Year: 2009
-
Inaccurate Copyright Enforcement: Questionable "best" practices and BitTorrent specification flaws
[Today we welcome my Princeton Computer Science colleague Mike Freedman. Mike’s research areas include computer systems, network software, and security. He writes a technical blog about these topics at Princeton S* Network Systems — required reading for serious systems geeks like me. — Ed Felten] In the past few weeks, Ed has been writing about…
-
Robots and the Law
Stanford Law School held a panel Thursday on “Legal Challenges in an Age of Robotics”. I happened to be in town so I dropped by and heard an interesting discussion. Here’s the official announcement: Once relegated to factories and fiction, robots are rapidly entering the mainstream. Advances in artificial intelligence translate into ever-broadening functionality and…
-
Targeted Copyright Enforcement vs. Inaccurate Enforcement
Let’s continue our discussion about copyright enforcement against online infringers. I wrote last time about how targeted enforcement can deter many possible violators even if the enforcer can only punish a few violators. Clever targeting of enforcement can destroy the safety-in-numbers effect that might otherwise shelter a crowd of would-be violators. In the online copyright…
-
Targeted Copyright Enforcement: Deterring Many Users with a Few Lawsuits
One reason the record industry’s strategy of suing online infringers ran into trouble is that there are too many infringers to sue. If the industry can only sue a tiny fraction of infringers, then any individual infringer will know that he is very unlikely to be sued, and deterrence will fail. Or so it might…
-
New York AG Files Antitrust Suit Against Intel
Yesterday, New York’s state Attorney General filed what could turn out to be a major antitrust suit against Intel. The suit accuses Intel of taking illegal steps to exclude a competitor, AMD, from the market. All we have so far is the NYAG’s complaint, which tells one side of the case. Intel will have ample…
-
Election Day; More Unguarded Voting Machines
It’s Election Day in New Jersey. As usual, I visited several polling places in Princeton over the last few days, looking for unguarded voting machines. It’s been well demonstrated that a bad actor who can get physical access to a New Jersey voting machine can modify its behavior to steal votes, so an unguarded voting…
-
Sequoia Announces Voting System with Published Code
Sequoia Voting Systems, one of the major e-voting companies, announced Tuesday that it will publish all of the source code for its forthcoming Frontier product. This is great news–an important step toward the kind of transparency that is necessary to make today’s voting systems trustworthy. To be clear, this will not be a fully open…
-
DRM by any other name: The latest from Hollywood
Sunday’s New York Times had an article, Studios’ Quest for Life After DVDs. To nobody’s surprise, consumers want to have convenient access to “their” media, wherever they happen to be, without all the annoying restrictions that come into play when you add DRM to the picture. To many people’s surprise, sales of DVDs (much less…
-
There’s anonymity on the Internet. Get over it.
In a recent interview prominent antivirus developer Eugene Kaspersky decried the role of anonymity in cybercrime. This is not a new claim – it is touched on in the Commission on Cybersecurity for the 44th Presidency Report and Cybersecurity Act of 2009, among others – but it misses the mark. Any Internet design would allow…
-
Net Neutrality: When is Network Management "Reasonable"?
Last week the FCC released its much-awaited Notice of Proposed Rulemaking (NPRM) on network neutrality. As expected, the NPRM affirms past FCC neutrality principles, and adds two more. Here’s the key language: 1. Subject to reasonable network management, a provider of broadband Internet access service may not prevent any of its users from sending or…