CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
The Apple versus FBI showdown has quickly become a crucial flashpoint of the “new Crypto War.” On February 16 the FBI invoked the All Writs Act of 1789, a catch-all authority for assistance…
-
Apple/FBI: Freedom of speech vs. compulsion to sign
This week I signed the Electronic Frontier Foundation’s amicus (friend-of-the-court) brief in the Apple/FBI iPhone-unlocking lawsuit. Many prominent computer scientists and cryptographers signed: Josh Aas, Hal Abelson, Judy Anderson, Andrew Appel,…
-
What Your ISP (Probably) Knows About You
Earlier this week, I came across a working paper from Professor Peter Swire—a highly respected attorney, professor, and policy expert. Swire’s paper, entitled “Online Privacy and ISPs“, argues that ISPs…
-
An analogy to understand the FBI's request of Apple
After my previous blog post about the FBI, Apple, and the San Bernadino iPhone, I’ve been reading many other bloggers and news articles on the topic. What seems to be missing…
-
Apple, the FBI, and the San Bernadino iPhone
Apple just posted a remarkable “customer letter” on its web site. To understand it, let’s take a few steps back. In a nutshell, one of the San Bernadino shooters had…
-
How Does Zero-Rating Affect Mobile Data Usage?
On Monday, the Telecom Regulatory Authority of India (TRAI) released a decision that effectively bans “zero-rated” Internet services in the country. While the notion of zero-rating might be somewhat new to…
-
The Princeton Bitcoin textbook is now freely available
The first complete draft of the Princeton Bitcoin textbook is now freely available. We’re very happy with how the book turned out: it’s comprehensive, at over 300 pages, but has…
-
Updating the Defend Trade Secrets Act?
Despite statements to the contrary by sponsors and supporters in April 2014, August 2015, and October 2015, backers of the Defend Trade Secrets Act (DTSA) now aver that “cyber espionage…
-
Who Will Secure the Internet of Things?
Over the past several months, CITP-affiliated Ph.D. student Sarthak Grover and fellow Roya Ensafi been investigating various security and privacy vulnerabilities of Internet of Things (IoT) devices in the home network, to…
-
The Web Privacy Problem is a Transparency Problem: Introducing the OpenWPM measurement tool
In a previous blog post I explored the success of our study, The Web Never Forgets, in having a positive impact on web privacy. To ensure a lasting impact, we’ve…