Category: Privacy & Security
-
Revisiting the potential hazards of the 'Protect America' act
In light of recent news reports about NSA wiretapping of U.S. Internet communications, folks may be interested in some background on the ‘warrantless wiretapping’ provisions of the Protect America act, and the potential security risks such wiretapping systems can introduce. Here’s a 2007 article a group of us wrote entitled “Risking Communications Security: Potential Hazards…
-
Twenty-First Century Eavesdropping
Yesterday’s revelations about widespread government data collection led me to re-read my nine-post series on “Twenty-First Century Eavesdropping” from back in 2006. I was surprised to see how closely that discussion fit the current facts. Links to the 2006 posts: 1, 2, 3, 4, 5, 6, 7, 8, 9
-
How Consensus Drives Bitcoin
Josh Kroll, Ian Davey and I have a new paper on the dynamics of Bitcoin, which we’re going to release in a few days. This post is the first in a series exploring our paper’s analysis of why Bitcoin works and what could derail it. Consensus drives Bitcoin. Like any fiat currency (a currency not…
-
Arlington v. FCC: What it Means for Net Neutrality
[Cross-posted on my blog, Managing Miracles] On Monday, the Supreme Court handed down a decision in Arlington v. FCC. At issue was a very abstract legal question: whether the FCC has the right to interpret the scope of its own authority in cases in which congress has left the contours of their jurisdiction ambiguous. In…
-
Blocking of Google+ Hangouts Android App
Earlier this week, online news sites started reporting the apparent blocking of Google’s Google+ Hangout video-chat application on Android over AT&T’s cellular network [SlashGear, Time, ArsTechnica]. Several of the articles noted the relationship to an earlier controversy concerning AT&T and Apple’s FaceTime application. Our Mobile Broadband Working Group at the FCC’s Open Internet Advisory Committee…
-
Collateral Freedom in China
OpenITP has just released a new report—Collateral Freedom—that studies the state of censorship circumvention tool usage in China today. From the report’s overview: This report documents the experiences of 1,175 Chinese Internet users who are circumventing their country’s Internet censorship—and it carries a powerful message for developers and funders of censorship circumvention tools. We believe…
-
Are There Countries Whose Situations Worsened with the Arrival of the Internet?
Are there countries whose situations worsened with the arrival of the internet? I’ve been arguing that there are lots of examples of countries where technology diffusion has helped democratic institutions deepen. And there are several examples of countries where technology diffusion has been part of the story of rapid democratic transition. But there are no…
-
Let's stop Nigerian scams once and for good
A personal friend of mine’s Yahoo account was recently hacked by a Nigerian scammer. I know this because the email I got (“I’m stuck in the Philippines and need you to wire money”) had an IP address in a “Received” header that pointed squarely at Lagos, Nigeria. The modus operandi of these scammers is well…
-
Drones over Princeton: A Goofy Video About a Serious Issue
Last week, privacy attorney Grayson Barber brought her “drone” to CITP in order to do a demo at her talk, “Drones Are Like Flying Computers.” Grayson discussed the many serious legal issues raised by drones (you can watch the video of her presentation here). But her drone takes great video, so I couldn’t resist making…
-
Internet Voting Security: Wishful Thinking Doesn’t Make It True
[The following is a post written at my invitation by Professor Duncan Buell from the University of South Carolina. Curiously, the poll Professor Buell mentions below is no longer listed in the list of past & present polls on the Courier-Journal site, but is available if you kept the link.] On Thursday, March 21, in…

