Author: Ed Felten

  • The New Freedom to Tinker Movement

    When I started this blog back in 2002, I named it “Freedom to Tinker.” On the masthead, below the words Freedom to Tinker, was the subhead “… is your freedom to understand, discuss, repair, and modify the technological devices you own.” I believed at the time, as I still do, that this freedom is more…

  • White House Statement on Cell Phone Unlocking: A First Step Toward DMCA Reform?

    Yesterday, the White House officially responded to the online petition to “Make Unlocking Cell Phones Legal,” which garnered more than 100,000 signatures in under 30 days. The Administration’s headline was emphatic: “It’s Time to Legalize Cell Phone Unlocking.” The tech press heralded this significant but symbolic first step in addressing some of the most egregious…

  • Basic Economics of Bitcoin Mining

    Arvind wrote yesterday about the availability of chips that do super-fast Bitcoin mining. I want to follow up by unpacking the economics of Bitcoin mining, to see what the effect of the new chips will be, and more generally what the future of Bitcoin mining looks like.

  • Are genomes "anonymous data"?

    Recently researchers showed that an unknown person’s genome (i.e., the genetic information stored in their DNA) can often be linked to their identity. The researchers used the genome plus some publicly available information to link this information. Just as interesting as the result itself is the way that people talked about it. As an example,…

  • Predictions for 2013

    After a year’s hiatus, our annual predictions post is back! As usual, these predictions reflect the results of brainstorming among many affiliates and friends of the blog, so you should not attribute any prediction to any individual (including me–I’m just the scribe). Without further ado, the tech policy predictions for 2013:

  • End-to-End Encrypted GMail? Not So Easy

    Last week Julian Sanchez urged Google to offer end-to-end encryption for GMail, so that your messages would be known to you and your browser (and your email correspondents) but not to Google itself. Julian explained why this would be a positive step for users and, arguably, for Google itself. Let’s talk about what would be…

  • You found a security hole. Now what?

    The recent conviction of Andrew “Weev” Auernheimer for identity theft and conspiracy has renewed interest in the question of what researchers should do when they find security vulnerabilities in popular products. See, for example, Matt Blaze’s op-ed on how the research community views these matters, and Weev’s own response. Weev and associates discovered a flaw…

  • Facebook Copyright Statement: Not Entirely Silly

    There’s a meme going around on Facebook, saying that you should post a certain legal incantation on your Facebook wall, to reclaim certain rights that Facebook would otherwise be taking from you. There’s an interesting counter-meme in the press now, saying that all of this is pointless and of course you can’t change your rights…

  • Smart Campaigns, Meet Smart Voters

    Zeynep pointed to her New York Times op-ed, “Beware the Smart Campaign,” about political campaigns collecting and exploiting detailed information about individual voters. Given the emerging conventional wisdom that the Obama campaign’s technological superiority played an important role in the President’s re-election, we should expect more aggressive attempts to micro-target voters by both parties in…

  • The Silver Effect: What We Can Learn from Poll Aggregators

    For those who now think Nate Silver is god, here’s a question: Can Nate Silver make a prediction so accurate that Nate Silver himself doesn’t believe it? Yes, he can–and he did. Silver famously predicted the results of Election 2012 correctly in every state. Yet while his per-state predictions added up to the 332 electoral…