Every day, millions of singles crawl dating sites and apps, flipping through photos and profiles of potential matches.Wired From ACM Opinion | February 5, 2014
How does the NSA get the private crypto keys that allow it to bulk eavesdrop on some email providers and social networking sites?Wired From ACM Opinion | February 3, 2014
My expectations were low when I asked the National Security Agency to cooperate with my story on the impact of Edward Snowden’s leaks on the tech industry.Wired From ACM Opinion | January 15, 2014
A few weeks into the making of Her, Spike Jonze's new flick about romance in the age of artificial intelligence, the director had something of a breakthrough.Wired From ACM Opinion | January 13, 2014
We're at a crisis point now with regard to the security of embedded systems, where computing is embedded into the hardware itself—as with the Internet of Things...Wired From ACM Opinion | January 7, 2014
Whenever an app, a website, or a physical product like a gaming console is exported, it ships with a side of cultural influence.Wired From ACM Opinion | December 13, 2013
Maybe it's your mom and/or dad. Maybe it's a sibling or a grandparent. Or maybe it's just that one friend who still uses a Motorola Razr from the early 2000s.Wired From ACM Opinion | November 27, 2013
For the first time in memory, adults in the United States under age forty are now expected to be poorer than their parents.Wired From ACM Opinion | November 25, 2013
The internet backbone—the infrastructure of networks upon which internet traffic travels—went from being a passive infrastructure for communication to an active...Wired From ACM Opinion | November 14, 2013
Since I started working with Snowden’s documents, I have been using a number of tools to try to stay secure from the NSA.Wired From ACM Opinion | October 9, 2013
It is now 30 years since I launched the campaign for freedom in computing, that is, for software to be free or "libre" (we use that word to emphasize that we're...Wired From ACM Opinion | October 1, 2013