CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
The big e-voting story from November’s election was in Sarasota, Florida, where a congressional race was decided by about 400 votes, with 18,412 undervotes. That’s 18,412 voters who cast votes…
-
Record Companies Boxed In By Their Own Rhetoric
Reports are popping up all over that the major record companies are cautiously gearing up to sell music in MP3 format, without any DRM (anti-copying) technology. This was the buzz…
-
Wikipedia Leads; Will Search Engines NoFollow?
Wikipedia has announced that all of its outgoing hyperlinks will now include the rel=”nofollow” attribute, which instructs search engines to disregard the links. Search engines infer a page’s importance by…
-
Diebold Shows How to Make Your Own Voting Machine Key
By now it should be clear that Diebold’s AccuVote-TS electronic voting machines have lousy security. Our study last fall showed that malicious software running on the machines can invisibly alter…
-
AACS: Modeling the Battle
[Posts in this series: 1, 2, 3, 4, 5, 6, 7.] By this point in our series on AACS (the encryption scheme used in HD-DVD and Blu-ray) it should be…
-
AACS: Sequence Keys and Tracing
[Posts in this series: 1, 2, 3, 4, 5, 6, 7.] This is the sixth post in our series on AACS, the encryption scheme used for HD-DVD and Blu-Ray discs.…
-
AACS: Title Keys Start Leaking
[Posts in this series: 1, 2, 3, 4, 5, 6, 7.] Last week we predicted that people would start extracting the title key (the cryptographic key needed to decrypt the…
-
AACS: Game Theory of Blacklisting
[Posts in this series: 1, 2, 3, 4, 5, 6, 7.] This is the fourth post in our series on AACS, the encryption scheme used for HD-DVD and Blu-Ray discs.…
-
AACS: Blacklisting, Oracles, and Traitor Tracing
[Posts in this series: 1, 2, 3, 4, 5, 6, 7.] This is the third post in our discussion of AACS, the encryption scheme used for HD-DVD and Blu-Ray discs.…
-
AACS: Extracting and Using Keys
[Posts in this series: 1, 2, 3, 4, 5, 6, 7.] Let’s continue our discussion of AACS (the encryption scheme used on HD-DVD and Blu-Ray discs) and how it is…