acm-header
Sign In

Communications of the ACM

Recent Opinion



Mark Zuckerberg on Facebook's Future, From Virtual Reality to Anonymity
From ACM Opinion

Mark Zuckerberg on Facebook's Future, From Virtual Reality to Anonymity

No one ever accused Mark Zuckerberg of standing pat.

Michael Lewis on Exposing Wall Street's Biggest High-Tech Swindle
From ACM Opinion

Michael Lewis on Exposing Wall Street's Biggest High-Tech Swindle

Flash Boys explores the world of high-frequency trading, a scheme in which traders use ultra-fast network connections to sniff out the intentions of other, slower...

It's Time to Encrypt the Entire Internet
From ACM Opinion

It's Time to Encrypt the Entire Internet

The Heartbleed bug crushed our faith in the secure Web, but a world without the encryption software that Heartbleed exploited would be even worse.

A Close Look at the Nsa's Most Powerful Internet Attack Tool
From ACM Opinion

A Close Look at the Nsa's Most Powerful Internet Attack Tool

We already knew that the NSA has weaponized the Internet, enabling it to "shoot" exploits at anyone it desires.

Why You Should Embrace Surveillance, Not Fight It
From ACM Opinion

Why You Should Embrace Surveillance, Not Fight It

I once worked with Steven Spielberg on the development of Minority Report, derived from the short story by Philip K. Dick featuring a future society that uses surveillance...

Why Copyrighted Coffee May Cripple the Internet of Things
From ACM Opinion

Why Copyrighted Coffee May Cripple the Internet of Things

With its single-serving coffee pods, Green Mountain Coffee has transformed the business of brew.

This Ingenious Touchscreen ­i Should Be in Every Car
From ACM Opinion

This Ingenious Touchscreen ­i Should Be in Every Car

There may be no greater design crime today than putting a touchscreen in an automobile.

Tim Berners-Lee: We Need to Re-Decentralise the Web
From ACM Opinion

Tim Berners-Lee: We Need to Re-Decentralise the Web

Twenty-five years on from the web's inception, its creator has urged the public to re-engage with its original design: a decentralised internet that at its very...

How to Create the Perfect Online Dating Profile, in 25 Infographics
From ACM Opinion

How to Create the Perfect Online Dating Profile, in 25 Infographics

Every day, millions of singles crawl dating sites and apps, flipping through photos and profiles of potential matches.

Judges Poised to Hand ­.s. Spies the Keys to the Internet
From ACM Opinion

Judges Poised to Hand ­.s. Spies the Keys to the Internet

How does the NSA get the private crypto keys that allow it to bulk eavesdrop on some email providers and social networking sites?

I Spent Two Hours Talking With the Nsa's Bigwigs. Here's What Has Them Mad
From ACM Opinion

I Spent Two Hours Talking With the Nsa's Bigwigs. Here's What Has Them Mad

My expectations were low when I asked the National Security Agency to cooperate with my story on the impact of Edward Snowden’s leaks on the tech industry.

The Internet of Things Is Wildly Insecure—and Often ­npatchable
From ACM Opinion

The Internet of Things Is Wildly Insecure—and Often ­npatchable

We're at a crisis point now with regard to the security of embedded systems, where computing is embedded into the hardware itself—as with the Internet of Things...

Doom's Creator Looks Back on 20 Years of Demonic Mayhem
From ACM Opinion

Doom's Creator Looks Back on 20 Years of Demonic Mayhem

At the stroke of midnight on December 10, 1993, an executive at id Software uploaded a file to an FTP site on the University of Washington's network.

Our Government Has Weaponized the Internet. Here's How They Did It
From ACM Opinion

Our Government Has Weaponized the Internet. Here's How They Did It

The internet backbone—the infrastructure of networks upon which internet traffic travels—went from being a passive infrastructure for communication to an active...

How to Design—and Defend Against—the Perfect Security Backdoor
From ACM Opinion

How to Design—and Defend Against—the Perfect Security Backdoor

We already know the NSA wants to eavesdrop on the Internet. 

Want to Evade Nsa Spying? Don't Connect to the Internet
From ACM Opinion

Want to Evade Nsa Spying? Don't Connect to the Internet

Since I started working with Snowden’s documents, I have been using a number of tools to try to stay secure from the NSA.

Why Free Software Is More Important Now Than Ever Before
From ACM Opinion

Why Free Software Is More Important Now Than Ever Before

It is now 30 years since I launched the campaign for freedom in computing, that is, for software to be free or "libre" (we use that word to emphasize that we're...

If the New Iphone Has Fingerprint Authentication, Can It Be Hacked?
From ACM Opinion

If the New Iphone Has Fingerprint Authentication, Can It Be Hacked?

When Apple bought AuthenTec for its biometrics technology—reported as one of its most expensive purchases—there was a lot of speculation about how the company would...

How Advanced Is the NSA's Cryptanalysis—And Can We Resist It?
From ACM Opinion

How Advanced Is the NSA's Cryptanalysis—And Can We Resist It?

The latest Snowden document is the U.S. intelligence "black budget."

How Protecting Your Privacy Could Make You the Bad Guy
From ACM Opinion

How Protecting Your Privacy Could Make You the Bad Guy

There's a funny catch-22 when it comes to privacy best practices.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account