CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
The Ohio Secretary of State has announced the results of a study his office commissioned, which examined four e-voting systems. If you have been following this issue, you won’t be…
-
More RIAA Suits — Are They Working?
The RIAA has filed yet another round of lawsuits against individuals they accuse of illegally redistributing music on the Net. There is some evidence that the suits filed so far…
-
Diebold to Stop Suppressing Memos
Diebold has filed a court document promising not to sue people for posting the now-famous memos, and withdrawing the DMCA takedown notices it had sent previously. It’s a standard-issue lawyer’s…
-
Taming EULAs
Most software programs, and some websites, are subject to End User License Agreements (EULAs). EULAs are long and detailed and apparently written by lawyer-bots. Almost everybody agrees to them without…
-
California to Require Open-Source in Voting Software?
Donna Wentworth at Copyfight points to the fine print in the recent e-voting edict from California Secretary of State Kevin Shelley, which says this: Any electronic verification method must have…
-
California to Require E-Voting Paper Trail
California Secretary of State Kevin Shelley will announce today that as of 2006, all e-voting machines in the state must provide a voter-verifiable paper trail, according to an L.A. Times…
-
Princeton Ignores Strauss, Makes Sensible Decisions
The Office of Information Technology (OIT) here at Princeton has taken the unusual step of issuing a statement distancing itself from the views expressed by one of its employees, Howard…
-
CDT Report on Spyware
The Center for Democracy and Technology has issued a sensible and accessible paper about the spyware problem and associated policy issues. Spyware is software, installed on your computer without your…
-
Flaky Voting Technology
Opponents of unauditable e-voting technology often talk about the threat of fraud. They worry that somebody will compromise a voting machine or will corrupt the machines’ software, to steal an…
-
Linux Backdoor Attempt Thwarted
Kerneltrap.org reports that somebody tried last week to sneak a snippet of malicious code into the Linux kernel’s source code, to create a backdoor that could be exploited later to…