Tag: Tech/Law/Policy Blogs
-
Tech@FTC
Professor Ed Felten, while on loan to the Federal Trade Commission for 2011 and Spring 2012, has a new Tech Policy Blog, Tech@FTC. When he’s in his role as Chief Technologist of the FTC, he’ll blog there; when he’s wearing his regular hat as Professor of Computer Science and Director of the Center for Information…
-
A Freedom-of-Speech-based Approach To Limiting Filesharing – Part III: Smoke, smoke!
Over the past two days we have seen that filesharing is vulnerable to spamming, and that as a defense, the filesharers have used the IP block list to exclude the spammers from sharing files. Today I discuss how I think lawyers and laypeople should look at the legal issues. Since I am most decidedly not…
-
A Freedom-of-Speech Approach To Limiting Filesharing – Part I: Filesharing and Spam
[Today we kick off a series of three guest posts by Mitch Golden. Mitch was a professor of physics when, in 1995, he was bitten by the Internet bug and came to New York to become an entrepreneur and consultant. He has worked on a variety of Internet enterprises, including one in the filesharing space.…
-
Fascinating New Blog: ComputationalLegalStudies.com
I was inspired to post the essay I discussed in the prior post by the debut of the best new law blog I have seen in a long time, Computational Legal Studies, featuring the work of Daniel Katz and Michael Bommarito, both graduate students in the University of Michigan’s political science department. Every single blog…
-
Election Machinery blog
Students will be studying election technology and election administration in freshman seminar courses taught by at Princeton (by me) and at Stanford (by David Dill). The students will be writing short articles on the Election Machinery blog. I invite you all to read that blog over the next three months, to see what a small…
-
China Now Re-Routing Google Requests
Reuters reports that, since the weekend, some requests for Google from inside China are being rerouted to other, government-approved search engines. (Link at wirednews.com) UPDATE (3pm EDT, Sept. 10): Ben Edelman now has screenshots of redirected browsers. (Link thanks to greplaw.)
-
Wireless LANs, Security, and Intrusions
News.com has an article about drive-by spam. The idea is that a spammer will find a building with a wireless LAN. The spammer will then connect to that LAN, without permission, from outside the building, and use the building’s email server to send a big load of spam email. This is abusive behavior. The spammer…
-
Defense of Berman-Coble Bill Offered
In Politech today, Congressman Berman (through an aide) offers a defense of the proposed Berman-Coble bill. (This bill would legalize certain forms of hacking by copyright owners against users of file-sharing systems.) The gist of the defense is that the bill would only shelter copyright holders from liability to the extent that they were actually…
-
Adobe Files DMCA Challenge
Adobe has filed a federal lawsuit seeking a declaratory judgment that its Acrobat product does not violate the DMCA’s anti-circumvention provisions. (Here’s Adobe’s press release. I don’t have a link to the court papers yet.) Here is the story, as far as I can tell at this point: Any TrueType-compatible font can be labeled with…