Category: Privacy & Security
-
I Join the EFF and Others in Calling for Craigslist to Drop CFAA Claims
[Cross-posted on my blog, Managing Miracles] Craigslist is suing several companies that scrape data from Craigslist advertisements. These companies, like Padmapper and 3taps, repurpose the data in order to provide more useful ways of searching through the ads. I have written about this in earlier posts, “Dear Craig: Voluntarily Dismiss with Prejudice,” and “A Response…
-
The low-transaction-fee argument for Bitcoin is silly
A common argument advanced by Bitcoin proponents is that unlike banks and credit cards, Bitcoin has low (or even zero) transaction fees. The claim is a complete red herring, and in this post I’ll explain why. Let’s assume for the purposes of argument that Bitcoin transaction fees are, in fact, zero. There are small mining-related…
-
Do Judges Play a Role After the NSA Call Records Have Been Collected?
Those who defend the NSA’s massive call records collection program point out that although the program allows indiscriminate data collection, it also meaningfully restricts data analysis and use. They note, in particular, this paragraph from Director of National Intelligence Clapper’s June 6, 2013, press release: By order of the FISC, the Government is prohibited from…
-
51% foreign test doesn't protect Americans
One of the notable claims we have heard, in light of the Verizon / PRISM revelations, is that data extraction measures are calibrated to make sure that 51% or more of affected individuals are non-U.S. persons. As a U.S. person, I don’t find this at all reassuring. To see why, let’s think about the underlying…
-
Revisiting the potential hazards of the 'Protect America' act
In light of recent news reports about NSA wiretapping of U.S. Internet communications, folks may be interested in some background on the ‘warrantless wiretapping’ provisions of the Protect America act, and the potential security risks such wiretapping systems can introduce. Here’s a 2007 article a group of us wrote entitled “Risking Communications Security: Potential Hazards…
-
Twenty-First Century Eavesdropping
Yesterday’s revelations about widespread government data collection led me to re-read my nine-post series on “Twenty-First Century Eavesdropping” from back in 2006. I was surprised to see how closely that discussion fit the current facts. Links to the 2006 posts: 1, 2, 3, 4, 5, 6, 7, 8, 9
-
How Consensus Drives Bitcoin
Josh Kroll, Ian Davey and I have a new paper on the dynamics of Bitcoin, which we’re going to release in a few days. This post is the first in a series exploring our paper’s analysis of why Bitcoin works and what could derail it. Consensus drives Bitcoin. Like any fiat currency (a currency not…
-
Arlington v. FCC: What it Means for Net Neutrality
[Cross-posted on my blog, Managing Miracles] On Monday, the Supreme Court handed down a decision in Arlington v. FCC. At issue was a very abstract legal question: whether the FCC has the right to interpret the scope of its own authority in cases in which congress has left the contours of their jurisdiction ambiguous. In…
-
Blocking of Google+ Hangouts Android App
Earlier this week, online news sites started reporting the apparent blocking of Google’s Google+ Hangout video-chat application on Android over AT&T’s cellular network [SlashGear, Time, ArsTechnica]. Several of the articles noted the relationship to an earlier controversy concerning AT&T and Apple’s FaceTime application. Our Mobile Broadband Working Group at the FCC’s Open Internet Advisory Committee…
-
Collateral Freedom in China
OpenITP has just released a new report—Collateral Freedom—that studies the state of censorship circumvention tool usage in China today. From the report’s overview: This report documents the experiences of 1,175 Chinese Internet users who are circumventing their country’s Internet censorship—and it carries a powerful message for developers and funders of censorship circumvention tools. We believe…