Category: Uncategorized
-
Twittering for the Marines
The Marines recently issued an order banning social network sites (Facebook, MySpace, Twitter, etc.). The Pentagon is reviewing this sort of thing across all services. This follows on the heels of a restrictive NFL policy along the same lines. Slashdot has a nice thread, where among other things, we learn that some military personnel will…
-
AP's DRM Announcement: Much Ado About Nothing
Last week the Associated Press announced it would be developing some kind of online news registry to control use of news content. From AP’s press release: The registry will employ a microformat for news developed by AP and which was endorsed two weeks ago by the Media Standards Trust, a London-based nonprofit research and development…
-
What Economic Forces Drive Cloud Computing?
You know a technology trend is all-pervasive when you see New York Times op-eds about it — and this week saw the first Times op-ed about cloud computing, by Jonathan Zittrain. I hope to address JZ’s argument another day. Today I want to talk about a more basic issue: why we’re moving toward the cloud.…
-
Lessons from Amazon's 1984 Moment
Amazon got some well-deserved criticism for yanking copies of Orwell’s 1984 from customers’ Kindles last week. Let me spare you the copycat criticism of Amazon — and the obvious 1984-themed jokes — and jump right to the most interesting question: What does this incident teach us? Human error was clearly part of the problem. Somebody…
-
A Freedom-of-Speech-based Approach To Limiting Filesharing – Part III: Smoke, smoke!
Over the past two days we have seen that filesharing is vulnerable to spamming, and that as a defense, the filesharers have used the IP block list to exclude the spammers from sharing files. Today I discuss how I think lawyers and laypeople should look at the legal issues. Since I am most decidedly not…
-
A Freedom-of-Speech-based Approach To Limiting Filesharing – Part II: The Block List
On Wednesday we discussed the open structure of filesharing and its resulting vulnerability to spam. While there are some similarities between e-mail and gnutella spam, the spoof files have no analogue in e-mail. When MediaDefender puts up spoofs for Rihanna’s Disturbia, unless you are using gnutella to search for Disturbia – which you cannot legally…
-
A Freedom-of-Speech Approach To Limiting Filesharing – Part I: Filesharing and Spam
[Today we kick off a series of three guest posts by Mitch Golden. Mitch was a professor of physics when, in 1995, he was bitten by the Internet bug and came to New York to become an entrepreneur and consultant. He has worked on a variety of Internet enterprises, including one in the filesharing space.…
-
If You're Going to Track Me, Please Use Cookies
Web cookies have a bad name. People often complain — with good reason — about sites using cookies to track them. Today I want to say a few words in favor of tracking cookies. [Technical background: An HTTP “cookie” is a small string of text. When your web browser gets a file from a site,…
-
Thoughtcrime Experiments
Cosmic rays can flip bits in memory cells or processor datapaths. Once upon a time, Sudhakar and I asked the question, “can an attacker exploit rare and random bit-flips to bypass a programming-language’s type protections and thereby break out of the Java sandbox?” A recently published science-fiction anthology Thoughtcrime Experiments contains a story, “Single-Bit Error”…
-
Assorted targeted spam
You can run, but you can’t hide. Here are a few of the latest things I’ve seen, in no particular order. On a PHPBB-style chat board which I sometimes frequent, there was a thread about do-it-yourself television repair, dormant for over a year. Recently, there was a seemingly robotic post, from a brand new user,…

