CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
By Kevin Lee, Ben Kaiser, Jonathan Mayer, and Arvind Narayanan In January, we released a study showing the ease of SIM swaps at five U.S. prepaid carriers. These attacks—in which…
-
Building a Bridge with Concrete… Examples
Thanks to Annette Zimmermann and Arvind Narayanan for their helpful feedback on this post. Algorithmic bias is currently generating a lot of lively public and scholarly debate, especially amongst computer…
-
The CheapBit of Fitness Trackers Apps
Yan Shvartzshnaider (@ynotez) and Madelyn Sanfilippo (@MrsMRS_PhD) Fitness trackers are “[devices] that you can wear that records your daily physical activity, as well as other information about your health, such…
-
Ballot-level comparison audits: BMD
In my previous posts, I’ve been discussing ballot-level comparison audits, a form of risk-limiting audit. Ballots are imprinted with serial numbers (after they leave the voter’s hands); during the audit,…
-
Finding a randomly numbered ballot
In my previous posts, I’ve been discussing ballot-level comparison audits, a form of risk-limiting audit. Ballots are imprinted with serial numbers (after they leave the voter’s hands); during the audit,…
-
Why we can’t do random selection the other way round in PCOS RLAs
In my last article, I posed this puzzle for the reader. We want to do ballot-level comparison audits, a form of RLA (risk-limiting audit) on a precinct-count optical-scan (PCOS) voting…
-
Ballot-level comparison audits: precinct-count
Special bonus: This article contains two puzzles for the reader, marked in green. Try to solve them yourself before reading the solutions in a future post! In my last post…
-
Ballot-level comparison audits: central-count
All voting machines these days are computers, and any voting machine that is a computer can be hacked to cheat. The widely accepted solution is to use voting machines to…
-
CITP Tech Policy Boot Camp 2019
[This post was written by Liza Paudel, MPA’21 and Allison Huang, History’20.] Over Fall Break, the Center for Information Technology Policy (CITP) hosted 17 current students on a two-day tech…
-
Improving Protections for Children’s Privacy Online
CITP’s Tech Policy Clinic submitted a Comment to the Federal Trade Commission in connection with its review of the COPPA Rule to protect children’s privacy online. Our Comment explains why…