acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

An Analysis of Apple's FileVault 2
From Schneier on Security

An Analysis of Apple's FileVault 2

This is an analysis of Apple's disk encryption program, FileVault 2, that first appeared in the Lion operating system. Short summary: they couldn't break it....

Lousy Password Security on Tesco Website
From Schneier on Security

Lousy Password Security on Tesco Website

Good post, not because it picks on Tesco but because it's filled with good advice on how not to do it wrong.

Sexual Harassment at DefCon (and Other Hacker Cons)
From Schneier on Security

Sexual Harassment at DefCon (and Other Hacker Cons)

Excellent blog post by Valerie Aurora about sexual harassment at the DefCon hackers conference. Aside from the fact that this is utterly reprehensible behavior...

<i>Liars and Outliers</i> on Special Discount
From Schneier on Security

Liars and Outliers on Special Discount

Liars and Outliers has been out since late February, and while it's selling great, I'd like it to sell better. So I have a special offer for my regular readers...

Schneier in the News
From Schneier on Security

Schneier in the News

Here are links to three news articles about me, and two video interviews with me.

Measuring Cooperation and Defection using Shipwreck Data
From Schneier on Security

Measuring Cooperation and Defection using Shipwreck Data

In Liars and Outliers, I talk a lot about social norms and when people follow them. This research uses survival data from shipwrecks to measure it. The authors...

Cryptocat
From Schneier on Security

Cryptocat

I'm late writing about this one. Cryptocat is a web-based encrypted chat application. After Wired published a pretty fluffy profile on the program and its author...

Preventive vs. Reactive Security
From Schneier on Security

Preventive vs. Reactive Security

This is kind of a rambling essay on the need to spend more on infrastructure, but I was struck by this paragraph: Here's a news flash: There are some events that...

U.S. and China Talking About Cyberweapons
From Schneier on Security

U.S. and China Talking About Cyberweapons

Stuart Baker calls them "proxy talks" because they're not government to government, but it's a start.

Friday Squid Blogging: Dumpling Squid
From Schneier on Security

Friday Squid Blogging: Dumpling Squid

The sex life of the dumpling squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

Termite Suicide Bombers
From Schneier on Security

Termite Suicide Bombers

Some termites blow themselves up to expel invaders from their nest.

11-Year-Old Bypasses Airport Security
From Schneier on Security

11-Year-Old Bypasses Airport Security

Sure, stories like this are great fun, but I don't think it's much of a security concern. Terrorists can't build a plot around random occasional security failures...

<i>Rolling Stone</i> Magazine Writes About Computer Security
From Schneier on Security

Rolling Stone Magazine Writes About Computer Security

It's a virus that plays AC/DC, so it makes sense. Surreal, though. Another article.

Detecting Spoofed GPS Signals
From Schneier on Security

Detecting Spoofed GPS Signals

This is the latest in the arms race between spoofing GPS signals and detecting spoofed GPS signals. Unfortunately, the countermeasures all seem to be patent pending...

Chinese Gang Sells Fake Professional Certifications
From Schneier on Security

Chinese Gang Sells Fake Professional Certifications

They were able to hack into government websites: The gang’s USP, and the reason it could charge up to 10,000 yuan (£1,000) per certificate, was that it could hack...

Yet Another Risk of Storing Everything in the Cloud
From Schneier on Security

Yet Another Risk of Storing Everything in the Cloud

A hacker can social-engineer his way into your cloud storageand delete everything you have. It turns out, a billing address and the last four digits of a credit...

Peter Swire Testifies on the Inadequacy of Privacy Self-Regulation
From Schneier on Security

Peter Swire Testifies on the Inadequacy of Privacy Self-Regulation

Ohio State University Law Professor Peter Swire testifies before Congress on the inadequacy of industry self-regulation to protect privacy.

Verifying Elections Using Risk-Limiting Auditing
From Schneier on Security

Verifying Elections Using Risk-Limiting Auditing

Interesting article on using risk-limiting auditing in determining if an election's results are likely to be valid. The risk, in this case, is in the chance of...

Breaking Microsoft's PPTP Protocol
From Schneier on Security

Breaking Microsoft's PPTP Protocol

Some things never change. Thirteen years ago, Mudge and I published a paper breaking Microsoft's PPTP protocol and the MS-CHAP authentication system. I haven't...

State-by-State Report on Electronic Voting
From Schneier on Security

State-by-State Report on Electronic Voting

The Verified Voting Foundation has released a comprehensive state-by-state report on electronic voting machines (report, executive summary, and news coverage)....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account