acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

Friday Squid Blogging: SquidSquid.com
From Schneier on Security

Friday Squid Blogging: SquidSquid.com

SquidSquid.com.

Video Interviews with Me
From Schneier on Security

Video Interviews with Me

Mike Mimoso interviewed me at the RSA Conference last month.

Two Security Cartoons
From Schneier on Security

Two Security Cartoons

One, and two.

The Doghouse: Lock My PC
From Schneier on Security

The Doghouse: Lock My PC

Lock My PC 4 has a master password.

Booby-trapping a PDF File
From Schneier on Security

Booby-trapping a PDF File

Interesting.

NIST on Protecting Personally Identifiable Information
From Schneier on Security

NIST on Protecting Personally Identifiable Information

Just published: Special Publication (SP) 800-122, "Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)." It's 60 pages long; I...

Security Fog
From Schneier on Security

Security Fog

An odd burglary prevention tool: If a burglar breaks in, the system floods the business with a dense fog similar to what's used in theaters and nightclubs. An...

Personal Code Ink
From Schneier on Security

Personal Code Ink

Remember SmartWater: liquid imbued with a uniquely identifiable DNA-style code? Well, Mont Blanc is selling a pen with uniquely identifiable ink.

Young People, Privacy, and the Internet
From Schneier on Security

Young People, Privacy, and the Internet

There's a lot out there on this topic. I've already linked to danah boyd's excellent SXSW talk (and her work in general), my essay on privacy and control, andSecurity...

The Effectiveness of Political Assassinations
From Schneier on Security

The Effectiveness of Political Assassinations

This is an excellent read: I wouldn't have believed you if you'd told me 20 years ago that America would someday be routinely firing missiles into countries it

Lt. Gen. Alexander and the U.S. Cyber Command
From Schneier on Security

Lt. Gen. Alexander and the U.S. Cyber Command

Lt. Gen. Keith Alexander, the current Director of NSA, has been nominated to head the US Cyber Command. Last week Alexander appeared before the Senate Armed Services...

Life Recorder
From Schneier on Security

Life Recorder

In 2006, writing about future threats on privacy, I described a life recorder: A "life recorder" you can wear on your lapel that constantly records is still abeen...

Friday Squid Blogging: Tentacle Tie
From Schneier on Security

Friday Squid Blogging: Tentacle Tie

Very nice.

Fake CCTV Cameras
From Schneier on Security

Fake CCTV Cameras

CCTV cameras in Moscow have been accused of streaming prerecorded video instead of live images. What I can't figure out is why? To me, it seems easier for the...

Guns Painted to Look Like Toys
From Schneier on Security

Guns Painted to Look Like Toys

Last weekend I was in New York, and saw posters on the subways warning people about real guns painted to look like toys. And today I find these pictures from the...

Security for Implantable Medical Devices
From Schneier on Security

Security for Implantable Medical Devices

Interesting study: "Patients, Pacemakers, and Implantable Defibrillators: Human Values and Security for Wireless Implantable Medical Devices," Tamara Denning,Abstract...

Storing Cryptographic Keys with Invisible Tattoos
From Schneier on Security

Storing Cryptographic Keys with Invisible Tattoos

This idea, by Stuart Schechter at Microsoft Research, is -- I think -- clever: Abstract: Implantable medical devices, such as implantable cardiac defibrillators...

Matt Blaze Comments on his 15-Year-Old "Afterword"
From Schneier on Security

Matt Blaze Comments on his 15-Year-Old "Afterword"

Fifteen years ago, Matt Blaze wrote an Afterword to my book Applied Cryptography. Here are his current thoughts on that piece of writing.

Externalities and Identity Theft
From Schneier on Security

Externalities and Identity Theft

Chris Hoofnagle has a new paper: "Internalizing Identity Theft." Basically, he shows that one of the problems is that lenders extend credit even when credit applications...

Terrorist Attacks and Comparable Risks, Part 2
From Schneier on Security

Terrorist Attacks and Comparable Risks, Part 2

John Adams argues that our irrationality about comparative risks depends on the type of risk: With "pure" voluntary risks, the risk itself, with its associated...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account