A "Social Networking Safety Act"
At the behest of the state Attorney General, legislation to make MySpace and Facebook safer for children is gaining momentum in the New Jersey State Legislature. The proposed Social Networking Safety...
View ArticleChinese Internet Censorship: See It For Yourself
You probably know already that the Chinese government censors Internet traffic. But you might not have known that you can experience this censorship yourself. Here’s how: (1) Open up another browser...
View ArticleOn China's new, mandatory censorship software
The New York Times reports that China will start requiring censorship software on PCs. One interesting quote stands out: Zhang Chenming, general manager of Jinhui Computer System Engineering, a company...
View ArticleThe Markey Net Neutrality Bill: Least Restrictive Network Management?
It’s an exciting time in the net neutrality debate. FCC Chairman Jules Genachowski’s speech on Monday promised a new FCC proceeding that will aim to create a formal rule to replace the Commission’s...
View ArticleAndroid Open Source Model Has a Short Circuit
[Update: Google subsequently worked out a mechanism that allows Cyanogen and others to distribute their mods separate from the Google Apps.] Last year, Google entered the mobile phone market with a...
View ArticleNet Neutrality: When is Network Management "Reasonable"?
Last week the FCC released its much-awaited Notice of Proposed Rulemaking (NPRM) on network neutrality. As expected, the NPRM affirms past FCC neutrality principles, and adds two more. Here’s the key...
View ArticleThere’s anonymity on the Internet. Get over it.
In a recent interview prominent antivirus developer Eugene Kaspersky decried the role of anonymity in cybercrime. This is not a new claim – it is touched on in the Commission on Cybersecurity for the...
View ArticleA Free Internet, If We Can Keep It
“We stand for a single internet where all of humanity has equal access to knowledge and ideas. And we recognize that the world’s information infrastructure will become what we and others make of it. ”...
View ArticleBuilding a better CA infrastructure
As several Tor project authors, Ben Adida and many others have written, our certificate authority infrastructure has the flaw that any one CA, anywhere on the planet, can issue a certificate for any...
View ArticleWeb Tracking and User Privacy Workshop: Test Cases for Privacy on the Web
This guest post is from Nick Doty, of the W3C and UC Berkeley School of Information. As a companion post to my summary of the position papers submitted for last month’s W3C Do-Not-Track Workshop,...
View Article
More Pages to Explore .....