CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
In Tuesday’s post, I explained why I thought Quanta v. LG was a good decision as a matter of law. Today I’d like to talk about why it’s an important…
-
Popular Websites Vulnerable to Cross-Site Request Forgery Attacks
Update Oct 15, 2008 We’ve modified the paper to reflect the fact that the New York Times has fixed this problem. We also clarified that our server-side protection techniques do…
-
Quanta Case Preserved the Distinction Between Patent Law and Contract Law
Thanks to Ed for the invitation to contribute to FTT and for the gracious introduction. In addition to being a grad student here at Princeton, I’m also an adjunct scholar…
-
Election Machinery blog
Students will be studying election technology and election administration in freshman seminar courses taught by at Princeton (by me) and at Stanford (by David Dill). The students will be writing…
-
Will cherry picking undermine the market for ad-supported television?
Want to watch a popular television show without all the ads? Your options are increasing. There’s the iTunes store, moving toward HD video formats, in which a growing range of shows…
-
Hurricane Ike status report: electrical power is cool
Today, we checked out the house, again, and lo and behold, it finally has power again! Huzzah! All in all, it hasn’t been that bad for us. We crashed with…
-
How Yahoo could have protected Palin's email
Last week I criticized Yahoo for their insecure password recovery mechanism that allowed an intruder to take control of Sarah Palin’s email account. Several readers asked me the obvious follow-up…
-
Palin's email breached through weak Yahoo password recovery mechanism
This week’s breach of Sarah Palin’s Yahoo Mail account has been much discussed. One aspect that has gotten less attention is how the breach occurred, and what it tells us…
-
Hurricane Ike status report
Many people have been emailing me to send their best wishes. I thought it would be helpful to post a brief note on what happened and where we’re all at.…
-
Welcome to the new Freedom to Tinker
Welcome to the new, redesigned Freedom to Tinker. Beyond giving it a new look, we have rebuilt the site as a blogging community, to highlight the contributions of more authors.…