Quantcast
Channel: The Importance of...
Browsing all 9 articles
Browse latest View live

Famous Crypto Case Ends With Whimper, Not Bang

According to C|Net News' Declan McCullagh, the famous cryptography export case Bernstein v. US DOJ has been dismissed due to statements by the DOJ that they promise not to enforce the law against...

View Article



1) Respond to Nonexistent Threat; 2) ... ; 3) Profit!

Tim Oren has an interesting post on his Due Diligence blog concerning the intersection of security and business concerns in the design of systems (What's Your Threat Business Model?). He uses SSL as an...

View Article

Poor Traffic Light Engineering Practices

The Detroit News has a story on special infrared transmitters that can can broadcast a signal to receivers on traffic lights, turning the light from red to green (Gadget may wreak traffic havoc). The...

View Article

DRM Companies Fund Felten's Attacks on DRM

Famed computer science professor Ed Felten runs the Freedom to Tinker blog, where his discussions of cryptography, security, copyright and freedom and technology generally are deservedly popular....

View Article

A Race the FBI Can't Win: The Increasingly Asymmetric Costs of Wiretap...

LawMeme briefly summarizes and collects a number of articles on several law enforcement agencies' (FBI, DOJ and DEA) recent petition to the FCC to expand government wiretap capability (FBI seek to...

View Article


Rumors of SHA-1 Vulnerability

Ed Felten breaks what may be very important news on Freedom to Tinker (SHA-1 Break Rumored). SHA-1 is a member of the SHA family of cryptographic hash functions. Basically, a hash takes a file and then...

View Article

Mere Presence of Encryption on PC Relevant to Criminal Acts

C|Net News reports that the Minnesota State Court of Appeals has upheld a ruling in which the presence of an encryption program on a computer was relevant to a criminal child sex abuse case (Minnesota...

View Article

More on Crypto and Criminal Evidence

A few days ago I took note of State v. Levie, in which Levie was convicted of solicitation of a child to engage in sexual conduct, which included taking nude photos (Mere Presence of Encryption on PC...

View Article


Granick Wants to Know Top Ten Legal Questions for Hackers

Jennifer Granick, executive director of the Stanford Law School Center for Internet and Society, will be attending Black Hat and Defcon in Las Vegas and will be talking about the Top Ten Legal...

View Article

Browsing all 9 articles
Browse latest View live




Latest Images