November 27, 2024

Bitcoin Research in Princeton CS

Continuing our post series on ongoing research in computer security and privacy here at Princeton, today I’d like to survey some of our research on Bitcoin. Bitcoin is hot right now because of the recent run-up in its value. At the same time, Bitcoin is a fascinating example of how technology, economics, and social interactions […]

Web measurement for fairness and transparency

[This is the first in a series of posts giving some examples of security-related research in the Princeton computer science department. We’re actively recruiting top-notch students to enter our Ph.D. program, as well as postdocs and visiting scholars. We don’t have enough bandwidth here on the blog to feature everything we do, so we’ll be […]

NSA Strategy 2012-16: Outsourcing Compliance to Algorithms, and What to Do About It

Over the weekend, two new NSA documents revealed a confident NSA SIGINT strategy for the coming years and a vast increase of NSA-malware infected networks across the globe. The excellent reporting overlooked one crucial development: constitutional compliance will increasingly be outsourced to algorithms. Meaningful oversight of intelligence practises must address this, or face collateral constitutional […]

Improve Connectivity in Rural Communities – Principle #9 for Fostering Civic Engagement Through Digital Technologies

In my recent blog posts, I have been discussing ways that citizens can communicate with government officials through the Internet, social media, and wireless technology to solve problems in their communities and to effect public policy. Using technology for civic engagement, however, should not be limited to communications with elected or appointed government officials. One […]

Digital Activism and Non Violent Conflict

As a CITP fellow last year, one of my goals was to get a new project on digital activism off the ground.  With support from the US Institutes of Peace and a distributed network of researchers we pulled together an event dataset of hundreds of instances where people tried using information and communication technologies to achieve […]