CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
Recently I was part of a collaboration on Mixcoin, a set of proposals for improving Bitcoin’s anonymity. A natural question to ask is: why do this research? Before I address…
-
Mesh Networks Won't Fix Internet Security
There’s no doubt that the quality of tech reporting in major newspapers has improved in recent years. It’s rare these days to see a story in, say, the New York…
-
Eternal vigilance is a solvable technology problem: A proposal for streamlined privacy alerts
Consider three recent news articles about online privacy: Google+ added a new feature that shows view counts on everything you post, including your photos. It’s enabled by default, but if…
-
Bitcoin hacks and thefts: The underlying reason
Emin Gün Sirer has a fascinating post about how the use of NoSQL caused technical failures that led to the demise of Bitcoin exchanges Flexcoin and Poloniex. But these are…
-
Heartbleed and passwords: don't panic
The Heartbleed bug has captured public attention this week like few security vulnerabilities before it. This is a good thing, as indeed this is a catastrophic flaw. Many people have…
-
Heartsick about Heartbleed
Ed Felten provides good advice on this blog about what to do in the wake of Heartbleed, and I’ve read some good technical discussions of the technical problem (see this…
-
How to protect yourself from Heartbleed
The Heartbleed vulnerability is one of the worst Internet security problems we have seen. I’ll be writing more about what we can learn from Heartbleed and the response to it.…
-
Historic E.U. Net Neutrality Win Shows Maturing Digital Rights Advocacy
After a 5-year long campaign by European and U.S. digital rights NGOs, today the European Parliament turned a dubious Commission proposal on its head to safeguard the principle of net…
-
Secure protocols for accountable warrant execution
Last week the press reported that the White House will seek to redesign the NSA’s mass phone call data program, so that data will be held by the phone companies…