TAP Blog

Posts by Edward Felten
Professor Ed Felten and his research colleagues at Princeton’s Center for Information Technology Policy identify issues with data breach notifications that make it possible for “scammers to create fake phishing emails, potentially victimizing users twice.”
Princeton computer science expert Edward Felten explains the European Commission’s claims against Google for anti-competitive tactics.
How do algorithms process data and arrive at their decisions? Princeton computer science expert Edward Felten delves into the frustrations that arise when trying to understand how algorithms work.
Recently back at Princeton after serving as the U.S. Deputy Chief Technology Officer in the Obama White House, Professor Ed Felten discusses the issues around the use of encryption by people working in government positions.
Computer Science Professor Ed Felten shares his testimony on “Defining Privacy” from the Privacy and Civil Liberties Oversight Board.
Professor Ed Felten, Princeton University, examines the privacy implications of Facebook’s mood manipulation experiment.
In light of recent news that the White House will seek to redesign the NSA’s mass phone call data program, Professor Ed Felten of Princeton University introduces thoughts on how to use cryptography to implement warrants to data in a secure, private, and accountable way.
Professor Ed Felten, Director of the Center for Information Technology Policy at Princeton University, reviews the top tech policy stories of 2013.
Professor Ed Felten, Director of the Center for Information Technology Policy at Princeton University, provides an overview of the research being done by his computer science group on how to secure communications.
Professor Ed Felten, Princeton University, examines two cases where the NSA has been accused of backdooring standards; that is, intentionally establishing weaknesses in the encryption standards that would allow them to read encrypted Internet traffic.
Page: 1, 2