Andy Greenberg

Andy Greenberg appears in the following:

The Battle Over 3-D Guns

Friday, August 03, 2018

Cody Wilson envisions a world in which everyone is free to manufacture their own guns. Can he be stopped?

The Legal Battle Surrounding 3D-Printable Guns

Wednesday, August 01, 2018

Andy Greenberg discusses the current legal battle which decides whether banning 3-D printable guns is a violation of free speech and the 2nd Amendment.

Using Software to Make an Untraceable Assault Rifle

Thursday, June 11, 2015

Technology has made it far easier to make a working weapon with no serial number, and a senior writer at WIRED tests out these technologies himself and makes an assault rifle. 

Comments [1]

Building an Untraceable Gun at Home

Tuesday, June 09, 2015

For $1,500, a little bit of time and tech savvy, anyone can make a fully functionally and completely untraceable AR-15 right in their home.

Comments [17]

Planting the Seeds of Revolution with Smuggled Episodes of 'Friends'

Tuesday, March 24, 2015

So no one told you life was gonna be this way...in North Korea.

Comment

WikiLeakers, Cypherpunks, and Hacktivists

Friday, November 23, 2012

Forbes journalist Andy Greenberg traces the history of the activists trying to free the world’s institutional secrets, from the cryptography revolution of the 1970s to Wikileaks’ founding hacker Julian Assange, Anonymous, and beyond. In This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World's Information, he explains how hackers access private files of government agencies and corporations, bringing on a new age of whistle blowing.

Comments [1]

Activist Hackers

Wednesday, September 19, 2012

Forbes journalist Andy Greenberg traces the history of the activists trying to free the world’s institutional secrets, from the cryptography revolution of the 1970s to Wikileaks’ founding hacker Julian Assange, Anonymous, and beyond. In This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World's Information, he explains how hackers access private files of government agencies and corporations, bringing on a new age of whistle blowing.

Comments [1]