Related Posts

“The Cyber” Part IV: Are There Appropriate Ethical Limits on Hacking?

How far is too far? We’ve been asking this question over and over again at CDT while conducting interviews of security researchers and in drafting CDT’s new white paper that surveys “hard questions” in the world of computer security research. Through these conversations, we are developing a basic set of ethical spectra – essentially, axes along which security research activities become more or less ethically questionable. In this white paper, we note a few possible options for better mapping the ethical landscape of the security research world.

Read More

Tech Talk: Patent Politics and Internet Governance for Media Development

CDT’s Tech Talk is a podcast where we dish on tech and Internet policy, while also explaining what these policies mean to our daily lives. In this episode, we explore how different approaches to patents in the US and Europe lead to very different policy outcomes. We also talk about why media development professionals need to start engaging in internet governance.

Read More

“The Cyber:”  Everything You Need to Know About Computer Security Research and More

Of all of this attention to cybersecurity issues, however, too little is being paid to arguably the most important constellation in the cyber universe: the thousands of researchers who toil, often in obscurity, to identify and mitigate cybersecurity vulnerabilities. And yet, this research is more important than many of us not in this world can appreciate. We’ve released a comprehensive white paper that we hope will help frame these conversations going forward. Our paper, titled “The Cyber: Hard Questions in the World of Computer Security Research,” takes a deep dive into four areas of focus.

Read More

Meanwhile in India… the TRAI Continues Progress Toward Net Neutrality Regulation

India continues its efforts to develop a thoughtful and effective regulatory approach to the concept of net neutrality. CDT’s most recent filing focuses on three issues: the scope of regulatory coverage, the type of regulatory approach, and reasonable traffic management. The TRAI’s consultation paper referred extensively to the US and EU net neutrality regulations and, although neither the FCC’s Open Internet Order nor the EU’s Telecom Single Market regulation may fit perfectly in the Indian context, both offer many strong points for regulators considering a new regime. CDT’s comments highlight those strengths in light of our three focal issues.

Read More

Demanding Passwords at the Border Would Undermine Human Rights and Personal Security

Based on remarks by the Homeland Security Secretary John Kelly, the U.S. government is considering taking advantage of the vulnerable moment when someone passes through border control to collect social media account passwords of non-citizens. The government cannot have access to people’s passwords simply because they cross the border. Full stop.

Read More