December 27, 2024

Archives for 2013

The low-transaction-fee argument for Bitcoin is silly

A common argument advanced by Bitcoin proponents is that unlike banks and credit cards, Bitcoin has low (or even zero) transaction fees. The claim is a complete red herring, and in this post I’ll explain why. Let’s assume for the purposes of argument that Bitcoin transaction fees are, in fact, zero. There are small mining-related […]

On the Legal Importance of Viewing Genes as Code

The Supreme Court yesterday issued its opinion in the much–awaited Myriad case, which challenged the validity of patents on isolated human genes. The Court held that the isolated genetic sequences claimed in Myriad’s patents did not satisfy the inventive threshold for patentability, although the complementary DNA (cDNA) claimed in the patents did. One of the […]

Do Judges Play a Role After the NSA Call Records Have Been Collected?

Those who defend the NSA’s massive call records collection program point out that although the program allows indiscriminate data collection, it also meaningfully restricts data analysis and use. They note, in particular, this paragraph from Director of National Intelligence Clapper’s June 6, 2013, press release: By order of the FISC, the Government is prohibited from […]

51% foreign test doesn't protect Americans

One of the notable claims we have heard, in light of the Verizon / PRISM revelations, is that data extraction measures are calibrated to make sure that 51% or more of affected individuals are non-U.S. persons. As a U.S. person, I don’t find this at all reassuring. To see why, let’s think about the underlying […]

Revisiting the potential hazards of the 'Protect America' act

In light of recent news reports about NSA wiretapping of U.S. Internet communications, folks may be interested in some background on the ‘warrantless wiretapping’ provisions of the Protect America act, and the potential security risks such wiretapping systems can introduce. Here’s a 2007 article a group of us wrote entitled “Risking Communications Security: Potential Hazards […]