Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Privacy

Berlin Weighs Possible Hit to U.S. Tech Firms

WSJ – “German politicians are debating a new Internet-security law that could exclude U.S. technology companies from Germany’s digital economy, a sign Berlin is beginning to press its commercial advantage after revelations of spying by the NSA. The draft law, which is still being hammered out, envisions new requirements like revealing source code or other proprietaryContinue Reading

How Secure is TextSecure? – Paper

How Secure is TextSecure? Tilman Frosch and Christian Mainka and Christoph Bader and Florian Bergsma and Joerg Schwenk and Thorsten Holz, October 31, 2014. “Instant Messaging has attracted a lot of attention by users for both private and business communication and has especially gained popularity as low-cost short message replacement on mobile devices. However, most popularContinue Reading

Steganography in Modern Smartphones and Mitigation Techniques

“By offering sophisticated services and centralizing a huge volume of personal data, modern smartphones changed the way we socialize, entertain and work. To this aim, they rely upon complex hardware/software frameworks leading to a number of vulnerabilities, attacks and hazards to profile individuals or gather sensitive information. However, the majority of works evaluating the securityContinue Reading

Another Facebook Experiment on Users is Revealed to Focus on Voting

Micah L. Sifry – Mother Jones: “On Election Day, political campaigns, candidates, consultants, and pollsters pay close attention to who votes and why—and so does Facebook. For the past six years, on every national Election Day, the social-networking behemoth has pushed out a tool—a high-profile button that proclaims “I’m Voting” or “I’m a Voter”—designed toContinue Reading

Guide to Cyber Threat 6 Information Sharing (Draft) – NIST

NIST Special Publication 800-150 (Draft) Guide to Cyber Threat Information Sharing (Draft). Chris Johnson, Lee Badger, David Waltermire – Computer Security Division – Information Technology Laboratory, October 2014: “In today’s active threat environment, incident detection and response is an ongoing challenge for many organizations. This publication assists organizations in establishing computer security incident response capabilities that leverage the collective knowledge, experience, and abilities ofContinue Reading

The False Promise of Anonymity – CDT

Sarah St.Vincent and Alex Bradshaw: “In recent weeks, multiple apps promising “secret” messaging have had sensitive data exposed by breaches and the apps’ not-so-secret data-sharing practices. This news makes one thing clear: the term “anonymity,” as used by apps that ostensibly enable individuals to post updates anonymously, often promises too much. Many applications promising anonymityContinue Reading

Pew Report – Cyber Attacks Likely to Increase

Cyber Attacks Likely to Increase BY LEE RAINIE, JANNA ANDERSON AND JENNIFER CONNOLLY “The Internet has become so integral to economic and national life that government, business, and individual users are targets for ever-more frequent and threatening attacks. In the 10 years since the Pew Research Center and Elon University’s Imagining the Internet Center first asked expertsContinue Reading

California Data Breach Report

Kamala D. Harris, Attorney General, California Department of Justice, October 2014 “California is the birthplace of the digital revolution that has transformed nearly every aspect of the world in which we live. Yet even as technological innovation and advances bring us greater convenience, efficiency, and productivity, they are also generating new vulnerabilities. The Internet has created aContinue Reading

Victims of Online Harassment Describe Their Experiences

Pew – Online Harassment – 73% of adult internet users have seen someone be harassed in some way online and 40% have personally experienced it. Interactive: Personal Experiences of Online Harassment

FOIA request reveals extensive government monitoring of US mail

New York Times: “In a rare public accounting of its mass surveillance program, the United States Postal Service reported that it approved nearly 50,000 requests last year from law enforcement agencies and its own internal inspection unit to secretly monitor the mail of Americans for use in criminal and national security investigations. The number of requests, containedContinue Reading

Communications carriers using browser codes to monetize customer site visits

Forbes – Kashmir Hill: “The generally accepted trade-off on the Internet is that you give up your privacy to get free stuff. It’s summed up by a frequently repeated adage, “If you’re not paying for it, you’re the product.” But sometimes you’re paying for it, and you’re still the product. Verizon and AT&T customers are paying anContinue Reading

Bitcoin over Tor isn’t a good idea – Paper

Paper by Alex Biryukov, Ivan Pustogarov “Bitcoin is a decentralized P2P digital currency in which coins are generated by a distributed set of miners and transaction are broadcasted via a peer-to-peer network. While Bitcoin provides some level of anonymity (or rather pseudonymity) by encouraging the users to have any number of random-looking Bitcoin addresses, recent research shows that this level ofContinue Reading