CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
California’s Secretary of State has been busy. It appears that ES&S (manufacturers of the Ink-a-Vote voting system, used in Los Angeles, as well as the iVotronic systems that made news…
-
The Security Mindset and "Harmless Failures"
Bruce Schneier has an interesting new essay about how security people see the world. Here’s a sample: Uncle Milton Industries has been selling ant farms to children since 1956. Some…
-
Sequoia's Explanation, and Why It's Not the Whole Story
I wrote yesterday about discrepancies in the results reported by Sequoia AVC Advantage voting machines in New Jersey. Sequoia issued a memo giving their explanation for what might have happened.…
-
Evidence of New Jersey Election Discrepancies
Press reports on the recent New Jersey voting discrepancies have been a bit vague about the exact nature of the evidence that showed up on election day. What has the…
-
Interesting Email from Sequoia
A copy of an email I received has been passed around on various mailing lists. Several people, including reporters, have asked me to confirm its authenticity. Since everyone seems to…
-
Privacy: Beating the Commitment Problem
I wrote yesterday about a market failure relating to privacy, in which a startup company can’t convincingly commit to honoring its customers’ privacy later, after the company is successful. If…
-
Privacy and the Commitment Problem
One of the challenges in understanding privacy is how to square what people say about privacy with what they actually do. People say they care deeply about privacy and resent…
-
InfoTech and Public Policy Course Blog
Postings here have been a bit sparse lately, which I hope to remedy soon. In the meantime, you can get a hearty dose of tech policy blog goodness over at…
-
pesky details with getting a voting system correct
Today was the last day of early voting in Texas’s primary election. Historically, I have never voted in a primary election. I’ve never felt I identified enough with a particular…
-
Cold Boot Attacks: Vulnerable While Sleeping
Our research on cold boot attacks on disk encryption has generated lots of interesting discussion. A few misconceptions seem to be floating around, though. I want to address one of…