Of Interest

  • Techdirt Podcast Episode 64: Apple, The FBI & You

    I don't think I need to reiterate how important the battle over the future of encryption is. It's not new, but rather the latest clash in a fight that has been raging for years, and the high-profile example of the San Bernardino attacker's iPhone has cast a spotlight on it. This week, we're joined by longtime Techdirt friend Marvin Ammori to dig into the details of this issue, its potential consequences, and its context in the history of encryption.

  • The fight against 'revenge porn'

    Date published: 
    March 7, 2016

    "We know that one photo can ruin your career,” said Danielle Citron, a law professor at the University of Maryland and author of the book “Hate Crimes in Cyberspace.” Citron believes there’s a need for these revenge porn laws, given the inadequacy of most states’ harassment laws to encompass this behavior."

  • Called Out The Global Consequences of Apple's Fight With the FBI

    Author(s): 
    Henry Farrell
    Publication Date: 
    March 7, 2016
    Publication Type: 
    Other Writing

    By now, the details of Apple’s fight with the FBI are well known: the FBI wants access to an iPhone belonging to the deceased terrorism suspect Syed Farook, who was involved in the San Bernardino, California, attack on December 2, 2015.

  • Feds: New judge must force iPhone unlock, overturning ruling that favored Apple

    Date published: 
    March 7, 2016

    ""Judge Orenstein ruled the FBI’s request would 'thoroughly undermine fundamental principles of the Constitution’ and we agree," an Apple spokesman told Ars in a statement. "We share the judge’s concern that misuse of the All Writs Act would start us down a slippery slope that threatens everyone’s safety and privacy."

    The New York case, however, marks the first time that a federal judge has ruled in favor of a more privacy-minded Apple. More recent amicus, or friend of the court briefs, supporting Apple, have cited Judge Orenstein’s ruling.

  • Tool Without a Handle: Tools for Terror, Tools for Peace

    Much consideration has been given to the role of tools in recruitment to extremist violence, the desirability of restricting the use of tools for those purposes, the collateral effects of such restrictions, and the opportunity to use tools for alternative narratives.

    This blog concludes that in some cases, restrictions on such uses can be desirable. At the same time though, with few exceptions, the choice of such restrictions should be left to the private sector, and carried out in a way that advances liberal principles. Moreover, there is unlikely to be a solely technological solution to the problem of radicalization or its products, including planning of terrorist attacks. Ultimately, it may be people rather than tools, that are the most effective resource for curtailing extremist violence.

  • Sacramento-area investigators want iPhones unlocked

    Date published: 
    March 6, 2016

    "“Part of the conversation is whether the FBI has sufficient training and access to technology (to do its job). Asking the private sector to help is not the most efficient fulfillment of its law enforcement duties,” said Andrea Matwyshyn, a scholar at Stanford Law School’s Center for Internet and Society and a professor at Boston’s Northeastern University School of Law.

  • MIT Bitcoin Expo Day One Focuses on Technology

    Date published: 
    March 6, 2016

    "After lunch, Princeton University's Arvind Narayanan took the stage, drawing parallels between the histories of gold mining and telephone line installation and Bitcoin, and encouraging closer collaboration with academia and the Bitcoin community. He also discussed a paper he wrote at Princeton that concluded "only 28 out of nearly 200,000 websites registered with NameCoin led to non-trivial websites" at the time of publication."

Pages

Subscribe to Of Interest