Impressions of Primavera Hacker (Santiago de Chile)

Due to my involvement in the UNAM/DGAPA/PAPIME PE102718 project on the ”creation of teaching materials regarding privacy and anonymity mechanisms”, as the Southern half of the world gets ready for the warm season, I was invited to participate during the first weekend of December in Primavera Hacker 17. With around 350 participants spanning a good chunk of Latin America, this was a most interesting experience.
Continue reading

Who Owns Your Device?

We live in an amazing era of technology. The Internet has opened doors that have been dreamed of for years. By adding computing technology to everyday devices, like televisions, thermostats, appliances, and others, we’ve been able to automate many aspects of our daily life. The ideal experience might look something like this 50s ‘futurist’ promotional film entitled “Design For Dreaming”.

The idea of technology being embedded in every object around you is called The Internet of Things, and is one of the fastest growing areas of emerging technology. These days, manufacturers are adding Internet connection to all types of devices around you. One of the most famous examples is the Nest Thermostat [LINK]. This thermostat allows the user to adjust the temperature throughout the day, and eventually learns the user’s patterns, thereafter adjusting the temperature without intervention.

But there’s a dark side to this kind of technology, one that is becoming more visible as the technology goes through growing pains. In this article, we will discuss some of the major issues with putting a computer in every device you own (or don’t really own, as the case may be). We focus on the domestic space, rather than the industrial space, which has its own challenges and benefits. We discuss both the value and problems with adding an internet connection to a device that previously never needed an internet connection, including the reliance on a company to provide updates, security and privacy concerns, and finally judging the value that these additions provide.

Continue reading

Some Thoughts (And Questions) About U.S. v. Cotterman – Part 1 of 2

Last week, the Ninth Circuit released its decision in U.S. v. Cotterman, articulating a new and fascinating standard for border searches of electronic devices. An en banc majority held that government agents need “reasonable suspicion” to justify “forensic examination” of electronic devices at the border. The ruling has been characterized as a win for digital privacy rights – as a general rule, no suspicion whatsoever is required to search people and property at the border. This jump from “no suspicion required” to “reasonable suspicion required” limits when the government can do “forensic examinations,” and grants an exceptional level of protection to electronic devices.

Continue reading