CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
Seth Schoen reports that Bruce Schneier’s CryptoGram email newsletter is misclassified as spam by SpamAssassin and Razor. Seth Finkelstein explains why SpamAssassin gets it wrong. Schneier’s worst offense, according to…
-
Fritz's Hit List #2
Today on Fritz’s Hit List: the Amana Messenger refrigerator. This appliance, with its audio message feature, qualifies for regulation as a “digital media device” under the Hollings CBDTPA. If the…
-
What Color Is My Hat?
An article by Rob Lemos at news.com discusses the differences between “white hat,” “gray hat,” and “black hat” hackers. The article lists me as a gray hat. In my book,…
-
Miller on DMCA and DVD Reviews
Ernest Miller at LawMeme explains why there is so little fair use in DVD reviews.
-
Crackdown on Greek Gamers
According to a BBC story, Greek police have stepped up the pace of arrests in enforcing a new Greek law banning all computer games. Many Internet cafes have been shut…
-
New Feature: Fritz's Hit List
Today on Fritz’s Hit List: Big Mouth Billy Bass. That’s right, your favorite wall-hanging, singing, dancing, animatronic fish qualifies for regulation as a “digital media device” under the Hollings CBDTPA.…
-
Tauzin Circulating Draft "Broadcast Flag" Bill
Rep. Billy Tauzin is circulating a draft of a bill that would restrict digital technology. One effect of the bill would be to mandate “broadcast flag” technology. The bill has…
-
Misleading Term of the Week: "Trusted System"
The term “trusted system” is often used in discussing Digital Rights/Restrictions Management (DRM). Somehow the “trusted” part is supposed to make us feel better about the technology. Yet often the…
-
Comments on White House Cybersecurity Plan
As a computer security researcher and teacher, I was interested to see the White House’s draft cybersecurity plan. It looks to be mostly harmless, but there are a few things…
-
Lessig/DRM/End-To-End Debate: Resolved?
Larry Lessig and I had a brief blog-discussion last week about the meaning of the end-to-end principle(s), and how end-to-end applies to DRM. The discussion continued off-line, and we ended…