Blog

Max Vision

Max Vision: FBI pawn?, Security Focus, May 8, 2001

Jennifer Granick defends 'the Equalizer': a security expert and confessed hacker who infiltrated the electronic underground to help the Bureau.

Tim Wu

Peer-to-peer network architectures have come to broad attention over the last several years with the success of Napster and other applications.

Many see "pure" peer-to-peer networks as the greatest challenge to enforcement of laws on Internet-related conduct, such as copyright, child pornography, and hate speech.

Bruce Damer and Stephen Reading

This presentation will feature live journeys into online virtual worlds where ad hoc property and civil rules of conduct are emerging. From avatar citizens pilfering hairstyles and ending up in a moot court to communities and enterprises utilizing franchising and choardic structures, this fascinating corner of the net illustrates

Dave Del Torto

Del Torto will be discussing human rights, encryption technologies, and his recent work in Guatemala. This discussion will cover some of the basic issues: international treaties (proposed and existing), UCITA, US crypto export controls and other US initiatives and the work of the CRF in Guatemala as examples of the hard questions at the intersection of human rights work and controls on cryptography.

Pages

Subscribe to Stanford CIS Blog