By Madelyn R. Sanfilippo and Yan Shvartzshnaider Last week, the test of the Presidential Alert system, which many objected to on partisan grounds, brought the Wireless Emergency Alert system (WEA) into renewed public scrutiny. WEA, which distributes mobile push notifications about various emergencies, crises, natural disasters, and amber alerts based on geographic relevance, became operational […]
Building Respectful Products using Crypto: Lea Kissner at CITP
How can we build respect into products and systems? What role does cryptography play in respectful design? Speaking today at CITP is Lea Kissner (@LeaKissner), global lead of Privacy Technology at Google. Lea has spent the last 11 years designing and building security and privacy for Google projects from the grittiest layers of infrastructure to […]
PrivaCI Challenge: Context Matters
by Yan Shvartzshnaider and Marshini Chetty In this post, we describe the Privacy through Contextual Integrity (PrivaCI) challenge that took place as part of the symposium on applications of contextual integrity sponsored by Center for Information Technology Policy and Digital Life Initiative at Princeton University. We summarize the key takeaways from the unfolded discussion. We welcome […]
How can we scale private, smart contracts? Ed Felten on Arbitrum
Smart contracts are powerful virtual referees for holding money and carrying out agreed-on procedures in cases of disputes, but they can’t guarantee privacy and have strict scalability limitations. How can we improve on these constraints? Here at the Center for IT Policy, it’s the first event of our weekly Tuesday lunch series. Speaking today is […]
Thoughts on California’s Proposed Connected Device Privacy Bill (SB-327)
This post was authored by Noah Apthorpe. On September 6, 2018, the California Legislature presented draft legislation to Governor Brown regarding security and authentication of Internet-connected devices. This legislation would extend California’s existing reasonable data security requirement—which already applies to online services—to Internet-connected devices. The intention of this legislation to prevent default passwords and […]