My expectations were low when I asked the National Security Agency to cooperate with my story on the impact of Edward Snowden’s leaks on the tech industry.Wired From ACM Opinion | January 15, 2014
We're at a crisis point now with regard to the security of embedded systems, where computing is embedded into the hardware itself—as with the Internet of Things...Wired From ACM Opinion | January 7, 2014
Whenever an app, a website, or a physical product like a gaming console is exported, it ships with a side of cultural influence.Wired From ACM Opinion | December 13, 2013
Maybe it's your mom and/or dad. Maybe it's a sibling or a grandparent. Or maybe it's just that one friend who still uses a Motorola Razr from the early 2000s.Wired From ACM Opinion | November 27, 2013
For the first time in memory, adults in the United States under age forty are now expected to be poorer than their parents.Wired From ACM Opinion | November 25, 2013
Both consumer electronics and apparel are notoriously difficult businesses competing in mature industries. Wearable technology—everything from activity trackers...Wired From ACM Opinion | November 20, 2013
The internet backbone—the infrastructure of networks upon which internet traffic travels—went from being a passive infrastructure for communication to an active...Wired From ACM Opinion | November 14, 2013
Since I started working with Snowden’s documents, I have been using a number of tools to try to stay secure from the NSA.Wired From ACM Opinion | October 9, 2013
When Apple bought AuthenTec for its biometrics technology—reported as one of its most expensive purchases—there was a lot of speculation about how the company would...Wired From ACM Opinion | September 9, 2013
We now know that every day, U.S. phone companies quietly send the government a list of who called whom and when—"telephony metadata"—for every call made on their...Wired From ACM Opinion | June 20, 2013