Category: Privacy & Security
-
No Facebook, No Service?
The Idaho Statesman, my sort-of-local newspaper, just announced that it will follow the lead of the Miami Herald and no longer allow readers to post anonymous comments to online stories. Starting September 15, readers who want to make comments will have to login through Facebook. This is the second time I’ve encountered a mandatory Facebook…
-
NSA Apparently Undermining Standards, Security, Confidence
The big NSA revelation of last week was that the agency’s multifaceted strategy to read encrypted Internet traffic is generally successful. The story, from the New York Times and ProPublica, described NSA strategies ranging from the predictable—exploiting implementation flaws in some popular crypto products; to the widely-suspected but disappointing—inducing companies to insert backdoors into products;…
-
On the NSA's capabilities
Last Thursday brought significant new revelations about the capacities of the National Security Agency. While the articles in the New York Times, ProPublica, and The Guardian skirted around technical specifics, several broad themes came out. NSA has the capacity to read significant amounts of encrypted Internet traffic. NSA has some amount of cooperation from vendors…
-
Annual report of FCC's Open Internet Advisory Committee
For the past year, I’ve been serving on the FCC’s Open Internet Advisory Committee (OIAC), and chairing its mobile broadband working group. The OIAC just completed its first annual report (available here). The report gives an overview of the past year of work from four working groups (economic impacts, mobile broadband, specialized services, and transparency).…
-
NSA, the FISA Court, and Risks of Tech Summaries
Yesterday the U.S. government released a previously-secret 2011 opinion of the Foreign Intelligence Surveillance Court (FISC), finding certain NSA surveillance and analysis activities to be illegal. The opinion, despite some redactions, gives us a window into the interactions between the NSA and the court that oversees its activities—including why oversight and compliance of surveillance are…
-
Groklaw Shuts Down, Citing NSA Eavesdropping
The legendary technology law blog Groklaw is shutting down. Groklaw’s founder and operator, Pamela “PJ” Jones, wrote that in light of current eavesdropping, email is no longer secure. She went on to say: There is no way to do Groklaw without email. Therein lies the conundrum. […] What to do? I’ve spent the last couple…
-
British Court Blocks Publication of Car Security Paper
Recently a British court ordered researchers to withdraw a paper, “Dismantling Megamos Security: Wirelessly Lockpicking a Vehicle Immobiliser” from next week’s USENIX Security Symposium. This is a blow not only to academic freedom but also to progress in vehicle security. And for those of us who have worked in security for a long time, it…
-
MIT asks to intervene in Swartz FOIA suit
Yesterday MIT filed papers asking to intervene in journalist Kevin Poulsen’s Freedom of Information Act (FOIA) lawsuit seeking the Secret Service’s records of the agency’s investigation of Aaron Swartz. Poulsen had won a court order requiring the Secret Service to turn over its documents about Aaron, who took his own life while facing aggressive criminal…
-
Regulating Bitcoin
On Tuesday the State of California sent a letter to the Bitcoin Foundation, saying that the Foundation might be in violation of California’s law against running an unregistered money transmission business. The letter isn’t important in the grand scheme of things—it’s clear that the Bitcoin Foundation isn’t transmitting money—but it does raise the obvious question…
-
Open-source Governance in Bitcoin
Josh Kroll, Ian Davey, and I have a new paper, The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries, from the Workshop on Economics of Information Security. Our paper looks at the dynamics of Bitcoin, how resilient it would be in the face of attacks, and how Bitcoin is governed. Today I…