Responding to a court order, Yahoo reportedly made custom software to scan billions of emails for terrorist ties. Beyond constitutionality, the legality of compulsory tool development remains an open question.
Hardly a modern invention, encryption has been in use for almost 4,000 years. Take a brief journey through history as we highlight some of the seminal moments in the development of coded communications.
Security researcher Marie Moe has a personal and potentially dangerous connection to the Internet: Following a medical emergency, Moe was outfitted with a pacemaker, in which she has discovered cybersecurity vulnerabilities, she reveals at hacker conference CCC.
While several tech titans require warrants to give police and prosecutors access to customers’ older stored communications, countless Internet companies with fewer legal resources likely are complying with agency-issued subpoenas.
From Star Wars to Antarctica, the comic book author and novelist envisions worlds where war, corporate malfeasance, and climate change have run amok. What does his totalitarian Lazarus bode for privacy? The Parallax asks Rucka.