acm-header
Sign In

Communications of the ACM

Blogroll


bg-corner

GCHQ Christmas Codebreaking Challenge
From Schneier on Security

GCHQ Christmas Codebreaking Challenge

Looks like fun. Details here.

OpenAI Is Not Training on Your Dropbox Documents—Today
From Schneier on Security

OpenAI Is Not Training on Your Dropbox Documents—Today

There’s a rumor flying around the Internet that OpenAI is training foundation models on your Dropbox documents. Here’s CNBC. Here’s Boing Boing. Some articles are...

Police Get Medical Records without a Warrant
From Schneier on Security

Police Get Medical Records without a Warrant

More unconstrained surveillance: Lawmakers noted the pharmacies’ policies for releasing medical records in a letter dated Tuesday to the Department of Health and...

Friday Squid Blogging: Underwater Sculptures Use Squid Ink for Coloring
From Schneier on Security

Friday Squid Blogging: Underwater Sculptures Use Squid Ink for Coloring

The Molinière Underwater Sculpture Park has pieces that are colored in part with squid ink. As usual, you can also use this squid post to talk about the security...

A Robot the Size of the World
From Schneier on Security

A Robot the Size of the World

In 2016, I wrote about an Internet that affected the world in a direct, physical manner. It was connected to your smartphone. It had sensors like cameras and thermostats...

Surveillance Cameras Disguised as Clothes Hooks
From Schneier on Security

Surveillance Cameras Disguised as Clothes Hooks

This seems like a bad idea. And there are ongoing lawsuits against Amazon for selling them.

Surveillance by the US Postal Service
From Schneier on Security

Surveillance by the US Postal Service

This is not about mass surveillance of mail, this is about sorts of targeted surveillance the US Postal Inspection Service uses to catch mail thieves: To track...

New Windows/Linux Firmware Attack
From Schneier on Security

New Windows/Linux Firmware Attack

Interesting attack based on malicious pre-OS logo images: LogoFAIL is a constellation of two dozen newly discovered vulnerabilities that have lurked for years,...

Facebook Enables Messenger End-to-End Encryption by Default
From Schneier on Security

Facebook Enables Messenger End-to-End Encryption by Default

It’s happened. Details here, and tech details here (for messages in transit) and here (for messages in storage) Rollout to everyone will take months, but it’s a...

Friday Squid Blogging: Influencer Accidentally Posts Restaurant Table QR Ordering Code
From Schneier on Security

Friday Squid Blogging: Influencer Accidentally Posts Restaurant Table QR Ordering Code

Another rare security + squid story: The woman—who has only been identified by her surname, Wang—was having a meal with friends at a hotpot restaurant in Kunming...

New Bluetooth Attack
From Schneier on Security

New Bluetooth Attack

New attack breaks forward secrecy in Bluetooth. Three. news articles. The vulnerability has been around for at least a decade.

Spying through Push Notifications
From Schneier on Security

Spying through Push Notifications

When you get a push notification on your Apple or Google phone, those notifications go through Apple and Google servers. Which means that those companies can spy...

Security Analysis of a Thirteenth-Century Venetian Election Protocol
From Schneier on Security

Security Analysis of a Thirteenth-Century Venetian Election Protocol

Interesting analysis: This paper discusses the protocol used for electing the Doge of Venice between 1268 and the end of the Republic in 1797. We will show that...

The Internet Enabled Mass Surveillance. AI Will Enable Mass Spying
From Schneier on Security

The Internet Enabled Mass Surveillance. AI Will Enable Mass Spying

Spying and surveillance are different but related things. If I hired a private detective to spy on you, that detective could hide a bug in your home or car, tap...

AI and Trust
From Schneier on Security

AI and Trust

I trusted a lot today. I trusted my phone to wake me on time. I trusted Uber to arrange a taxi for me, and the driver to get me to the airport safely. I trusted...

Friday Squid Blogging: Strawberry Squid in the Galápagos
From Schneier on Security

Friday Squid Blogging: Strawberry Squid in the Galápagos

Scientists have found Strawberry Squid, “whose mismatched eyes help them simultaneously search for prey above and below them,” among the coral reefs in the Galápagos...

AI Decides to Engage in Insider Trading
From Schneier on Security

AI Decides to Engage in Insider Trading

A stock-trading AI (a simulated experiment) engaged in insider trading, even though it “knew” it was wrong. The agent is put under pressure in three ways. First...

Breaking Laptop Fingerprint Sensors
From Schneier on Security

Breaking Laptop Fingerprint Sensors

They’re not that good: Security researchers Jesse D’Aguanno and Timo Teräs write that, with varying degrees of reverse-engineering and using some external hardware...

Digital Car Keys Are Coming
From Schneier on Security

Digital Car Keys Are Coming

Soon we will be able to unlock and start our cars from our phones. Let’s hope people are thinking about security.

Secret White House Warrantless Surveillance Program
From Schneier on Security

Secret White House Warrantless Surveillance Program

There seems to be no end to warrantless surveillance: According to the letter, a surveillance program now known as Data Analytical Services (DAS) has for more than...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account