Stanford CIS
Stefan Bechtold

Stefan Bechtold

Recent articles

Blog

Dreier/Hugenholtz Commentary

Commentary on the Directive 2001/29/EC on the Harmonization of Certain Aspects of Copyright and Related Rights in the Information Society, in: Dreier/Hugenholtz…

Blog

DRM AJCL

Digital Rights Management in the United States and Europe, 52 American Journal of Comparative Law 323-382 (2004).…

Blog

TC talk Stanford

Trusted Computing - Whom do we trust? Different versions of a talk at the CIS at Stanford Law School, March 28, 2005: slides, audio version, synchronized audio…

Blog

CIS talk slides

The slides of my recent talk about trusted computing at the CIS in Stanford are now available online.…

Blog

DRM in Gaming

Some information about digital rights management systems used in computer games may be found here.…

Blog

Allocating trust within TC

One of the features offered by TC is that it transforms trust in entities into trust in components (see here on pp. 644-645 for an explanation). In such an appr…

Blog

Local attestation

One of the criticisms raised against trusted computing is that it solves some potential problems of the future without doing the homework first that precedes th…

Blog

Supreme Court

So, today, the U.S. Supreme Court will hear two cases that may profoundly shape U.S. cyberlaw and may also affect cyberlaw in other countries. For more informat…

Blog

Labeling as an answer to DRM?

Indicare has an interesting article> written by Natali Helberger about the advantages and limitations of labeling requirements as an answer to DRM. Such labe…

Blog

A world of region-coding

At the 3rd DRM conference this January in Berlin, Ross Anderson gave a dinner speech in which he envisaged a world suffused by region-coding technology (imagine…