acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Jailbreaking LLM-Controlled Robots
From Schneier on Security

Jailbreaking LLM-Controlled Robots

Surprising no one, it’s easy to trick an LLM-controlled robot into ignoring its safety instructions.

Full-Face Masks to Frustrate Identification
From Schneier on Security

Full-Face Masks to Frustrate Identification

This is going to be interesting. It’s a video of someone trying on a variety of printed full-face masks. They won’t fool anyone for long, but will survive casual...

Trust Issues in AI
From Schneier on Security

Trust Issues in AI

For a technology that seems startling in its modernity, AI sure has a long history. Google Translate, OpenAI chatbots, and Meta AI image generators are built on...

Friday Squid Blogging: Safe Quick Undercarriage Immobilization Device
From Schneier on Security

Friday Squid Blogging: Safe Quick Undercarriage Immobilization Device

Fifteen years ago I blogged about a different SQUID. Here’s an update: Fleeing drivers are a common problem for law enforcement. They just won’t stop unless persuaded...

Detecting Pegasus Infections
From Schneier on Security

Detecting Pegasus Infections

This tool seems to do a pretty good job. The company’s Mobile Threat Hunting feature uses a combination of malware signature-based detection, heuristics, and machine...

Details about the iOS Inactivity Reboot Feature
From Schneier on Security

Details about the iOS Inactivity Reboot Feature

I recently wrote about the new iOS feature that forces an iPhone to reboot after it’s been inactive for a longish period of time. Here are the technical details...

Friday Squid Blogging: Squid-Inspired Needle Technology
From Schneier on Security

Friday Squid Blogging: Squid-Inspired Needle Technology

Interesting research: Using jet propulsion inspired by squid, researchers demonstrate a microjet system that delivers medications directly into tissues, matching...

Race Condition Attacks against LLMs
From Schneier on Security

Race Condition Attacks against LLMs

These are two attacks against the system components surrounding LLMs: We propose that LLM Flowbreaking, following jailbreaking and prompt injection, joins as the...

NSO Group Spies on People on Behalf of Governments
From Schneier on Security

NSO Group Spies on People on Behalf of Governments

The Israeli company NSO Group sells Pegasus spyware to countries around the world (including countries like Saudi Arabia, UAE, India, Mexico, Morocco and Rwanda)...

Security Analysis of the MERGE Voting Protocol
From Schneier on Security

Security Analysis of the MERGE Voting Protocol

Interesting analysis: An Internet Voting System Fatally Flawed in Creative New Ways. Abstract: The recently published “MERGE” protocol is designed to be used in...

Friday Squid Blogging: Transcriptome Analysis of the Indian Squid
From Schneier on Security

Friday Squid Blogging: Transcriptome Analysis of the Indian Squid

Lots of details that are beyond me. Blog moderation policy.

The Scale of Geoblocking by Nation
From Schneier on Security

The Scale of Geoblocking by Nation

Interesting analysis: We introduce and explore a little-known threat to digital equality and freedom­websites geoblocking users in response to political risks from...

Why Italy Sells So Much Spyware
From Schneier on Security

Why Italy Sells So Much Spyware

Interesting analysis: Although much attention is given to sophisticated, zero-click spyware developed by companies like Israel’s NSO Group, the Italian spyware...

Friday Squid Blogging: Female Gonatus Onyx Squid Carrying Her Eggs
From Schneier on Security

Friday Squid Blogging: Female Gonatus Onyx Squid Carrying Her Eggs

Fantastic video of a female Gonatus onyx squid swimming while carrying her egg sack. An earlier related post. Blog moderation policy.

Good Essay on the History of Bad Password Policies
From Schneier on Security

Good Essay on the History of Bad Password Policies

Stuart Schechter makes some good points on the history of bad password policies: Morris and Thompson’s work brought much-needed data to highlight a problem that...

New iOS Security Feature Makes It Harder for Police to Unlock Seized Phones
From Schneier on Security

New iOS Security Feature Makes It Harder for Police to Unlock Seized Phones

Everybody is reporting about a new security iPhone security feature with iOS 18: if the phone hasn’t been used for a few days, it automatically goes into its “Before...

Mapping License Plate Scanners in the US
From Schneier on Security

Mapping License Plate Scanners in the US

DeFlock is a crowd-sourced project to map license plate scanners. It only records the fixed scanners, of course. The mobile scanners on cars are not mapped. The...

Criminals Exploiting FBI Emergency Data Requests
From Schneier on Security

Criminals Exploiting FBI Emergency Data Requests

I’ve been writing about the problem with lawful-access backdoors in encryption for decades now: that as soon as you create a mechanism for law enforcement to bypass...

Friday Squid Blogging: Squid-A-Rama in Des Moines
From Schneier on Security

Friday Squid Blogging: Squid-A-Rama in Des Moines

Squid-A-Rama will be in Des Moines at the end of the month. Visitors will be able to dissect squid, explore fascinating facts about the species, and witness a live...

AI Industry is Trying to Subvert the Definition of “Open Source AI”
From Schneier on Security

AI Industry is Trying to Subvert the Definition of “Open Source AI”

The Open Source Initiative has published (news article here) its definition of “open source AI,” and it’s terrible. It allows for secret training data and mechanisms...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account