Other Posts

Copyright Is Like QWERTY: Locked-In and Retrospective

The term ‘path dependence’ is generally used to describe the development of technological standards and how they ‘lock in’ a given technical solution. The QWERTY keyboard is often given as an example of path dependence – the fact that the costs of changing the keyboard to a better, more efficient solution, hinders change. The same can be said about much […]

April 24, 2011 · 0 comments · Commentary

No, iPhone location tracking isn’t harmless and here’s why

It didn’t take long for the blogosphere to respond to research presented on Wednesday that detailed a file in Apple iPhones and iPads unknown to the vast majority of its users that stored a long list of their time-stamped locations, sometimes with alarming detail. On Thursday, a forensics expert who sells software to law enforcement agencies gave a first-hand account […]

April 22, 2011 · 0 comments · Commentary

How People Broadcast Their Locations Without Meaning To

Smart phones include geotagging features that many people aren’t aware of. People were up in arms this week about the privacy implications of news that the iPhone gathers location information and stores it in a file on the user’s computer. But experts say that smart-phone owners are unknowingly taking a much bigger risk with information about where they go all […]

April 22, 2011 · 0 comments · Commentary

Publishers Force Domain Seizure of Public Domain Music Resource

IMSLP, the largest public domain music library on the Internet, has just suffered a damaging attack on the site’s infrastructure. In a wrongful action over a single 90 year-old classical piece by Rachmaninoff, the UK’s Music Publishers Association convinced registrar GoDaddy to seize IMSLP’s domain name, which took the site completely offline. While most readers will be very familiar with […]

April 22, 2011 · 0 comments · Commentary

“Who Has Your Back?” In Depth: Which Companies Promise To Tell Users About Government Data Requests?

EFF recently launched a campaign calling on companies to stand with their users when the government comes looking for data. (If you haven’t done so, sign our petition urging companies to provide better transparency and privacy.) This article will provide a more detailed look at one of the four categories in which a company can earn a gold star in […]

April 21, 2011 · 0 comments · Commentary

CAPTCHAs With Chaos: Strong Protection for Weak Passwords

The passwords of the future could become more secure and, at the same time, simpler to use. Researchers at the Max Planck Institute for the Physics of Complex Systems in Dresden have been inspired by the physics of critical phenomena in their attempts to significantly improve password protection. The researchers split a password into two sections. With the first, easy-to-memorize […]

April 21, 2011 · 0 comments · Commentary