acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

xkcd on a Bad Threat Model
From Schneier on Security

xkcd on a Bad Threat Model

Funny, and true.

Tor Needs Bridges
From Schneier on Security

Tor Needs Bridges

The Internet anonymity service Tor needs people who are willing to run bridges. It's a goodness for the world; do it if you can.

Cryptanalyst on British Postage Stamps
From Schneier on Security

Cryptanalyst on British Postage Stamps

A 92-year-old World War II Bletchley Park codebreaker has had a set of commemorative stamps issued in his honor.

Random Links on the Boston Terrorist Attack
From Schneier on Security

Random Links on the Boston Terrorist Attack

Encouraging poll data says that maybe Americans are starting to have realistic fears about terrorism, or at least are refusing to be terrorized. Good essay byapologizes...

Ellen on Protecting Passwords
From Schneier on Security

Ellen on Protecting Passwords

Pretty good video. Ellen makes fun of the "Internet Password Minder," which is -- if you think about it -- only slightly different than Password Safe.

More Plant Security Countermeasures
From Schneier on Security

More Plant Security Countermeasures

I've talked about plant security systems, both here and in Beyond Fear. Specifically, I've talked about tobacco plants that call air strikes against insects...

The Police Now Like Amateur Photography
From Schneier on Security

The Police Now Like Amateur Photography

PhotographyIsNotACrime.com points out the obvious: after years of warning us that photography is suspicious, the police were happy to accept all of those amateur...

Securing Members of Congress from Transparency
From Schneier on Security

Securing Members of Congress from Transparency

I commented in this article on the repeal of the transparency provisions of the STOCK Act: Passed in 2012 after a 60 Minutes report on insider trading practices...

About Police Shoot Outs and Spectators
From Schneier on Security

About Police Shoot Outs and Spectators

Hopefully this advice is superfluous for my audience, but it's so well written it's worth reading nonetheless: 7. SO, the bottom line is this: If you are in a...

A Discussion of Redaction
From Schneier on Security

A Discussion of Redaction

Interesting.

The Boston Marathon Bomber Manhunt
From Schneier on Security

The Boston Marathon Bomber Manhunt

I generally give the police a lot of tactical leeway in times like this. The very armed and very dangerous suspects warranted extraordinary treatment. They were...

Me at the Berkman Center
From Schneier on Security

Me at the Berkman Center

Earlier this month I spent a week at the Berkman Center for Internet and Society, talking to people about power, security, technology, and threats (details here...

Friday Squid Blogging: Giant Squid Bike Rack
From Schneier on Security

Friday Squid Blogging: Giant Squid Bike Rack

It's the first on this page. Apparently this is the finished version of the design I blogged about last year. As usual, you can also use this squid post to talk...

NSA Cryptography Course
From Schneier on Security

NSA Cryptography Course

This article, from some internal NSA publication, is about Lambros Callimahos, who taught an intensive 18-week course on cryptology for many years and died in 1977...

The Nemim.gen Trojan
From Schneier on Security

The Nemim.gen Trojan

This clever piece of malware evades forensic examination by deleting its own components.

Initial Thoughts on the Boston Bombings
From Schneier on Security

Initial Thoughts on the Boston Bombings

I rewrote my "refuse to be terrorized" essay for the Atlantic. David Rothkoph (author of the great book Power, Inc.) wrote something similar, and so did John Cole...

FBI and Cell Phone Surveillance
From Schneier on Security

FBI and Cell Phone Surveillance

We're learning a lot about how the FBI eavesdrops on cell phones from a recent court battle.

Google Glass Enables New Forms of Cheating
From Schneier on Security

Google Glass Enables New Forms of Cheating

It's mentioned here: Mr. Doerr said he had been wearing the glasses and uses them especially for taking pictures and looking up words while playing Scattergories...

Friday Squid Blogging: Illegal Squid Fishing
From Schneier on Security

Friday Squid Blogging: Illegal Squid Fishing

While we we're on the subject of squid fishing in Argentina, the country is dealing with foreign boats illegally fishing for squid inside its territorial waters...

Remotely Hijacking an Aircraft
From Schneier on Security

Remotely Hijacking an Aircraft

There is a lot of buzz on the the Internet about a talk at the Hack-in-the Box conference by Hugo Teso, who claims he can hack in to remotely control an airplane's...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account