Year: 2013
-
The low-transaction-fee argument for Bitcoin is silly
A common argument advanced by Bitcoin proponents is that unlike banks and credit cards, Bitcoin has low (or even zero) transaction fees. The claim is a complete red herring, and in this post I’ll explain why. Let’s assume for the purposes of argument that Bitcoin transaction fees are, in fact, zero. There are small mining-related…
-
On the Legal Importance of Viewing Genes as Code
The Supreme Court yesterday issued its opinion in the much–awaited Myriad case, which challenged the validity of patents on isolated human genes. The Court held that the isolated genetic sequences claimed in Myriad’s patents did not satisfy the inventive threshold for patentability, although the complementary DNA (cDNA) claimed in the patents did. One of the…
-
Do Judges Play a Role After the NSA Call Records Have Been Collected?
Those who defend the NSA’s massive call records collection program point out that although the program allows indiscriminate data collection, it also meaningfully restricts data analysis and use. They note, in particular, this paragraph from Director of National Intelligence Clapper’s June 6, 2013, press release: By order of the FISC, the Government is prohibited from…
-
51% foreign test doesn't protect Americans
One of the notable claims we have heard, in light of the Verizon / PRISM revelations, is that data extraction measures are calibrated to make sure that 51% or more of affected individuals are non-U.S. persons. As a U.S. person, I don’t find this at all reassuring. To see why, let’s think about the underlying…
-
Revisiting the potential hazards of the 'Protect America' act
In light of recent news reports about NSA wiretapping of U.S. Internet communications, folks may be interested in some background on the ‘warrantless wiretapping’ provisions of the Protect America act, and the potential security risks such wiretapping systems can introduce. Here’s a 2007 article a group of us wrote entitled “Risking Communications Security: Potential Hazards…
-
Twenty-First Century Eavesdropping
Yesterday’s revelations about widespread government data collection led me to re-read my nine-post series on “Twenty-First Century Eavesdropping” from back in 2006. I was surprised to see how closely that discussion fit the current facts. Links to the 2006 posts: 1, 2, 3, 4, 5, 6, 7, 8, 9
-
How Consensus Drives Bitcoin
Josh Kroll, Ian Davey and I have a new paper on the dynamics of Bitcoin, which we’re going to release in a few days. This post is the first in a series exploring our paper’s analysis of why Bitcoin works and what could derail it. Consensus drives Bitcoin. Like any fiat currency (a currency not…
-
Joel Reidenberg Named the Inaugural Microsoft Visiting Professor of Information Technology Policy
The Center for Information Technology Policy at Princeton is pleased to announce the appointment of the first-ever Microsoft Visiting Professor of Information Technology Policy. Professor Joel Reidenberg of Fordham Law School is a well-known scholar in internet law, privacy, and cybersecurity. While visiting, he will collaborate on research with the CITP community and teach an…
-
Internet Voting Snafu at USRowing
USRowing, the governing body for the sport of rowing in the U.S., recently announced the discovery of likely fraud in one of its leadership elections. Further investigation into this region’s voting resulted in the determination that fraudulent ballots were cast in the Mid-Atlantic election that directly affected the outcome of the Mid-Atlantic Regional Director of…
-
Arlington v. FCC: What it Means for Net Neutrality
[Cross-posted on my blog, Managing Miracles] On Monday, the Supreme Court handed down a decision in Arlington v. FCC. At issue was a very abstract legal question: whether the FCC has the right to interpret the scope of its own authority in cases in which congress has left the contours of their jurisdiction ambiguous. In…