November 23, 2024

The New Freedom to Tinker Movement

When I started this blog back in 2002, I named it “Freedom to Tinker.” On the masthead, below the words Freedom to Tinker, was the subhead “… is your freedom to understand, discuss, repair, and modify the technological devices you own.” I believed at the time, as I still do, that this freedom is more […]

How the DMCA Serves as a Barrier to Accessibility

My op-ed on the DMCA’s barriers to accessibility just went live at Slate’s Future Tense. Here’s an excerpt: [A]mong the DMCA’s many flaws is a significant one of which most people aren’t aware: For more than a decade, the act has imposed a barrier to access for people with disabilities. It hinders access to books, […]

First Principles for Fostering Civic Engagement via Digital Technologies #2 and #3: Keep it Simple and Leverage Entrepreneurial Intermediaries

In my previous blog post, I set out the first of ten principles that local governments and communities should look to as they evaluate whether their community is using digital technology effectively to promote civic engagement and solve local problems. Today, I’m setting forth my second and third principles, “Simplicity – Bang for the Buck” […]

White House Statement on Cell Phone Unlocking: A First Step Toward DMCA Reform?

Yesterday, the White House officially responded to the online petition to “Make Unlocking Cell Phones Legal,” which garnered more than 100,000 signatures in under 30 days. The Administration’s headline was emphatic: “It’s Time to Legalize Cell Phone Unlocking.” The tech press heralded this significant but symbolic first step in addressing some of the most egregious […]

How much does a botnet cost, and the impact on internet voting

A brief article on how much botnets cost to rent (more detail here) shows differing prices depending on whether you want US machines, European machines, etc. Interestingly, the highest prices go to botnets composed of US machines, presumably because the owners of those machines have more purchasing power and hence stealing credentials from those machines […]