CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
We don’t have a “real” post today, just plugs for two good things. (1) The NYU/Princeton interdisciplinary workshop on spyware will be next Thursday (evening) and Friday (day), in New…
-
RIAA Says Future DRM Might "Threaten Critical Infrastructure and Potentially Endanger Lives"
We’re in the middle of the U.S. Copyright Office’s triennial DMCA exemption rulemaking. As you might expect, most of the filings are dry as dust, but buried in the latest…
-
Nuts and Bolts of Net Discrimination, Part 2
Today I want to continue last week’s discussion of how network discrimination might actually occur. Specifically, I want to talk about packet reordering. Recall that an Internet router is a…
-
USACM Policy Statement on DRM
I’m pleased to post here a new policy statement on DRM, issued by USACM, the U.S. public policy committee of ACM, the leading professional society for computer scientists. It’s a…
-
Nuts and Bolts of Network Discrimination
One of the reasons the network neutrality debate is so murky is that relatively few people understand the mechanics of traffic discrimination. I think that in reasoning about net neutrality…
-
Obligatory Summers Post
According to Section 4.3(c)(iii)(g) of the Code of Academic Blogging, I am required, on pain of banishment from the faculty club, to post about the departure of Lawrence Summers as…
-
How Watermarks Fail
I wrote Wednesday about Randy Picker’s suggestion of using digital watermarks to embed users’ personal financial information into media files, to discourage users from sharing the files. Today, I want…
-
Mistrust-Based DRM
Randy Picker has an interesting post on the Chicago Law Faculty blog, describing what he calls “mistrust-based DRM”. The idea is that when an online music store gives you a…
-
Software Security: Creativity in a New Discipline
This is the last excerpt from my new book, Software Security: Building Security In. This might be a good time to buy the book. Creativity in a New Discipline We…
-
Software Security: A Case Study
Here is another excerpt from my new book, Software Security: Building Security In.. An Example: Java Card Security Testing Doing effective security testing requires experience and knowledge. Examples and case…