Leaked documents suggest that American spies can decrypt much of the data they collect by tapping into Internet service providers and telecommunications cables.
Tom SimoniteFollow @twitterapi
IT Editor, Software & Hardware
I’m MIT Technology Review’s IT editor for hardware and software and enjoy a diverse diet of algorithms, Internet, and human-computer interaction with chips on the side. Working in our San Francisco office, I cover new ideas about what computers can do for us, whether they spring from tech giants, new startups, or academic labs.
My journey to the West Coast started in a small English town called Wantage and took in the University of Cambridge, Imperial College London, and five years writing and editing technology news coverage at New Scientist magazine.
Tom Simonite's Stories
Analyzing the public traces left by every bitcoin transaction could allow law enforcement to identify many users of a currency often assumed to offer anonymity.
Acxiom has files on 290 million U.S. residents. Now you can see some of what it knows about you.
Silicon chips with optical technology allow a new form of superfast data connection.
While U.S. troops readied for a possible military assault Tuesday, pro-Syrian hackers brought down the NYT and crippled Twitter
Streaming designs to 3-D printers like Netflix does movies could prevent unauthorized copying.
Meet the ring that can be used to start a car, and unlock a door or smartphone.
Blackberry is up for sale and a bundle of 130 encryption patents could be the company's most valuable technology
Researchers spent $5,000 buying Twitter accounts from spammers in an attempt to learn how to outwit them.
Tricks such as tracking the temperature of smartphones' batteries enables them to provide useful atmospheric data.