acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Using Imagery to Avoid Censorship
From Schneier on Security

Using Imagery to Avoid Censorship

Interesting: "It's really hard for the government to censor things when they don't understand the made-up words or meaning behind the imagery," said Kevin Lee,...

Friday Squid Blogging: Squid Anchor
From Schneier on Security

Friday Squid Blogging: Squid Anchor

Webpage says that it's "the most effective lightweight, portable anchor around." As usual, you can also use this squid post to talk about the security stories...

Pentagon Staffs Up U.S. Cyber Command
From Schneier on Security

Pentagon Staffs Up U.S. Cyber Command

The Washington Post has the story: The move, requested by the head of the Defense Department's Cyber Command, is part of an effort to turn an organization that...

Jared Diamond on Common Risks
From Schneier on Security

Jared Diamond on Common Risks

Jared Diamond has an op-ed in the New York Times where he talks about how we overestimate rare risks and underestimate common ones. Nothing new here -- I and others...

The Eavesdropping System in Your Computer
From Schneier on Security

The Eavesdropping System in Your Computer

Dan Farmer has an interesting paper (long version here; short version here) discussing the Baseboard Management Controller on your computer's motherboard: The ...

Power and the Internet
From Schneier on Security

Power and the Internet

All disruptive technologies upset traditional power balances, and the Internet is no exception. The standard story is that it empowers the powerless, but that's...

"People, Process, and Technology"
From Schneier on Security

"People, Process, and Technology"

Back in 1999 when I formed Counterpane Internet Security, Inc., I popularized the notion that security was a combination of people, process, and technology. Back...

Who Does Skype Let Spy?
From Schneier on Security

Who Does Skype Let Spy?

Lately I've been thinking a lot about power and the Internet, and what I call the feudal model of IT security that is becoming more and more pervasive. Basically...

Backdoors Built in to Barracuda Networks Equipment
From Schneier on Security

Backdoors Built in to Barracuda Networks Equipment

Don't we know enough not to do this anymore?

Complexity and Security
From Schneier on Security

Complexity and Security

I have written about complexity and security for over a decade now (for example, this from 1999). Here's the results of a survey that confirms this: Results showed...

Dangerous Security Theater: Scrambling Fighter Jets
From Schneier on Security

Dangerous Security Theater: Scrambling Fighter Jets

This story exemplifies everything that's wrong with our see-something-say-something war on terror: a perfectly innocent person on an airplane, a random person identifying...

Violence as a Contagious Disease
From Schneier on Security

Violence as a Contagious Disease

This is fascinating: Intuitively we understand that people surrounded by violence are more likely to be violent themselves. This isn't just some nebulous phenomenon...

Friday Squid Blogging: Squirming Tentacle USB Drive
From Schneier on Security

Friday Squid Blogging: Squirming Tentacle USB Drive

Just the thing. (Note that this is different than the previous squid USB drive I blogged about.) As usual, you can also use this squid post to talk about the...

Video Interview with Me
From Schneier on Security

Video Interview with Me

This interview was conducted last month, at an artificial intelligence conference at Oxford.

Shaming as Punishment for Repeated Drunk Driving
From Schneier on Security

Shaming as Punishment for Repeated Drunk Driving

Janesville, Wisconsin, has published information about repeated drunk driving offenders since 2010. The idea is that the public shame will reduce future incidents...

Identifying People from their Writing Style
From Schneier on Security

Identifying People from their Writing Style

It's called stylometry, and it's based on the analysis of things like word choice, sentence structure, syntax and punctuation. In one experiment, researchers were...

Identifying People from their DNA
From Schneier on Security

Identifying People from their DNA

Interesting: The genetic data posted online seemed perfectly anonymous ­- strings of billions of DNA letters from more than 1,000 people. But all it took was some...

The Security of the Mega File-Sharing Service
From Schneier on Security

The Security of the Mega File-Sharing Service

Ever since the launch of Kim Dotcom's file-sharing service, I have been asked about the unorthodox encryption and security system. I have not reviewed it, andthis...

Commenting on Aaron Swartz's Death
From Schneier on Security

Commenting on Aaron Swartz's Death

There has been an enormous amount written about the suicide of Aaron Swartz. This is primarily a collection of links, starting with those that use his death to...

Google's Authentication Research
From Schneier on Security

Google's Authentication Research

Google is working on non-password authentication techniques. But for Google's password-liberation plan to really take off, they’re going to need other websites...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account