Month: March 2005
-
Grokster: The Case is Submitted
Greetings Freedom to Tinker readers! I’m Alex Halderman, one of Ed Felten’s grad students at Princeton. I’d like to thank Ed for the opportunity to be a regular contributor to this site. On Tuesday I had the privilege of attending the MGM v. Grokster oral arguments along with several students from Ed’s Information Technology and…
-
Sony Plans to Emulate Apple, in a Non-Apple-Like Way
Sony says it wants to create a system that does for movies what Apple’s iTunes does for music, according to a CNET story by Stefanie Olsen. Unfortunately Sony doesn’t seem to understand what Apple did: “We want to set business models, pricing models, distribution models like (Apple Computer CEO Steve) Jobs did for music, but…
-
Welcome to Alex Halderman
I’m pleased to announce that Alex Halderman, a second-year graduate student who works with me, now has a byline here on Freedom to Tinker. Alex works on computer security and infotech policy, and has done interesting research on topics such as compact disc copy protection and privacy-enhancing technology. He plans to attend the Grokster oral…
-
A (True) Story for Grokster Eve
Recently I met a promising young computer scientist, whose name I will withhold for reasons that will soon be evident. He has developed a very interesting network software system that would be useful for a great many legitimate applications. I was impressed by his system and wondered why I hadn’t heard of it before. The…
-
Coming: Mobile Phone Viruses
Clive Thompson at Slate has a scary-sounding new piece about cellphone viruses. As phones get smart – as they start running general-purpose operating systems and having complex software interfaces – they will tend to develop the kinds of software bugs that viruses can exploit. And as phones become more capable, virus-infected phones will be able…
-
Apple Closes iTunes Store "Security Hole"
Last week, DVD-Jon and two colleagues released PyMusique, a tool for buying songs from Apple’s iTunes Music Store (iTMS) site. This got some people upset, because songs bought with PyMusique were not encumbered by any copy protection. Now Apple, predictably, has updated iTMS to make it incompatible with PyMusique. The standard narrative about this goes…
-
Cornell Researchers on P2P Quality Control
Kevin Walsh and Emin Gün Sirer, of Cornell University, have a new paper on Credence, a system for detecting unwanted files in P2P networks. It’s a kind of reputation system for files, designed to detect in advance that certain files are not what they claim to be. One use of this technology is to detect…
-
Godwin's Law, Updated
One of the most famous observations about online discussions is Godwin’s Law: As an online discussion grows longer, the probability of a comparison involving Nazis or Hitler approaches one. When it comes to copyright policy, a related law seems to hold: As a copyright policy discussion grows longer, the probability of pornography being invoked approaches…
-
Pharm Policy
I wrote Monday about pharming attacks, in which a villain corrupts the DNS system, which translates textual names (like “www.freedom-to-tinker.com”) into the IP addresses (like “216.157.129.231”) that are used to route traffic on the Internet. By doing this, the villain can impersonate an Internet site convincingly. Today I want to talk about how to address…
-
Unwanted Calls and Spam on VoIP
Fred Cohen is predicting that VoIP will bring with it a flood of unsolicited commercial phone calls. (VoIP, or “Voice over Internet Protocol,” systems deliver telephone-like service, making connections via the Internet rather than using the wires of the plain old telephone system.) Cohen argues that VoIP will drive down the cost of international calling…