Well, At Least the Anti-States’ Rights AI EO Spares AI-CSAM Laws
On December 11, 2025, President Trump signed an executive order (EO) that purports to deprive states of the ability to regulate artificial intelligence (AI) – t…
On December 11, 2025, President Trump signed an executive order (EO) that purports to deprive states of the ability to regulate artificial intelligence (AI) – t…
Back in 2011, as Nevada was developing regulations for automated driving, there was debate about whether vehicles should have a special external signal to indic…
Berlin, April 28, 2025 - Epicenter.works, the Gesellschaft für Freiheitsrechte (GFF), the Verbraucherzentrale Bundesverband (vzbv), and Stanford Professor Barba…
The Associated Press is broadcasting a story about the government's admission of error in the McDanel case. Read more here.…
Federal prosecutors in Los Angeles are moving to vacate Bret McDanel's felony conviction, according to an article in SecurityFocus. Jennifer Granick, who ha…
On October 10, DRM provider Beep Science demonstrated its live mobile DRM solution at a telecom trade show in Geneva and announced that its technology will prov…
Monday October 13, 2003 12:30 – 1:30 p.m. Room 80 (Moot Courtroom) Free and Open to all! Lunch Served Read their paper in MSWord format or in text format (with…
Cybersalon: Digital Democracy in 2004? 6:00-8:30 p.m., Sunday, Oct. 19 Hillside Club, 2286 Cedar St., Berkeley Will the Internet encourage more people, includi…
Cybersalon: Digital Democracy in 2004? 6:00-8:30 p.m., Sunday, Oct. 19 Hillside Club, 2286 Cedar St., Berkeley Will the Internet encourage more people, includi…
Many observers have pointed out that TC architectures might be used by application, service and content providers to define which client applications to interop…
As Ed Felten recently wrote in IEEE Security & Privacy May/June 2003, 60, 61: "In fact, the direct effects of TC are relatively harmless. It is the ind…
No More Weekly Microsoft Patches (10/9/03) Internet Weekly…
Dirk Kuhlmann, On TCPA, in: R.N. Wright (ed.), Financial Cryptography 2003 - Proceedings, Lecture Notes in Computer Science 2742, Springer 2003, pp. 255-269.…
The deadline for paper proposals for Securing Privacy in the Internet Age has been extended to October 27. Presenters will now be notified by mail by November 1…
CIS is now blogging on an even grander scale than before. After more than a year of the CIS Blog, we've unleashed Moveable Type upon the center's fellow…