Two cheers for limited democracy in New Jersey

Continue reading


@freedom-to-tinker.com | 5 years ago

When the optical scanners jam up, what then?

Continue reading


@freedom-to-tinker.com | 5 years ago

End-to-End Verifiable Elections

Continue reading


@freedom-to-tinker.com | 5 years ago

Cheating with paper ballots

Continue reading


@freedom-to-tinker.com | 5 years ago

The Third Workshop on Technology and Consumer Protection

Continue reading


@freedom-to-tinker.com | 5 years ago

Ten ways to make voting machines cheat with plausible deniability

Continue reading


@freedom-to-tinker.com | 5 years ago

User Perceptions of Smart Home Internet of Things (IoT) Privacy

Continue reading


@freedom-to-tinker.com | 5 years ago

An unverifiability principle for voting machines

Continue reading


@freedom-to-tinker.com | 5 years ago

Continuous-roll VVPAT under glass: an idea whose time has passed

Continue reading


@freedom-to-tinker.com | 5 years ago

CITP to Launch Tech Policy Clinic; Hiring Clinic Lead

Continue reading


@freedom-to-tinker.com | 5 years ago

Design flaw in Dominion ImageCast Evolution voting machine

Continue reading


@freedom-to-tinker.com | 5 years ago

Disaster Information Flows: A Privacy Disaster?

Continue reading


@freedom-to-tinker.com | 5 years ago

Building Respectful Products using Crypto: Lea Kissner at CITP

Continue reading


@freedom-to-tinker.com | 5 years ago

PrivaCI Challenge: Context Matters

Continue reading


@freedom-to-tinker.com | 5 years ago

How can we scale private, smart contracts? Ed Felten on Arbitrum

Continue reading


@freedom-to-tinker.com | 5 years ago

Thoughts on California’s Proposed Connected Device Privacy Bill (SB-327)

Continue reading


@freedom-to-tinker.com | 5 years ago

Serious design flaw in ESS ExpressVote touchscreen: “permission to cheat”

Continue reading


@freedom-to-tinker.com | 5 years ago

Privacy, ethics, and data access: A case study of the Fragile Families Challenge

Continue reading


@freedom-to-tinker.com | 5 years ago

Securing the Vote — National Academies report

Continue reading


@freedom-to-tinker.com | 5 years ago

Why PhD experiences are so variable and what you can do about it

Continue reading


@freedom-to-tinker.com | 5 years ago

What Are Machine Learning Models Hiding?

Continue reading


@freedom-to-tinker.com | 5 years ago

Can Classes on Field Experiments Scale? Lessons from SOC412

Continue reading


@freedom-to-tinker.com | 5 years ago

Demystifying The Dark Web: Peeling Back the Layers of Tor’s Onion Services

Continue reading


@freedom-to-tinker.com | 5 years ago

Internet of Things in Context: Discovering Privacy Norms with Scalable Surveys

Continue reading


@freedom-to-tinker.com | 5 years ago

Teaching the Craft, Ethics, and Politics of Field Experiments

Continue reading


@freedom-to-tinker.com | 5 years ago

Against privacy defeatism: why browsers can still stop fingerprinting

Continue reading


@freedom-to-tinker.com | 5 years ago

Fast Web-based Attacks to Discover and Control IoT Devices

Continue reading


@freedom-to-tinker.com | 5 years ago

Exfiltrating data using browser battery discharge information

Continue reading


@freedom-to-tinker.com | 5 years ago

Princeton Dialogues of AI and Ethics: Launching case studies

Continue reading


@freedom-to-tinker.com | 5 years ago

How to constructively review a research paper

Continue reading


@freedom-to-tinker.com | 5 years ago

When Terms of Service limit disclosure of affiliate marketing

Continue reading


@freedom-to-tinker.com | 5 years ago

Refining the Concept of a Nutritional Label for Data and Models

Continue reading


@freedom-to-tinker.com | 6 years ago

The Linux Backdoor Attempt of 2003

Continue reading


@freedom-to-tinker.com | 6 years ago

Ethics Education in Data Science: Classroom Topics and Assignments

Continue reading


@freedom-to-tinker.com | 6 years ago

Announcing IoT Inspector: Studying Smart Home IoT Device Behavior

Continue reading


@freedom-to-tinker.com | 6 years ago

No boundaries for Facebook data: third-party trackers abuse Facebook Login

Continue reading


@freedom-to-tinker.com | 6 years ago

Ethics Education in Data Science

Continue reading


@freedom-to-tinker.com | 6 years ago

When the business model *is* the privacy violation

Continue reading


@freedom-to-tinker.com | 6 years ago

Routing Attacks on Internet Services

Continue reading


@freedom-to-tinker.com | 6 years ago

Is It Time for an Data Sharing Clearinghouse for Internet Researchers?

Continue reading


@freedom-to-tinker.com | 6 years ago

Four cents to deanonymize: Companies reverse hashed email addresses

Continue reading


@freedom-to-tinker.com | 6 years ago

Oblivious DNS: Plugging the Internet’s Biggest Privacy Hole

Continue reading


@freedom-to-tinker.com | 6 years ago

Judge Declares Some PACER Fees Illegal but Does Not Go Far Enough

Continue reading


@freedom-to-tinker.com | 6 years ago