How the National AI Research Resource can steward the datasets it hosts

Last week I participated on a panel about the National AI Research Resource (NAIRR), a proposed computing and data resource for academic AI researchers. The NAIRR’s goal is to subsidize the spiraling costs of many types of AI research that have put them out of reach of most acade … | Continue reading


@freedom-to-tinker.com | 2 years ago

I never signed up for this! Privacy implications of email tracking (2017)

Continue reading


@freedom-to-tinker.com | 2 years ago

CITP Case Study on Regulating Facial Recognition Technology in Canada

Canada, like many jurisdictions in the United States, is grappling with the growing usage of facial recognition technology in the private and public sectors. This technology is being deployed at a rapid pace in airports, retail stores, social media platforms, and by law enforceme … | Continue reading


@freedom-to-tinker.com | 2 years ago

Recommendations for introducing greater safeguards and transparency into CS conference funding

In Part 1 of this piece, I provided evidence of the extent to which some of the world’s top computer science conferences are financially reliant upon some of the world’s most powerful technology companies. In this second part, I lay out a set of recommendations for ways to help e … | Continue reading


@freedom-to-tinker.com | 2 years ago

Holding Purveyors of “Dark Patterns” for Online Travel Bookings Accountable

Last week, my former colleagues at the New York Attorney General’s Office (NYAG), scored a $2.6 million settlement with Fareportal – a large online travel agency that used deceptive practices, known as “dark patterns,” to manipulate consumers to book online travel. The investigat … | Continue reading


@freedom-to-tinker.com | 2 years ago

The tech industry controls CS conference funding. What are the dangers?

Research about the influence of computing technologies, such as artificial intelligence (AI), on society relies heavily upon the financial support of the very companies that produce those technologies. Corporations like Google, Microsoft, and IBM spend millions of dollars each ye … | Continue reading


@freedom-to-tinker.com | 2 years ago

Attackers exploit fundamental flaw in the web’s security to steal $2 million in cryptocurrency

By Henry Birge-Lee, Liang Wang, Grace Cimaszewski, Jennifer Rexford and Prateek Mittal On Thursday, Feb. 3, 2022, attackers stole approximately $2 million worth of cryptocurrency from users of the Korean crypto exchange KLAYswap. This theft, which was detailed in a Korean-languag … | Continue reading


@freedom-to-tinker.com | 2 years ago

Calling for Investing in Equitable AI Research in Nation’s Strategic Plan

Continue reading


@freedom-to-tinker.com | 2 years ago

T’Mobile: Deleting Stale Data Reduces Liability

Continue reading


@freedom-to-tinker.com | 2 years ago

Faculty search in information technology policy

Continue reading


@freedom-to-tinker.com | 2 years ago

CITP Emerging Scholars Application is Open

Continue reading


@freedom-to-tinker.com | 2 years ago

Could quantum computers be cost-effective by 2036?

Continue reading


@freedom-to-tinker.com | 2 years ago

Another 2020 lawsuit over internet voting

Continue reading


@freedom-to-tinker.com | 2 years ago

Four 2020 lawsuits over internet voting

Continue reading


@freedom-to-tinker.com | 2 years ago

CITP Call for Fellows 2022-23

Continue reading


@freedom-to-tinker.com | 2 years ago

National AI Research Infrastructure Needs to Support Independent Evaluation of Performance Claims

Continue reading


@freedom-to-tinker.com | 2 years ago

We need a personal digital advocate

Continue reading


@freedom-to-tinker.com | 2 years ago

It’s still practically impossible to secure your computer (or voting machine) against attackers who have 30 minutes of access

Continue reading


@freedom-to-tinker.com | 2 years ago

Facebook’s Illusory Promise of Transparency

Continue reading


@freedom-to-tinker.com | 2 years ago

Studying the societal impact of recommender systems using simulation

Continue reading


@freedom-to-tinker.com | 2 years ago

Warnings That Work: Combating Misinformation Without Deplatforming

Continue reading


@freedom-to-tinker.com | 2 years ago

New Hampshire Election Audit, part 2

Continue reading


@freedom-to-tinker.com | 2 years ago

New Hampshire Election Audit, part 1

Continue reading


@freedom-to-tinker.com | 2 years ago

Accommodating voters with disabilities

Continue reading


@freedom-to-tinker.com | 2 years ago

Phone number recycling creates serious security and privacy risks to millions of people

Continue reading


@freedom-to-tinker.com | 2 years ago

Internet Voting is Still Inherently Insecure

Continue reading


@freedom-to-tinker.com | 2 years ago

Expert analysis of Antrim County, Michigan

Continue reading


@freedom-to-tinker.com | 3 years ago

How lever-action voting machines really worked

Continue reading


@freedom-to-tinker.com | 3 years ago

CITP is Hiring a Communications Manager

Continue reading


@freedom-to-tinker.com | 3 years ago

AI Nation podcast, from CITP and WHYY

Continue reading


@freedom-to-tinker.com | 3 years ago

Voting Machine Hashcode Testing: Unsurprisingly insecure, and surprisingly insecure

Continue reading


@freedom-to-tinker.com | 3 years ago

Georgia’s election certification avoided an even worse nightmare that’s just waiting to happen next time

Continue reading


@freedom-to-tinker.com | 3 years ago

Using an Old Model for New Questions on Influence Operations

Continue reading


@freedom-to-tinker.com | 3 years ago

CITP’s Summer Fellowship Program for Training Public Interest Technologists

Continue reading


@freedom-to-tinker.com | 3 years ago

ESS voting machine company sends threats

Continue reading


@freedom-to-tinker.com | 3 years ago

Programs vs. Data (Felten 2003)

Continue reading


@freedom-to-tinker.com | 3 years ago

New Research on Privacy and Security Risks of Remote Learning Software

Continue reading


@freedom-to-tinker.com | 3 years ago

How programmers communicate through code, legally

Continue reading


@freedom-to-tinker.com | 3 years ago

Did Sean Hannity misquote me?

Continue reading


@freedom-to-tinker.com | 3 years ago

New Jersey gets ballot-tracking only half right

Continue reading


@freedom-to-tinker.com | 3 years ago

CITP call for the postdoctoral track of the CITP Fellows Program 2021-22

Continue reading


@freedom-to-tinker.com | 3 years ago

Facial recognition datasets are being widely used despite being taken down due to ethical concerns. Here’s how.

Continue reading


@freedom-to-tinker.com | 3 years ago

Federal judge denies injunction, so 7 states won’t be forced to accept internet ballot return

Continue reading


@freedom-to-tinker.com | 3 years ago

Election Security and Transparency in 2020

Continue reading


@freedom-to-tinker.com | 3 years ago

Vote-by-mail meltdowns in 2020?

Continue reading


@freedom-to-tinker.com | 3 years ago

Election Audits in NJ 2020

Continue reading


@freedom-to-tinker.com | 3 years ago

Voting by mail in NJ 2020

Continue reading


@freedom-to-tinker.com | 3 years ago

GPT-3 Raises Complex Questions for Philosophy and Policy

Continue reading


@freedom-to-tinker.com | 3 years ago