Jul 242014

Ann Cavoukian and Dan Castro recently published a report titled Big Data and Innovation, Setting the Record Straight: De-Identification Does Work. Arvind Narayanan and Edward Felten wrote a critique of this report, which they highlighted on Freedom to Tinker. Today Khaled El Emam and Luk Arbuckle respond on the FPF blog with this guest post. Why de-identification is a [...]

Jul 162014

Arvind Narayanan and Edward W. Felten write: Paul Ohm’s 2009 article “Broken Promises of Privacy” spurred a debate in legal and policy circles on the appropriate response to computer science research on re-identification.1 In this debate, the empirical research has often been misunderstood or misrepresented. A new report by Ann Cavoukian and Daniel Castro is full of such [...]

Jul 032014

CBS in Denver reports: A drone crashed into a Brighton man’s backyard and now the homeowner wants answers. George Ray said the drone had a GoPro camera mounted on it and was videotaping over his property located off Interstate 76 near 136th Ave. early this morning. Ray said he heard a strange sound outside his [...]

Jun 252014

Richard Clayton writes: Long time readers will recall that last year ICANN published the draft report of our study into the abuse of privacy and proxy services when registering domain names. At WEIS 2014 I will present our academic paper summarising what we have found — and the summary (as the slides for the talk indicate) is very straightforward: when criminals register domain names [...]

Jun 182014

Leo Kelion reports: The maker of a drone that fires pepper spray bullets says it has received its first order for the machine. South Africa-based Desert Wolf told the BBC it had secured the sale of 25 units to a mining company after showing off the tech at a trade show. It is marketing the device as [...]