Category: Uncategorized

  • Web Browser Security User Interfaces: Hard to Get Right and Increasingly Inconsistent

    A great deal of online commerce, speech, and socializing supposedly happens over encrypted protocols. When using these protocols, users supposedly know what remote web site they are communicating with, and they know that nobody else can listen in. In the past, this blog has detailed how the technical protocols and legal framework are lacking. Today…

  • CITP Visitors Application Deadline Extended to Feb 1st

    The deadline for applications to CITP’s Visitors Program has been extended to February 1st. If you or someone you know is interested but has questions, feel free to contact me at sjs@princeton.edu The Center has secured limited resources from a range of sources to support visiting faculty, scholars or policy experts for up to one-year…

  • RIP Bill Zeller

    All of us here at CITP were saddened by the death of Bill Zeller, our respected and much-loved colleague. Bill was a Ph.D. candidate in Computer Science here at Princeton, who died last night due to injuries sustained in a suicide attempt. There has been a huge outpouring of sympathy for Bill, both at Princeton…

  • The Flawed Legal Architecture of the Certificate Authority Trust Model

    Researchers have recently criticized the Certificate Authority Trust Model — which involves the issuance and use of digital certificates to authenticate the identity of websites to end-users — because of an array of technical and institutional problems. The criticism is significant not only because of the systemic nature of the noted problems, but also because…

  • Ninth Circuit Ruling in MDY v. Blizzard

    The Ninth Circuit has ruled on the MDY v. Blizzard case, which involves contract, copyright, and DMCA claims. As with the district court ruling, I’ll withhold comment due to my involvement as an expert in the case, but the decision may be of interest to FTT readers. [Editor: The EFF has initial reactions here. Techdirt…

  • Two Stories about the Comcast/Level 3 Dispute (Part 2)

    In my last post I told a story about the Level 3/Comcast dispute that portrays Comcast in a favorable light. Now here’s another story that casts Comcast as the villain. Story 2: Comcast Abuses Its Market Power As Steve explained, Level 3 is an “Internet Backbone Provider.” Level 3 has traditionally been considered a tier…

  • Two Stories about the Comcast/Level 3 Dispute (Part 1)

    Like Steve and a lot of other people in the tech policy world, I’ve been trying to understand the dispute between Level 3 and Comcast. The combination of technical complexity and commercial secrecy has made the controversy almost impenetrable for anyone outside of the companies themselves. And of course, those who are at the center…

  • Smart electrical meters and their smart peripherals

    When I was a college undergraduate, I lived in a 1920’s duplex and I recall my roommate and I trying to figure out where our electrical bill was going. He was standing outside by the electrical meter, I was turning things on and off, and we were yelling back and forth so we could sort…

  • Unpeeling the mystique of tamper-indicating seals

    As computer scientists have studied the trustworthiness of different voting technologies over the past decade, we notice that “security seals” are often used by election officials. It’s natural to wonder whether they really provide any real security, or whether they are just for show. When Professor Avi Rubin volunteered as an election judge (Marylandese for…

  • CITP Seeks Visitors for 2011-2012

    The Center for Information Technology Policy (CITP) seeks candidates for positions as visiting faculty members or researchers, or postdoctoral research associates for one year appointments for the 2011-2012 academic year. Please see our website for additional information and requirements at http://citp.princeton.edu/call-for-visitors/. If you are interested, please submit a CV and cover letter, stating background, intended…