When riot police descended on protesters in Ferguson, Missouri, last year sporting assault rifles and armored vehicles, the images sparked an awareness of the military...Ars Technica From ACM Careers | December 11, 2015
For years, privacy advocates have pushed developers of websites, virtual private network apps, and other cryptographic software to adopt the Diffie-Hellman cryptographic...Ars Technica From ACM News | October 19, 2015
A National Security Agency memo that recently resurfaced a few years after it was first published contains a detailed analysis of what very possibly was the world's...Ars Technica From ACM News | October 14, 2015
Europe's top court, the Court of Justice of the European Union (CJEU), has struck down the 15-year-old Safe Harbour agreement that allowed the free flow of information...Ars Technica From ACM News | October 6, 2015
Quantum key distribution is regularly touted as the encryption of the future. While the keys are exchanged on an insecure channel, the laws of physics provide a...Ars Technica From ACM News | August 25, 2015
A new technology called "RoboKiller" has won a $25,000 grand prize from the Federal Trade Commission in the agency's "Robocalls: Humanity Strikes Back" contest...Ars Technica From ACM Careers | August 24, 2015
The U.K.'s Information Commissioner's Office (ICO) has ordered Google to remove links from its search results that point to news stories reporting on earlier removals...Ars Technica From ACM News | August 24, 2015
The National Security Agency is advising U.S. agencies and businesses to prepare for a time in the not-too-distant future when the cryptography protecting virtually...Ars Technica From ACM News | August 21, 2015
In 2013, the Supreme Court rejected a challenge to a once-clandestine warrantless surveillance program that gobbles up Americans' electronic communications—a project...Ars Technica From ACM News | June 30, 2015
Government officials have been vague in their testimony about the data breaches—there was apparently more than one—at the Office of Personnel Management.Ars Technica From ACM News | June 23, 2015
In a surprise decision, the European Court of Human Rights (ECHR) in Strasbourg has ruled that the Estonian news site Delfi may be held responsible for anonymous...Ars Technica From ACM News | June 17, 2015
Thanks to resistance from Senator Rand Paul and other members of the Senate, the provisions of the USA Patriot Act that were used to justify the National Security...Ars Technica From ACM News | June 3, 2015
As part of a series of experiments, a group of researchers at the University of Washington's BioRobotics Lab launched denial-of-service attacks against a remotely...Ars Technica From ACM News | May 11, 2015
An Icelandic genetics firm has sequenced the genomes of 2,636 of its countrymen and women, finding genetic markers for a variety of diseases, as well as a new timeline...Ars Technica From ACM News | March 30, 2015
Someone who knows things about us has some measure of control over us, and someone who knows everything about us has a lot of control over us.Ars Technica From ACM Opinion | February 26, 2015
Citizenfour is filmmaker Laura Poitras' account of the first meetings between herself, Glenn Greenwald, and Edward Snowden.Ars Technica From ACM Opinion | February 23, 2015
News that a hacking group within or associated with the National Security Agency compromised the firmware of hard drive controllers from a number of manufacturers...Ars Technica From ACM News | February 19, 2015
Long the domain of science fiction, researchers are now working to create software that perfectly models human and animal brains.Ars Technica From ACM News | February 19, 2015
Two Washington state legislators have recently introduced a bill that would allow computer science class (e.g., programming) to effectively count as a foreign language...Ars Technica From ACM Careers | February 10, 2015