Filter by keyword:

PIPL - China’s First Personal Information Regulation: How Do We Comply?

October 31, 2022

China’s first comprehensive online data and personal information regulation, Personal Information Privacy Law (PIPL), went into effect on

Privacy in the Era of Drone Surveillance

February 18, 2020

A report from Bard’s College for the Study of Drones shows that so far, 600 law enforcement agencies across the country use drones.[1]

The Fifth Amendment Implications of How You Unlock Your Phone

February 5, 2020

I recently bought a new laptop, one with a fingerprint sensor. I didn’t think much about this feature. My old laptop didn’t have

Surveillance Under the Mask of Identification

December 24, 2019

Surveillance Under the Mask of Identification

We may imagine any number of circumstances in which the government might need to know whether someone is who she

Scraping Together Best (Scraping) Practices: Is There an API for That?

November 12, 2019

Despite its evocative name, “web scraping” is just a blitz of electrical impulses zipping across fiber at approximately the speed of light. Not so easy

The Fight Against the Fake Call: The Rise of Spoofing and Robocalls

March 5, 2019

Your phone starts to vibrate. You don’t recognize the number, but it’s from your area code, so you decide to answer. On the other end

Lawful Hacking: A Temporary Solution to the “Going Dark” Challenge

February 26, 2019

The increased ubiquity and sophistication of encryption presents a serious problem for law enforcement. There has been a growing gap between law enforcement’s legal authority to

How Secure is Your Messenger and Is Encryption Enough?

December 25, 2018

Early in 2018, Facebook confirmed that the company scans chats from their messenger app with the alleged aim to scan for malware and other elicit

The Legality of Law Enforcement’s Access to Genetic Testing Profiles without a Court Order

November 20, 2018

Researchers in the last century have made huge strides in the biological sciences. From the discovery of the double helix of deoxyribonucleic acid (DNA) in

Bitcoin’s Myth of Anonymity and the Rise of Other “Anonymous” Cryptocurrencies

May 16, 2018
Introduction

Many cryptocurrencies tout their “anonymous” qualities and lure users with general promises of untraceable transactions. Users of cryptocurrencies seek anonymity, not necessarily because they want