cdt   317

« earlier    

Report: “Taking the Pulse of Hacking: A Risk Basis for Security Research” | Center for Democracy & Technology
Via Blake Reid

"Over the past three decades, the community that investigates vulnerabilities in computers and networks – the computer and information security research community – has grown. Beginning as a hobby of early computer scientists such as Cliff Stoll, the security research community has become a well-defined industry element that seeks to help defend information systems and networks, and to discover and repair new weaknesses in systems that billions use everyday.

We sought to study the interaction between the law, technology, and this community. Specifically, since security researchers tend to push into grey areas where the law is unclear, an understanding of the law’s “chilling effects” (inhibition or discouragement) on security research has been a major concern of those who work in and with information security."
CDT  risk-assessment  cybersecurity  hacking  law 
april 2018 by pierredv

« earlier    

related tags

2010  2016  3p  abuse  access  algorithms  algorithms;  als  antennas  asia  audio  automated  automation  awareness  bach  backpacking  badges  battery_charger  bikepacking  black  books  build  bullying  c++  c  camping  canada  cemkaner  censorship  cevelop  cheat-sheet  china  chrome  citizenlab  civility  cloud  codeofconduct  colorado  community  compiler  context  converter  countryman  cphcontext  cplusplus  cst  ctsp  cybersecurity  cycling  cygwin  debugger  debugging  devel  devops  devtools  distcomp  dns  dnsfiltering  docjamesw  documentary  documentation  driven  dynamo  eclipse  eff  errormessage  f2c  facialrecognition  film  foursquare  freeexpression  gcc  gdb  gear  gfw  google  grassmudhorse  greatcannon  greatfire.org  h6  hacking  harassment  headset  heuristics  hike  hiking  history  howto  ide  important  include  index  internet  james  law  learning  list  location-privacy  location  makefile  malware  maybesolution  media  method  microphones  mixer  mixing  moderation  multistakeholder  news  ntia  nytimes  otf  oti  pack  panel  paper  papers  parade  path  patterns  pct  phishing  picture  policy  politics  pps  press  principles  privacy  programming  provisioning  qa  qt  quality  recommended  replication  rex  rfa  riak  risk-assessment  routes  rtbkit  santaclara  sdet  secrets;  security  shortcuts  social  software-development  solution  stackoverflow  standards  storage  streaming  sxsw  tallks  tcoil  techdel  tentacular  test  testing  time  tool-i-use  toolchain  toread  trade  trails  trump  tutorial  ultralight  unresolved  videos  voldemort  washingtonpost  weibo  whittaker  wiki  windows  wireless_mikes  xair  xr16  yay 

Copy this bookmark:



description:


tags: