Discover one of our 28 local entrepreneurial communities »
Be the first to know as we launch in new countries and markets around the globe.
Interested in bringing MIT Technology Review to your local market?
Unsupported browser: Your browser does not meet modern web standards. See how it scores »
A proposed “proof” is probably a bust–but even failed attempts can advance computer science.
New details of the NSA’s capabilities suggest encryption can still be trusted. But more effort is needed to fix problems with how it is used.
A new approach to encryption beats attackers by presenting them with fake data.
As other countries have discovered, businesses need encrypted communications.
New hardware should make it possible for all online data to be as secure as a credit card transaction.
Users can share information, but the network only sees encrypted data.
A cryptographic method could see cloud services work with sensitive data without ever decrypting it.
Leaked documents suggest that American spies can decrypt much of the data they collect by tapping into Internet service providers and telecommunications cables.
It could take a year to patch up a flaw to a key Internet protocol.