acm-header
Sign In

Communications of the ACM

Recent Opinion


bg-corner

Orson Scott Card Talks Ender's Game
From ACM Opinion

Orson Scott Card Talks Ender's Game

In Ender's Game, the Nebula Award-winning 1985 novel by Orson Scott Card, a 6-year-old boy is taken from his family on Earth to an orbital military academy to be...

How to Design—and Defend Against—the Perfect Security Backdoor
From ACM Opinion

How to Design—and Defend Against—the Perfect Security Backdoor

We already know the NSA wants to eavesdrop on the Internet. 

Want to Evade Nsa Spying? Don't Connect to the Internet
From ACM Opinion

Want to Evade Nsa Spying? Don't Connect to the Internet

Since I started working with Snowden’s documents, I have been using a number of tools to try to stay secure from the NSA.

How Ios 7 Will Spark a Boom in App Design
From ACM Opinion

How Ios 7 Will Spark a Boom in App Design

You probably feel strongly about iOS 7.

If the New Iphone Has Fingerprint Authentication, Can It Be Hacked?
From ACM Opinion

If the New Iphone Has Fingerprint Authentication, Can It Be Hacked?

When Apple bought AuthenTec for its biometrics technology—reported as one of its most expensive purchases—there was a lot of speculation about how the company would...

How Advanced Is the NSA's Cryptanalysis—And Can We Resist It?
From ACM Opinion

How Advanced Is the NSA's Cryptanalysis—And Can We Resist It?

The latest Snowden document is the U.S. intelligence "black budget."

How Protecting Your Privacy Could Make You the Bad Guy
From ACM Opinion

How Protecting Your Privacy Could Make You the Bad Guy

There's a funny catch-22 when it comes to privacy best practices.

Your Creative, Open Hackathon Is Ripe For Legal Challenges
From ACM Opinion

Your Creative, Open Hackathon Is Ripe For Legal Challenges

NASA's Space Apps Challenge recently became the world's largest open hackathon, with over 8,000 participants spanning 44 countries.

Phew, Nsa Is Just Collecting Metadata. (you Should Still Worry)
From ACM Opinion

Phew, Nsa Is Just Collecting Metadata. (you Should Still Worry)

We now know that every day, U.S. phone companies quietly send the government a list of who called whom and when—"telephony metadata"—for every call made on their...

Connecting the Dots on Prism, Phone Surveillance, and the Nsa's Massive Spy Center
From ACM Opinion

Connecting the Dots on Prism, Phone Surveillance, and the Nsa's Massive Spy Center

Physically, the NSA has always been well protected by miles of high fences and electrified wire, thousands of cameras, and gun-toting guards.

Senator Rand Paul Talks Tech, Civil Liberties, and Keeping the Government Out of Your Email
From ACM Opinion

Senator Rand Paul Talks Tech, Civil Liberties, and Keeping the Government Out of Your Email

Rand Paul is having some problems with the jerks back at the office. So today he's bypassing them on a road trip through Silicon Valley.

Meet the Man Who Sold a Month-Old App to Dropbox For $100m
From ACM Opinion

Meet the Man Who Sold a Month-Old App to Dropbox For $100m

When Mailbox sold itself to Dropbox for a reported $100 million or so this March, the month-old iPhone app wasn’t even available to the public.

Hear Ye, Future Deep Throats: This Is How to Leak to the Press
From ACM Opinion

Hear Ye, Future Deep Throats: This Is How to Leak to the Press

We now live in a world where public servants informing the public about government behavior or wrongdoing must practice the tradecraft of drug dealers and spies...

Let's Cut Through the Bitcoin Hype: A Hacker-Entrepreneur's Take
From ACM Opinion

Let's Cut Through the Bitcoin Hype: A Hacker-Entrepreneur's Take

Bitcoin. Everybody's talking about it. What's true, and what's hype? Perhaps the only thing that's clear about Bitcoin is that it's not going away anytime soon.

You'll Never Believe the Data 'wiped' Smartphones Store
From ACM Opinion

You'll Never Believe the Data 'wiped' Smartphones Store

Few things are more precious, intimate, and personal than the data on your smartphone.

How Relying on Algorithms and Bots Can Be Really, Really Dangerous
From ACM Opinion

How Relying on Algorithms and Bots Can Be Really, Really Dangerous

So you can’t wait for a self-driving car to take away the drudgery of driving? Me neither! But consider this scenario, recently posed by neuroscientist Gary Marcus...

What to Do After You've Been Hacked
From ACM Opinion

What to Do After You've Been Hacked

Evernote became the latest member of the "we’ve been hacked" club. And the thing is, what was once a pretty exclusive club now lets just about everyone in these...

Meet the Data Brains Behind the Rise of Facebook
From ACM Opinion

Meet the Data Brains Behind the Rise of Facebook

Jay Parikh sits at a desk inside Building 16 at Facebook’s headquarters in Menlo Park, California, and his administrative assistant, Genie Samuel, sits next to...

The Fbi Needs Hackers, Not Backdoors
From ACM Opinion

The Fbi Needs Hackers, Not Backdoors

Just imagine if all the applications and services you saw or heard about at CES earlier this month had to be designed to be "wiretap ready" before they could be...

Better Than Human: Why Robots Will—and Must—take Our Jobs
From ACM Opinion

Better Than Human: Why Robots Will—and Must—take Our Jobs

It's hard to believe you'd have an economy at all if you gave pink slips to more than half the labor force.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account