Author: Ed Felten
-
What does it mean to ask for an “explainable” algorithm?
One of the standard critiques of using algorithms for decision-making about people, and especially for consequential decisions about access to housing, credit, education, and so on, is that the algorithms don’t provide an “explanation” for their results or the results aren’t “interpretable.” This is a serious issue, but discussions of it are often frustrating. The reason,…
-
Multiple Intelligences, and Superintelligence
Superintelligent machines have long been a trope in science fiction. Recent advances in AI have made them a topic for nonfiction debate, and even planning. And that makes sense. Although the Singularity is not imminent–you can go ahead and buy that economy-size container of yogurt–it seems to me almost certain that machine intelligence will surpass ours eventually, and quite…
-
Questions for the FBI on Encryption Mandates
I wrote on Monday about how to analyze a proposal to mandate access to encrypted data. FBI Director James Comey, at the University of Texas last week, talked about encryption policy and his hope that some kind of exceptional access for law enforcement will become available. (Here’s a video.) Let’s look at what Director Comey…
-
How to Analyze An Encryption Access Proposal
It looks like the idea of requiring law enforcement access to encrypted data is back in the news, with the UK government apparently pushing for access in the wake of the recent London attack. With that in mind, let’s talk about how one can go about analyzing a proposed access mandate. The first thing to…
-
How the Politics of Encryption Affects Government Adoption
I wrote yesterday about reports that people in the White House are using encrypted communication apps more often, and why that might be. Today I want to follow up by talking about how the politics of encryption might affect government agencies’ choices about how to secure their information. I’ll do this by telling the stories of…
-
On Encryption Apps in the White House
Politico ran a long story today pointing to an increase in the use of encrypted communication apps by people in DC, government, and the White House specifically. Poisonous political divisions have spawned an encryption arms race across the Trump administration, as both the president’s advisers and career civil servants scramble to cover their digital tracks in…
-
RIP, SHA-1
Today’s cryptography news is that researchers have discovered a collision in the SHA-1 cryptographic hash function. Though long-expected, this is a notable milestone in the evolution of crypto standards. Kudos to Marc Stevens, Elie Bursztein, Pierre Karpma, Ange Albertine, and Yarik Markov of CWI Amsterdam and Google Research for their result. SHA-1 was standardized by…
-
Smart Contracts: Neither Smart nor Contracts?
Karen Levy has an interesting new article critiquing blockchain-based “smart contracts.” The first part of her title, “Book-Smart, not Street-Smart,” sums up her point. Here’s a snippet: Though smart contracts do have some features that might serve the goals of social justice and fairness, I suggest that they are based on a thin conception of…
-
Regulation and Anti-Regulation
[Hi, Freedom to Tinker readers. I’m back at Princeton, having completed my tour of duty as Deputy U.S. CTO, so I can resume writing here. I’ll start with some posts on specific topics, like the one below. As time goes on, I’ll have a lot more to say about what I learned. –Ed Felten] Politicians often…
-
FREAK Attack: The Chickens of ‘90s Crypto Restriction Come Home to Roost
Today researchers disclosed a new security flaw in TLS/SSL, the protocol used to secure web connections. The flaw is significant in itself, but it is also a good example of what can go wrong when government asks to build weaknesses into security systems. Back in the early 1990s, it was illegal to export most products…
-
Lenovo Pays For Careless Product Decisions
The discovery last week that Lenovo laptops had been shipping with preinstalled adware that left users wide open to security exploitation triggered a lot of righteous anger in the tech community. David Auerbach at Slate wrote that Lenovo had “betrayed its customers and sold out their security”. Whenever a big company does something so monumentally…
-
In Partial Defense of the Seahawks' Play Calling
The conventional wisdom about last night’s Super Bowl is that the Seahawks made a game-losing mistake by running a passing play from the Patriots’ one yard line in the closing seconds. Some are calling it the worst Super Bowl play call ever. I disagree. I won’t claim it was the right call, but I do…