Year: 2008
-
Palin's email breached through weak Yahoo password recovery mechanism
This week’s breach of Sarah Palin’s Yahoo Mail account has been much discussed. One aspect that has gotten less attention is how the breach occurred, and what it tells us about security and online behavior. (My understanding of the facts is based on press stories, and on reading a forum post written by somebody claiming…
-
Hurricane Ike status report
Many people have been emailing me to send their best wishes. I thought it would be helpful to post a brief note on what happened and where we’re all at. As you know, Hurricane Ike hit shore early Saturday morning. The wind, combined with a massive storm surge, caused staggering devastation along the Texas coast.…
-
Welcome to the new Freedom to Tinker
Welcome to the new, redesigned Freedom to Tinker. Beyond giving it a new look, we have rebuilt the site as a blogging community, to highlight the contributions of more authors. The front page and main RSS feed will offer a combination of posts from all authors. We have also added a blog page (and feed)…
-
On digital TV and natural disasters
As I’m writing this, the eye of Hurricane Ike is roughly ten hours from landfall. The weather here, maybe 60 miles inland, is overcast with mild wind. Meanwhile, the storm surge has already knocked out power for ten thousand homes along the coast, claims the TV news, humming along in the background as I write…
-
Preparing for a natural disaster
As Tinker readers may know, I live in Houston, Texas, and we’ve got Hurricane Ike bearing down on us. Twenty-four hours ago, I was busy with everything else and hadn’t even stopped to think about it. Earlier this week, the forecasts had Ike going far south of here. That all changed and now it appears…
-
A curious phone scam
My phone at work rings. The caller ID has a weird number (“50622961841” – yes, it’s got an extra digit in it). I answer. It’s a recording telling me I can get lower rates on my card (what card?) if I just hit one to connect me to a representative. Umm, okay. “1”. Recorded voiced:…
-
It can be rational to sell your private information cheaply, even if you value privacy
One of the standard claims about privacy is that people say they value their privacy but behave as if they don’t value it. The standard example involves people trading away private information for something of relatively little value. This argument is often put forth to rebut the notion that privacy is an important policy value.…
-
Come Join Us Next Spring
It’s been an exciting summer here at the Center for Information Technology Policy. On Friday, we’ll be moving into a brand new building. We’ll be roughly doubling our level of campus activity—lectures, symposia and other events—from last year. You’ll also see some changes to our online activities, including a new, expanded Freedom to Tinker that…
-
Cheap CAPTCHA Solving Changes the Security Game
ZDNet’s “Zero Day” blog has an interesting post on the gray-market economy in solving CAPTCHAs. CAPTCHAs are those online tests that ask you to type in a sequence of characters from a hard-to-read image. By doing this, you prove that you’re a real person and not an automated bot – the assumption being that bots…
-
Lenz Ruling Raises Epistemological Questions
Stephanie Lenz’s case will be familiar to many of you: After publishing a 29-second video on YouTube that shows her toddler dancing to the Prince song “Let’s Go Crazy,” Ms. Lenz received email from YouTube, informing her that the video was being taken down at Universal Music’s request. She filed a DMCA counter-notification claiming the…