Category: Privacy & Security
-
Sarasota Voting Machines Insecure
The technical team commissioned by the State of Florida to study the technology used in the ill-fated Sarasota election has released its report. (Background: on the Sarasota election problems; on the study.) One revelation from the study is that the iVotronic touch-screen voting machines are terribly insecure. The machines are apparently susceptible to viruses, and…
-
Diebold Shows How to Make Your Own Voting Machine Key
By now it should be clear that Diebold’s AccuVote-TS electronic voting machines have lousy security. Our study last fall showed that malicious software running on the machines can invisibly alter votes, and that this software can be installed in under a minute by inserting a new memory card into the side of the machine. The…
-
Voting, Secrecy, and Phonecams
Yesterday I wrote about the recent erosion of the secret ballot. One cause is the change in voting technology, especially voting by mail. But even if we don’t change our voting technology at all, changes in other technologies are still eroding the secret ballot. Phonecams are a good example. You probably carry into the voting…
-
Net Neutrality: Strike While the Iron Is Hot?
Bill Herman at the Public Knowledge blog has an interesting response to my net neutrality paper. As he notes, my paper was mostly about the technical details surrounding neutrality, with a short policy recommendation at the end. Here’s the last paragraph of my paper: There is a good policy argument in favor of doing nothing…
-
New Net Neutrality Paper
I just released a new paper on net neutrality, called Nuts and Bolts of Network Neutrality. It’s based on several of my earlier blog posts, with some new material.
-
"Censorship" Bill Lifts Ban on Speech
The House has now joined the Senate in passing the Family Movie Act; the Act is almost sure to be signed into law soon by the President. (The Act is bundled with some unrelated provisions into a multi-part bill called the Family Entertainment and Copyright Act. Here I’ll focus only on Section 201, called the…
-
One More on Biometrics
Simson Garfinkel offers a practical perspective on biometrics, at CSO Magazine.
-
Washington Post on Biometrics
Today’s Washington Post has an article about the use of biometric technology, and civil-liberties resistance against it. Interestingly, the article conflates two separate ideas: biometrics (the use of physical bodily characteristics to identify someone), and covert identification (identifying someone in a public place without their knowledge or consent). There are good civil-liberties arguments against covert…
-
Wireless Tracking of Everything
Arnold Kling at The Bottom Line points to upcoming technologies that allow the attachment of tiny tags, which can be tracked wirelessly, to almost anything. He writes: In my view, which owes much to David Brin, we should be encouraging the use of [these tags], while making sure that no single agency or elite has…
-
What Color Is My Hat?
An article by Rob Lemos at news.com discusses the differences between “white hat,” “gray hat,” and “black hat” hackers. The article lists me as a gray hat. In my book, there is no such thing as a gray hat. If you break into a computer system without the owner’s permission, or if you infringe a…

