January 19, 2015
The more computers become part of us and we become part of them, the more opportunities for surveillance and hacking are introduced. Cell phones already track our whereabouts, log our tastes, and store our private e-mails, but personal handheld devices are only the tip of the iceberg. Modern cars and buildings are computer-reliant and advances in the medical field mean we are wearing computers as pacemakers, cochlear implants, and even prosthetic limbs.
