Sign In

Communications of the ACM

Recent Opinion



The Blockchain Solution to Our Deepfake Problems
From ACM Opinion

The Blockchain Solution to Our Deepfake Problems

Blockchain has always seemed to me like a solution looking for a problem, which isn't a criticism.

The FCC Should ­se Blockchain to Manage Wireless Spectrum
From ACM Opinion

The FCC Should ­se Blockchain to Manage Wireless Spectrum

The technology at the heart of cryptocurrencies like bitcoin—blockchain—has captured the world's attention, much as the internet, peer-to-peer file transfers, apps...

In ­S v. Microsoft, a Decades-Old Law Leaves Few Good Options
From ACM Opinion

In ­S v. Microsoft, a Decades-Old Law Leaves Few Good Options

On Tuesday, the Supreme Court heard oral argument in United States v. Microsoft, a case that many observers believe could have significant ramifications for how...

How Snapchat Is Sending #MeToo Down the Memory Hole
From ACM Opinion

How Snapchat Is Sending #MeToo Down the Memory Hole

If you have something personal or private to communicate, you know where to turn.

Mourning John Perry Barlow, the Bard of the Internet
From ACM Opinion

Mourning John Perry Barlow, the Bard of the Internet

When I first met John Perry Barlow, we became instant soulmates. While that sentence is true for me, it also applies to probably 10,000 other people.

Congress Renews Warrantless Surveillance, and Makes It Even Worse
From ACM Opinion

Congress Renews Warrantless Surveillance, and Makes It Even Worse

In 2013, Edward Snowden revealed that the National Security Agency was legally collecting millions of Americans' phone calls and electronic communications—including...

The Year the Home Button Died
From ACM Opinion

The Year the Home Button Died

The most convincing lie Steve Jobs ever told was "you already know how to use it."

Don't Get Your Kid an Internet-Connected Toy
From ACM Opinion

Don't Get Your Kid an Internet-Connected Toy

For last-minute shoppers, tech toys hold a special appeal.

Quantum Computing Is the Next Big Security Risk
From ACM Opinion

Quantum Computing Is the Next Big Security Risk

The 20th century gave birth to the Nuclear Age as the power of the atom was harnessed and unleashed.

Bitcoin Mining Guzzles Energy and Its Carbon Footprint Just Keeps Growing
From ACM Opinion

Bitcoin Mining Guzzles Energy and Its Carbon Footprint Just Keeps Growing

A somewhat neglected issue in discussions of bitcoin is the tremendous increase in power consumption used by miners. The rising power required to mine bitcoin conflicts...

The Quantum Spy Author David Ignatius on the Future of High-Tech Espionage
From ACM Opinion

The Quantum Spy Author David Ignatius on the Future of High-Tech Espionage

The intersection of quantum computing and espionage may feel like a faraway future. But in his latest novel, David Ignatius, Washington's own John le Carré, tackles...

Ditch All Those Other Messaging Apps: Here's Why You Should ­se Signal
From ACM Opinion

Ditch All Those Other Messaging Apps: Here's Why You Should ­se Signal

Stop me if you've heard this before.

Net States Rule the World; We Need to Recognize Their Power
From ACM Opinion

Net States Rule the World; We Need to Recognize Their Power

"We reject: kings, presidents, and voting. We believe in: rough consensus and running code." So declared MIT professor David D. Clark in 1992.

Provoking Iran Could Have ­nseen Cyber Consequences
From ACM Opinion

Provoking Iran Could Have ­nseen Cyber Consequences

On Friday, President Trump announced that he will not certify Iran's cooperation with the 2015 nuclear agreement negotiated by the Obama Administration.

I Helped Create Facebook's Ad Machine. Here's How I'd Fix It
From ACM Opinion

I Helped Create Facebook's Ad Machine. Here's How I'd Fix It

This month, two magnificently embarrassing public-relations disasters rocked the Facebook money machine like nothing else in its history.

Software Has a Serious Supply-Chain Security Problem
From ACM Opinion

Software Has a Serious Supply-Chain Security Problem

The warnings consumers hear from information security pros tend to focus on trust: Don't click web links or attachments from an untrusted sender.

Apple's Faceid Could Be a Powerful Tool For Mass Spying
From ACM Opinion

Apple's Faceid Could Be a Powerful Tool For Mass Spying

This Tuesday Apple unveiled a new line of phones to much fanfare, but one feature immediately fell under scrutiny:FaceID, a tool that would use facial recognition...

Sorry, Banning 'killer Robots' Just Isn't Practical
From ACM Opinion

Sorry, Banning 'killer Robots' Just Isn't Practical

Late Sunday, 116 entrepreneurs, including Elon Musk, released a letter to the United Nations warning of the dangerous "Pandora's Box" presented by weapons that...

Letting Cyberattack Victims Hack Back Is a Very ­nwise Idea
From ACM Opinion

Letting Cyberattack Victims Hack Back Is a Very ­nwise Idea

As the rate of cybercrime increases, so too does the intensity of those attacks.

AI Could Revolutionize War As Much As Nukes
From ACM Opinion

AI Could Revolutionize War As Much As Nukes

In 1899, the world's most powerful nations signed a treaty at The Hague that banned military use of aircraft, fearing the emerging technology's destructive power...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account