Today, EFF announced that it was making a formal objection to including consideration of digital rights management (DRM) in the First Public Working Draft from...Electronic Frontier Foundation From ACM Opinion | May 30, 2013
It's been a year since the first reports of the Flame malware surfaced, and looking back at the 12 months since then, it seems more and more each day that the discovery...Threatpost From ACM Opinion | May 28, 2013
Recently, the FBI has been attacking the "going dark" problem—that is, its inability to read all electronic communications—from both legal and technological angles...Slate From ACM Opinion | May 28, 2013
Connecting Internet access with freedom of expression and creativity.Stephen B. Wicker, Stephanie M. Santoso From Communications of the ACM | June 1, 2013
Rules of thumb stated as numerical rules are enticing, but many are folk theorems that may not apply in your critical situation.Peter J. Denning From Communications of the ACM | June 1, 2013
I join a group of twenty computer scientists in issuing a report criticizing an FBI plan to require makers of secure communication tools to redesign their systems...Freedom To Tinker From ACM Opinion | May 17, 2013
The goal of the U.S. patent system is clear: to provide individuals or companies with an incentive to innovate by offering them 20 years of exclusive rights to...The Wall Street Journal From ACM Opinion | May 17, 2013
The future came crashing down on me this week at the Google I/O developer conference while I stood at a bathroom urinal.The New York Times From ACM Opinion | May 17, 2013
Aaron Swartz was not yet a legend when, almost two years ago, I asked him to build an open-source, anonymous in-box.The New Yorker From ACM Opinion | May 17, 2013
Given that Bitcoin first broke into mainstream attention when Gawker explained how to use it to buy drugs, perhaps the surprise is that it took federal regulators...The Washington Post From ACM Opinion | May 15, 2013
We now live in a world where public servants informing the public about government behavior or wrongdoing must practice the tradecraft of drug dealers and spies...Wired From ACM Opinion | May 15, 2013
A Social Security number is like a skeleton key, able to unlock a kingdom of untold riches for identity thieves.ABC News From ACM Opinion | May 10, 2013
In June 2011, just a few short months after protests first erupted in Syria, the country's president, Bashar Al-Assad, made a speech in which he thanked a group...Slate From ACM Opinion | May 10, 2013
The Syrian Electronic Army launched a successful cyberattack on the main infrastructure system of Haifa, one of the most important ports in Israel, disrupting the...Fars News Agency From ACM Opinion | May 10, 2013