

Matthew Green Speculates on How the NSA Defeats Encryption
From Schneier on Security

Matthew Green Speculates on How the NSA Defeats Encryption

This blog post is well worth reading, and not just because Johns Hopkins University asked him to remove it, and then backed down a few hours later.

iPhone Fingerprint Authentication
From Schneier on Security

iPhone Fingerprint Authentication

When Apple bought AuthenTec for its biometrics technology -- reported as one of its most expensive purchases -- there was a lot of speculation about how the company...

The TSA Is Legally Allowed to Lie to Us
From Schneier on Security

The TSA Is Legally Allowed to Lie to Us

The TSA does not have to tell the truth: Can the TSA (or local governments as directed by the TSA) lie in response to a FOIA request? Sure, no problem! Evenclassified...

Government Secrecy and the Generation Gap
From Schneier on Security

Government Secrecy and the Generation Gap

Big-government secrets require a lot of secret-keepers. As of October 2012, almost 5m people in the US have security clearances, with 1.4m at the top-secret level...

Excess Automobile Deaths as a Result of 9/11
From Schneier on Security

Excess Automobile Deaths as a Result of 9/11

People commented about a point I made in a recent essay: In the months after 9/11, so many people chose to drive instead of fly that the resulting deaths dwarfed...

My New PGP/GPG and OTR Keys
From Schneier on Security

My New PGP/GPG and OTR Keys

You can find my new PGP public key and my OTR key fingerprint here.

Friday Squid Blogging: Giant Squid Found Off the Coast of Spain
From Schneier on Security

Friday Squid Blogging: Giant Squid Found Off the Coast of Spain

The incomplete specimen weighs over 160 lbs. And here's a map of squid spottings. As usual, you can also use this squid post to talk about the security stories...

Another Interview
From Schneier on Security

Another Interview

I was interviewed by MinnPost.

Conspiracy Theories and the NSA
From Schneier on Security

Conspiracy Theories and the NSA

I've recently seen two articles speculating on the NSA's capability, and practice, of spying on members of Congress and other elected officials. The evidence is...

The NSA's Cryptographic Capabilities
From Schneier on Security

The NSA's Cryptographic Capabilities

The latest Snowden document is the US intelligence "black budget." There's a lot of information in the few pages the Washington Post decided to publish, including...

The NSA is Breaking Most Encryption on the Internet
From Schneier on Security

The NSA is Breaking Most Encryption on the Internet

The new Snoden revelations are explosive. Basically, the NSA is able to decrypt most of the Internet. They're doing it primarily by cheating, not by mathematics...

The Effect of Money on Trust
From Schneier on Security

The Effect of Money on Trust

Money reduces trust in small groups, but increases it in larger groups. Basically, the introduction of money allows society to scale. The team devised an experiment...

<i>Journal of Homeland Security and Emergency Management</i>
From Schneier on Security

Journal of Homeland Security and Emergency Management

I keep getting alerts of new issues, but there are rarely articles I find interesting.

Human/Machine Trust Failures
From Schneier on Security

Human/Machine Trust Failures

I jacked a visitor's badge from the Eisenhower Executive Office Building in Washington, DC, last month. The badges are electronic; they're enabled when you check...

SHA-3 Status
From Schneier on Security

SHA-3 Status

NIST's John Kelsey gave an excellent talk on the history, status, and future of the SHA-3 hashing standard. The slides are online.

Business Opportunities in Cloud Security
From Schneier on Security

Business Opportunities in Cloud Security

Bessemer Venture Partners partner David Cowan has an interesting article on the opportunities for cloud security companies. Richard Stiennnon, an industry analyst...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account