Discover one of our 28 local entrepreneurial communities »
Be the first to know as we launch in new countries and markets around the globe.
Interested in bringing MIT Technology Review to your local market?
Unsupported browser: Your browser does not meet modern web standards. See how it scores »
A new approach to encryption beats attackers by presenting them with fake data.
New details of the NSA’s capabilities suggest encryption can still be trusted. But more effort is needed to fix problems with how it is used.
Leaked documents suggest that American spies can decrypt much of the data they collect by tapping into Internet service providers and telecommunications cables.
As other countries have discovered, businesses need encrypted communications.
New hardware should make it possible for all online data to be as secure as a credit card transaction.
The encryption protecting mobile-device data transmission is permeable.
A proposed “proof” is probably a bust–but even failed attempts can advance computer science.
Users can share information, but the network only sees encrypted data.
A cryptographic method could see cloud services work with sensitive data without ever decrypting it.
It could take a year to patch up a flaw to a key Internet protocol.