The Third Workshop on Technology and Consumer Protection Continue reading @freedom-to-tinker.com | 5 years ago
Ten ways to make voting machines cheat with plausible deniability Continue reading @freedom-to-tinker.com | 5 years ago
User Perceptions of Smart Home Internet of Things (IoT) Privacy Continue reading @freedom-to-tinker.com | 5 years ago
An unverifiability principle for voting machines Continue reading @freedom-to-tinker.com | 5 years ago
Continuous-roll VVPAT under glass: an idea whose time has passed Continue reading @freedom-to-tinker.com | 5 years ago
CITP to Launch Tech Policy Clinic; Hiring Clinic Lead Continue reading @freedom-to-tinker.com | 5 years ago
Design flaw in Dominion ImageCast Evolution voting machine Continue reading @freedom-to-tinker.com | 5 years ago
Disaster Information Flows: A Privacy Disaster? Continue reading @freedom-to-tinker.com | 5 years ago
Building Respectful Products using Crypto: Lea Kissner at CITP Continue reading @freedom-to-tinker.com | 5 years ago
How can we scale private, smart contracts? Ed Felten on Arbitrum Continue reading @freedom-to-tinker.com | 5 years ago
Thoughts on California’s Proposed Connected Device Privacy Bill (SB-327) Continue reading @freedom-to-tinker.com | 5 years ago
Serious design flaw in ESS ExpressVote touchscreen: “permission to cheat” Continue reading @freedom-to-tinker.com | 5 years ago
Privacy, ethics, and data access: A case study of the Fragile Families Challenge Continue reading @freedom-to-tinker.com | 5 years ago
Why PhD experiences are so variable and what you can do about it Continue reading @freedom-to-tinker.com | 5 years ago
Can Classes on Field Experiments Scale? Lessons from SOC412 Continue reading @freedom-to-tinker.com | 5 years ago
Demystifying The Dark Web: Peeling Back the Layers of Tor’s Onion Services Continue reading @freedom-to-tinker.com | 5 years ago
Internet of Things in Context: Discovering Privacy Norms with Scalable Surveys Continue reading @freedom-to-tinker.com | 5 years ago
Teaching the Craft, Ethics, and Politics of Field Experiments Continue reading @freedom-to-tinker.com | 5 years ago
Against privacy defeatism: why browsers can still stop fingerprinting Continue reading @freedom-to-tinker.com | 5 years ago
Fast Web-based Attacks to Discover and Control IoT Devices Continue reading @freedom-to-tinker.com | 5 years ago
Exfiltrating data using browser battery discharge information Continue reading @freedom-to-tinker.com | 5 years ago
Princeton Dialogues of AI and Ethics: Launching case studies Continue reading @freedom-to-tinker.com | 5 years ago
When Terms of Service limit disclosure of affiliate marketing Continue reading @freedom-to-tinker.com | 5 years ago
Refining the Concept of a Nutritional Label for Data and Models Continue reading @freedom-to-tinker.com | 6 years ago
Ethics Education in Data Science: Classroom Topics and Assignments Continue reading @freedom-to-tinker.com | 6 years ago
Announcing IoT Inspector: Studying Smart Home IoT Device Behavior Continue reading @freedom-to-tinker.com | 6 years ago
No boundaries for Facebook data: third-party trackers abuse Facebook Login Continue reading @freedom-to-tinker.com | 6 years ago
When the business model *is* the privacy violation Continue reading @freedom-to-tinker.com | 6 years ago
Is It Time for an Data Sharing Clearinghouse for Internet Researchers? Continue reading @freedom-to-tinker.com | 6 years ago
Four cents to deanonymize: Companies reverse hashed email addresses Continue reading @freedom-to-tinker.com | 6 years ago
Oblivious DNS: Plugging the Internet’s Biggest Privacy Hole Continue reading @freedom-to-tinker.com | 6 years ago
Judge Declares Some PACER Fees Illegal but Does Not Go Far Enough Continue reading @freedom-to-tinker.com | 6 years ago