Every day, millions of singles crawl dating sites and apps, flipping through photos and profiles of potential matches.Wired From ACM Opinion | February 5, 2014
How does the NSA get the private crypto keys that allow it to bulk eavesdrop on some email providers and social networking sites?Wired From ACM Opinion | February 3, 2014
My expectations were low when I asked the National Security Agency to cooperate with my story on the impact of Edward Snowden’s leaks on the tech industry.Wired From ACM Opinion | January 15, 2014
We're at a crisis point now with regard to the security of embedded systems, where computing is embedded into the hardware itself—as with the Internet of Things...Wired From ACM Opinion | January 7, 2014
For the first time in memory, adults in the United States under age forty are now expected to be poorer than their parents.Wired From ACM Opinion | November 25, 2013
The internet backbone—the infrastructure of networks upon which internet traffic travels—went from being a passive infrastructure for communication to an active...Wired From ACM Opinion | November 14, 2013
Since I started working with Snowden’s documents, I have been using a number of tools to try to stay secure from the NSA.Wired From ACM Opinion | October 9, 2013
We now know that every day, U.S. phone companies quietly send the government a list of who called whom and when—"telephony metadata"—for every call made on their...Wired From ACM Opinion | June 20, 2013
Physically, the NSA has always been well protected by miles of high fences and electrified wire, thousands of cameras, and gun-toting guards.Wired From ACM Opinion | June 14, 2013