Author: Ed Felten
-
Open-source Governance in Bitcoin
Josh Kroll, Ian Davey, and I have a new paper, The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries, from the Workshop on Economics of Information Security. Our paper looks at the dynamics of Bitcoin, how resilient it would be in the face of attacks, and how Bitcoin is governed. Today I…
-
51% foreign test doesn't protect Americans
One of the notable claims we have heard, in light of the Verizon / PRISM revelations, is that data extraction measures are calibrated to make sure that 51% or more of affected individuals are non-U.S. persons. As a U.S. person, I don’t find this at all reassuring. To see why, let’s think about the underlying…
-
Twenty-First Century Eavesdropping
Yesterday’s revelations about widespread government data collection led me to re-read my nine-post series on “Twenty-First Century Eavesdropping” from back in 2006. I was surprised to see how closely that discussion fit the current facts. Links to the 2006 posts: 1, 2, 3, 4, 5, 6, 7, 8, 9
-
How Consensus Drives Bitcoin
Josh Kroll, Ian Davey and I have a new paper on the dynamics of Bitcoin, which we’re going to release in a few days. This post is the first in a series exploring our paper’s analysis of why Bitcoin works and what could derail it. Consensus drives Bitcoin. Like any fiat currency (a currency not…
-
Joel Reidenberg Named the Inaugural Microsoft Visiting Professor of Information Technology Policy
The Center for Information Technology Policy at Princeton is pleased to announce the appointment of the first-ever Microsoft Visiting Professor of Information Technology Policy. Professor Joel Reidenberg of Fordham Law School is a well-known scholar in internet law, privacy, and cybersecurity. While visiting, he will collaborate on research with the CITP community and teach an…
-
Internet Voting Snafu at USRowing
USRowing, the governing body for the sport of rowing in the U.S., recently announced the discovery of likely fraud in one of its leadership elections. Further investigation into this region’s voting resulted in the determination that fraudulent ballots were cast in the Mid-Atlantic election that directly affected the outcome of the Mid-Atlantic Regional Director of…
-
CALEA II: Risks of wiretap modifications to endpoints
Today I joined a group of twenty computer scientists in issuing a report criticizing an FBI plan to require makers of secure communication tools to redesign their systems to make wiretapping easy. We argue that the plan would endanger the security of U.S. users and the competitiveness of U.S. companies, without making it much harder…
-
Design is a poor guide to authorization
James Grimmelmann has a great post on the ambiguity of the concept of “circumvention” in the law. He writes about the Computer Fraud and Abuse Act (CFAA) language banning “exceeding authorized access” to a system. There are, broadly speaking, two ways that a computer user could “exceed[] authorized access.” The computer’s owner could use words…
-
Security Lessons from the Big DDoS Attacks
Last week saw news of new Distributed Denial of Service (DDoS) attacks. These may be the largest DDoS attacks ever, peaking at about 300 Gbps (that is, 300 billion bits per second) of traffic aimed at the target but, notwithstanding some of the breathless news coverage, these attacks are not vastly larger than anything before.…
-
How the DMCA Chills Research
I have a new piece in Slate, on how the DMCA chills security research. In the piece, I tell three stories of DMCA threats against Alex Halderman and me, and talk about how Congress can fix the problem. “The Chilling Effects of the DMCA: The outdated copyright law doesn’t just hurt consumers—it cripples researchers.” “These…