CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
The European Court of Justice (CJEU) has decided the Google Spain case, which involves the “right to be forgotten” on the Internet. The case was brought by Mario Costeja González,…
-
Will Greenwald's New Book Reveal How to Conduct Warrantless Bulk Surveillance on Americans from Abroad?
Tomorrow, Glenn Greenwald’s highly anticipated book ‘No Place to Hide’ goes on sale. Apart from personal accounts on working with whisteblower Edward Snowden in Hong Kong and elsewhere, Mr. Greenwald…
-
The importance of anonymous cryptocurrencies
Recently I was part of a collaboration on Mixcoin, a set of proposals for improving Bitcoin’s anonymity. A natural question to ask is: why do this research? Before I address…
-
Mesh Networks Won't Fix Internet Security
There’s no doubt that the quality of tech reporting in major newspapers has improved in recent years. It’s rare these days to see a story in, say, the New York…
-
Eternal vigilance is a solvable technology problem: A proposal for streamlined privacy alerts
Consider three recent news articles about online privacy: Google+ added a new feature that shows view counts on everything you post, including your photos. It’s enabled by default, but if…
-
Bitcoin hacks and thefts: The underlying reason
Emin Gün Sirer has a fascinating post about how the use of NoSQL caused technical failures that led to the demise of Bitcoin exchanges Flexcoin and Poloniex. But these are…
-
Heartbleed and passwords: don't panic
The Heartbleed bug has captured public attention this week like few security vulnerabilities before it. This is a good thing, as indeed this is a catastrophic flaw. Many people have…
-
Heartsick about Heartbleed
Ed Felten provides good advice on this blog about what to do in the wake of Heartbleed, and I’ve read some good technical discussions of the technical problem (see this…
-
How to protect yourself from Heartbleed
The Heartbleed vulnerability is one of the worst Internet security problems we have seen. I’ll be writing more about what we can learn from Heartbleed and the response to it.…