Year: 2002

  • Tauzin Circulating Draft "Broadcast Flag" Bill

    Rep. Billy Tauzin is circulating a draft of a bill that would restrict digital technology. One effect of the bill would be to mandate “broadcast flag” technology. The bill has not yet been introduced.

  • Misleading Term of the Week: "Trusted System"

    The term “trusted system” is often used in discussing Digital Rights/Restrictions Management (DRM). Somehow the “trusted” part is supposed to make us feel better about the technology. Yet often the things that make the system “trusted” are precisely the things we should worry about. The meaning of “trusted” has morphed at least twice over the…

  • Comments on White House Cybersecurity Plan

    As a computer security researcher and teacher, I was interested to see the White House’s draft cybersecurity plan. It looks to be mostly harmless, but there are a few things in it that surprised me. First, I was surprised at the strong focus on issues late in the product lifecycle. Security is an issue throughout…

  • Lessig/DRM/End-To-End Debate: Resolved?

    Larry Lessig and I had a brief blog-discussion last week about the meaning of the end-to-end principle(s), and how end-to-end applies to DRM. The discussion continued off-line, and we ended up in pretty close agreement. Here is my version of what we agree on: (1) End-to-end is not a single principle, but a cluster of…

  • White House Cybersecurity Plan: On Life Support?

    The White House’s “National Strategy to Secure Cyberspace,” initially slated for release on Wednesday, has been delayed, the Washington Post reports. This comes on the heels of the removal of some of the report’s proposals, and a leak of the draft proposal. It looks like the report will end up as an eloquent expression of…

  • ABC News Hires "Hackers" to Disrupt Police

    ABC News reports on their own hiring of “hackers” to disrupt the Huntington Beach, CA police department. (Start reading at the “Testing the system” heading.) They tried to trick an officer into leaving his post to investigate a false “emergency.” They tried to infect the Chief’s computer with a virus. (Fortunately, neither of these attacks…

  • Ernest Miller on Lessig/DRM

    Great new entry in the Lessig/DRM debate, from Ernest Miller at Lawmeme. This is starting to turn from a narrow debate about Lessig’s piece into a wider discussion of how to think about DRM and Palladium. I’m eager to see this wider discussion start.

  • Low-Tech DRM

    Today’s New York Times reports that Epic Records has taken a decidedly low-tech approach to DRM in pre-releasing two new albums to critics: … the CD’s [are] already inside Sony Walkman players that have been glued shut. Headphones are also glued into the players, to prevent connecting the Walkman to a recording device. Needless to…

  • Serious Linux Worm

    New.com reports on a new worm infecting Linux/Apache servers. (A “worm” is a malicious standalone program that propagates on its own, without requiring any human action.) A new worm that attacks Linux Web servers has compromised more than 3,500 machines, creating a rogue peer-to-peer network that has been used to attack other computers with a…

  • Network Centric DRM

    Remember when I promised not to post anymore on Lessig’s DRM piece? I lied. I just have to respond to a comment from Lessig himself. He writes: … Felten is skeptical that copyprotection would be placed in the network. “From an engineer standpoint, that assumption looks wrong to me,” he says. But what if we…