November 27, 2024

CALEA II: Risks of wiretap modifications to endpoints

Today I joined a group of twenty computer scientists in issuing a report criticizing an FBI plan to require makers of secure communication tools to redesign their systems to make wiretapping easy. We argue that the plan would endanger the security of U.S. users and the competitiveness of U.S. companies, without making it much harder […]

Who Owns the Future? Not the Middle Class

Jaron Lanier, in the latest contribution to the public conversation about how we live with technology, blames the Internet for the fall of the middle class.  Only the problem is he’s wrong. In his new book Who Owns the Future? Lanier–often described with the word visionary–argues that the information economy in general and network technologies […]

Design is a poor guide to authorization

James Grimmelmann has a great post on the ambiguity of the concept of “circumvention” in the law. He writes about the Computer Fraud and Abuse Act (CFAA) language banning “exceeding authorized access” to a system. There are, broadly speaking, two ways that a computer user could “exceed[] authorized access.” The computer’s owner could use words […]

A Response to Jerry: Craig Should Still Dismiss

[Cross-posted on my blog, Managing Miracles] Jerry Brito, a sometimes contributor to this blog, has a new post on the Reason blog arguing that I and others have been too harsh on Craigslist for their recent lawsuit. As I wrote in my earlier post, Craigslist should give up the lawsuit not just because it’s unlikely […]

Collateral Freedom in China

OpenITP has just released a new report—Collateral Freedom—that studies the state of censorship circumvention tool usage in China today. From the report’s overview: This report documents the experiences of 1,175 Chinese Internet users who are circumventing their country’s Internet censorship—and it carries a powerful message for developers and funders of censorship circumvention tools. We believe […]