Voting machines I recommend

Continue reading


@freedom-to-tinker.com | 9 days ago

Reexamination of an all-in-one voting machine

Continue reading


@freedom-to-tinker.com | 15 days ago

Do Mobile News Alerts Undermine Media’s Role in Democracy? Madelyn Sanfilippo at CITP

Continue reading


@freedom-to-tinker.com | 1 month ago

Bridging Tech-Military AI Divides in an Era of Tech Ethics: Sharif Calfee at CITP

Continue reading


@freedom-to-tinker.com | 1 month ago

Princeton Students: Learn the Design & Ethics of Large-Scale Experimentation

Continue reading


@freedom-to-tinker.com | 2 months ago

Pilots of risk-limiting election audits in California and Virginia

Continue reading


@freedom-to-tinker.com | 3 months ago

Why voters should mark ballots by hand

Continue reading


@freedom-to-tinker.com | 3 months ago

CITP Call for Visitors for 2019-20

Continue reading


@freedom-to-tinker.com | 3 months ago

Expert opinions on in-person voting machines and vote-by-mail

Continue reading


@freedom-to-tinker.com | 4 months ago

Florida is the Florida of ballot-design mistakes

Continue reading


@freedom-to-tinker.com | 4 months ago

Two cheers for limited democracy in New Jersey

Continue reading


@freedom-to-tinker.com | 4 months ago

When the optical scanners jam up, what then?

Continue reading


@freedom-to-tinker.com | 4 months ago

End-to-End Verifiable Elections

Continue reading


@freedom-to-tinker.com | 4 months ago

Cheating with paper ballots

Continue reading


@freedom-to-tinker.com | 4 months ago

The Third Workshop on Technology and Consumer Protection

Continue reading


@freedom-to-tinker.com | 4 months ago

Ten ways to make voting machines cheat with plausible deniability

Continue reading


@freedom-to-tinker.com | 4 months ago

User Perceptions of Smart Home Internet of Things (IoT) Privacy

Continue reading


@freedom-to-tinker.com | 5 months ago

An unverifiability principle for voting machines

Continue reading


@freedom-to-tinker.com | 5 months ago

Continuous-roll VVPAT under glass: an idea whose time has passed

Continue reading


@freedom-to-tinker.com | 5 months ago

CITP to Launch Tech Policy Clinic; Hiring Clinic Lead

Continue reading


@freedom-to-tinker.com | 5 months ago

Design flaw in Dominion ImageCast Evolution voting machine

Continue reading


@freedom-to-tinker.com | 5 months ago

Disaster Information Flows: A Privacy Disaster?

Continue reading


@freedom-to-tinker.com | 5 months ago

Building Respectful Products using Crypto: Lea Kissner at CITP

Continue reading


@freedom-to-tinker.com | 5 months ago

PrivaCI Challenge: Context Matters

Continue reading


@freedom-to-tinker.com | 5 months ago

How can we scale private, smart contracts? Ed Felten on Arbitrum

Continue reading


@freedom-to-tinker.com | 6 months ago

Thoughts on California’s Proposed Connected Device Privacy Bill (SB-327)

Continue reading


@freedom-to-tinker.com | 6 months ago

Serious design flaw in ESS ExpressVote touchscreen: “permission to cheat”

Continue reading


@freedom-to-tinker.com | 6 months ago

Privacy, ethics, and data access: A case study of the Fragile Families Challenge

Continue reading


@freedom-to-tinker.com | 6 months ago

Securing the Vote — National Academies report

Continue reading


@freedom-to-tinker.com | 6 months ago

Why PhD experiences are so variable and what you can do about it

Continue reading


@freedom-to-tinker.com | 6 months ago

What Are Machine Learning Models Hiding?

Continue reading


@freedom-to-tinker.com | 8 months ago

Can Classes on Field Experiments Scale? Lessons from SOC412

Continue reading


@freedom-to-tinker.com | 8 months ago

Demystifying The Dark Web: Peeling Back the Layers of Tor’s Onion Services

Continue reading


@freedom-to-tinker.com | 8 months ago

Internet of Things in Context: Discovering Privacy Norms with Scalable Surveys

Continue reading


@freedom-to-tinker.com | 8 months ago

Teaching the Craft, Ethics, and Politics of Field Experiments

Continue reading


@freedom-to-tinker.com | 8 months ago

Against privacy defeatism: why browsers can still stop fingerprinting

Continue reading


@freedom-to-tinker.com | 8 months ago

Fast Web-based Attacks to Discover and Control IoT Devices

Continue reading


@freedom-to-tinker.com | 9 months ago

Exfiltrating data using browser battery discharge information

Continue reading


@freedom-to-tinker.com | 9 months ago

Princeton Dialogues of AI and Ethics: Launching case studies

Continue reading


@freedom-to-tinker.com | 10 months ago

How to constructively review a research paper

Continue reading


@freedom-to-tinker.com | 10 months ago

When Terms of Service limit disclosure of affiliate marketing

Continue reading


@freedom-to-tinker.com | 10 months ago

Refining the Concept of a Nutritional Label for Data and Models

Continue reading


@freedom-to-tinker.com | 10 months ago

The Linux Backdoor Attempt of 2003

Continue reading


@freedom-to-tinker.com | 10 months ago

Ethics Education in Data Science: Classroom Topics and Assignments

Continue reading


@freedom-to-tinker.com | 11 months ago

Announcing IoT Inspector: Studying Smart Home IoT Device Behavior

Continue reading


@freedom-to-tinker.com | 11 months ago

No boundaries for Facebook data: third-party trackers abuse Facebook Login

Continue reading


@freedom-to-tinker.com | 11 months ago

Ethics Education in Data Science

Continue reading


@freedom-to-tinker.com | 11 months ago

When the business model *is* the privacy violation

Continue reading


@freedom-to-tinker.com | 11 months ago