Aug 182014
 

Ryan Calo writes: In a recent op-ed, author Evgeny Morozov claims that we tend to think of privacy in terms of control over personal information rather than power or influence. “The privacy debate, incapacitated by misplaced pragmatism, defines privacy as individual control over information flows,” writes Morozov. Instead we should be thinking of how and why powerful [...]

Aug 042014
 

Chris Hoofnagle writes: Privacy surveys find that individuals care about privacy, but any observer of social networks can find a great deal of profligate, ill-advised information sharing. This is the so called privacy paradox, the idea that “People’s concerns toward privacy are unrelated to the privacy behaviors. Even though users have substantial concerns with regard to [...]

Jul 312014
 

Ed Felten writes: Yesterday the Tor Project issued an advisory describing a large-scale identification attack on Tor hidden services. The attack started on January 30 and ended when Tor ejected the attackers on July 4. It appears that this attack was the subject of a Black Hat talk that was canceled abruptly. These attacks raise serious questions about research [...]

Jul 292014
 

This is an exciting RFP: The Berkeley Center for Law & Technology and Microsoft are issuing this request for proposals (RFP) to fund scholarly inquiry to examine the civil rights, human rights, security and privacy issues that arise from recent initiatives to release large datasets of government information to the public for analysis and reuse.  [...]

Jul 242014
 

Ann Cavoukian and Dan Castro recently published a report titled Big Data and Innovation, Setting the Record Straight: De-Identification Does Work. Arvind Narayanan and Edward Felten wrote a critique of this report, which they highlighted on Freedom to Tinker. Today Khaled El Emam and Luk Arbuckle respond on the FPF blog with this guest post. Why de-identification is a [...]