In a matter of less than two hours after a right-wing blogger was exposed as the named registrant for a domain calling for the death of Julian Assange, the domain registration was hidden behind whois protection. Eventually the domain was deleted altogether. And therein lies a tale of how quickly public pressure can produce change….
Category: Misc
Privacy vs. Security vs. Anonymity
Sasha Romanosky writes: When I first began my PhD at Carnegie Mellon, I was keen to properly sort and define any new terms and reconcile them with my own education and experience. Three terms that always seemed to be intermingled were: Privacy, Security and Anonymity. Certainly they are related, but I wanted to be a…
Article: Accountability as a Driver of Innovative Privacy Solutions
Joan Feigenbaum of the Yale Computer Science Department has an article, “Accountability as a Driver of Innovative Privacy Solutions,” available online. The abstract: The standard technical approach to privacy in particular and computer security in general is preventive: Before someone can access confidential data or take any other action that implicates privacy or security, he should be required…
Article: The Federal Trade Commission and Privacy: Defining Enforcement and Encouraging the Adoption of Best Practices
Privacy lawyer Andrew Serwin of Foley & Lardner has uploaded a new article to SSRN: “The Federal Trade Commission and Privacy: Defining Enforcement and Encouraging the Adoption of Best Practices.” Here’s the abstract: This article examines the history and path of privacy enforcement by the Federal Trade Commission, as well as the FTC’s recently issued…