The process of influencing government action has undergone a significant transformation in the age of the smartphone. Of course, the traditional lobbying business continues to thrive, with companies, trade associations and public interest advocacy groups relying on experienced experts to plead their cases in Washington, DC, and throughout the country. What the smartphone has done, […]
Robots don't threaten, but may be useful threats
Hi, I’m Joanna Bryson, and I’m just starting as a fellow at CITP, on sabbatical from the University of Bath. I’ve been blogging about natural and artificial intelligence since 2007, increasingly with attention to public policy. I’ve been writing about AI ethics since 1998. This is my first blog post for Freedom to Tinker. Will […]
How not to measure security
A recent paper published by Smartmatic, a vendor of voting systems, caught my attention. The first thing is that it’s published by Springer, which typically publishes peer-reviewed articles – which this is not. This is a marketing piece. It’s disturbing that a respected imprint like Springer would get into the business of publishing vendor white […]
The Defend Trade Secrets Act Has Returned
Freedom to Tinker readers may recall that I’ve previously warned about legislation to create a federal private cause of action for trade secret misappropriation in the name of fighting cyber-espionage against United States businesses. Titled the Defend Trade Secrets Act (DTSA), it failed to move last year. Well, the concerning legislation has returned, and, although it has some changes, […]
Does cloud mining make sense?
[Paul Ellenbogen is a second year Ph.D. student at Princeton who’s been looking into the economics and game theory of Bitcoin, among other topics. He’s a coauthor of our recent paper on Namecoin and namespaces. — Arvind Narayanan] Currently, if I wanted to mine Bitcoin I would need to buy specialized hardware, called application-specific integrated […]