AI v. the Law: Should the Law Keep Up With AI?
In Robert Penn Warren’s All the King’s Men, the author compares the law to a blanket. When used by a big family in the same bed, one family member tugs on the b…
In Robert Penn Warren’s All the King’s Men, the author compares the law to a blanket. When used by a big family in the same bed, one family member tugs on the b…
On March 31, I gave a virtual guest lecture in Mailyn Fidler’s course “The Digital Fourth Amendment” at Harvard Law School. Prof. Fidler invited me to come talk…
On December 11, 2025, President Trump signed an executive order (EO) that purports to deprive states of the ability to regulate artificial intelligence (AI) – t…
It has been suggested that I should be outraged that The Go-Fuck-Yourself-Mister-Cheney guy (Daily Kos for covereage) was followed home by the secret service wh…
Since going open source with software has potential benefits for South Africa it is time to consider a policy shift towards Open Knowledge for South African edu…
The South African government has adopted a policy to use open source software as far as possible As a result there will be increased opportunities for local de…
My Colleague Jennifer Granick is the newest columnest at WiredNews. In her first column, she describes how some innovative websites were able to centralize info…
The Center for Internet and Society and the Stanford Law and Technology Association present Representative Rick Boucher discussing DC Perspectives on MGM v.…
Siani Pearson, Trusted Computing: Strenghts, Weaknesses and Further Opportunities for Enhancing Privacy, in: Herrmann et al. (eds.), iTrust 2005, Proceedings, S…
Ten bucks says this is on The Daily Show tonight. UPDATE: 9/14 3:04PM PST Of course, this turns out to be a hoax. Still pretty fun how believable it is given…
Although much of the policy discussion has focused on the problems created by TCG's remote attestation feature, people like Ross Anderson and, to some exten…
Ulrich Kühn, Klaus Kursawe, Stefan Lucks, Ahmad-Reza Sadeghi & Christian Stüble: Secure Data Management in Trusted Computing. In: Proceedings of the Worksho…
Does private property seized under a search warrant become public record? The Colorado Supreme Court is currently considering this question in a case where the…
September 13, 2005- Speaking on how new tools are competing with or completing traditional media at "News vs. Noise - Issue and Stakeholder Management in t…
Over the last year or so, computer science research on code attestation has increased considerably. I have blogged about current research to overcome the policy…