A student-run resource for reliable reports on the latest law and technology news

Archive for the ‘Hacking’ Category

Ex Parte TROs — Exceptional, Unless You’re A “Hacker”
By Corey Omer — Edited by Abhilasha Nautiyal

Battelle Energy Alliance LLC v. Southfork Sec. Inc.

Last month, the District of Idaho issued a rare ex parte temporary restraining order against software developer Corey Thuen and his company, enjoining them from releasing software code as open source and ordering that Thuen’s computer be seized and its contents copied. Judge Winmill reasoned that because Thuen was a “hacker,” the ex parte seizure order was justified.

Read More...

Posted On Nov - 4 - 2013 Comments Off READ FULL POST

Snowden Documents Reveal NSA Attempts to Track Tor Users
By Travis West – Edited by Ashish Bakshi

The National Security Agency (“NSA”) has developed techniques to circumvent Internet anonymity offered by the Tor network. The Tor service anonymizes users’ Internet traffic by routing requests to websites through multiple servers, making it extremely difficult to track. While the NSA can track some Tor users, the agency has been unable to crack the underlying technology, relying instead on browser exploits and its direct access to the Internet backbone to intercept website requests.

Read More...

Posted On Oct - 12 - 2013 Comments Off READ FULL POST

Towards Trans-Atlantic Interoperability: Scientific Research and Privacy Under the EU Data Protection Regulation

Written by: Natalie Kim
Edited by: Alex Shank

The EU is currently drafting a General Data Protection Regulation, thought to be among the toughest data protection laws in existence. This comment address the growing interoperability problem between U.S. and EU data protection law and ways of mitigating it, like reducing third-party liability loopholes, strengthened de-identification techniques and enhanced data tracking measures.

Read More...

Posted On Aug - 11 - 2013 Comments Off READ FULL POST

Injunction Imposed in Volkswagen Car Hacking Case: Public Safety Favored Over Transparency
By Jonathan Sapp – Edited by Alex Shank

A British high court enjoined Flavio Garcia from publishing an academic paper that sought to expose weaknesses in Volkswagen’s automobile security systems. In the paper, Garcia revealed secret codes used to activate the ignition systems of several luxury vehicles. The court’s ruling is the latest in the battle against researchers using hacking to expose security systems’ flaws.

Read More...

Posted On Aug - 10 - 2013 Comments Off READ FULL POST

Unwanted Exposure: Civil and Criminal Liability for Revenge Porn Hosts and Posters

Written by: Susanna Lichter
Edited by: Suzanne Van Arsdale

Hollie Toups, the first named plaintiff in Toups v. GoDaddy, was harassed for weeks after nude pictures of her appeared on the website Texxxan.com alongside her real name and a link to her Facebook profile. When Toups requested that Texxxan.com remove the pictures, she was told by the website that they could help in exchange for her credit card information.[i] Texxxan.com is a “revenge porn” or “involuntary porn” website.[ii]

Read More...

Posted On May - 28 - 2013 2 Comments READ FULL POST
  • RSS
  • Facebook
  • Twitter
  • GooglePlay
Newegg

Newegg Wins Patent T

By Kasey Wang – Edited by Yunnan Jiang and Travis ...

Photo By: Brian Hawkins - CC BY 2.0

The Evolution of Int

[caption id="attachment_4164" align="alignleft" width="300"] Photo By: Brian Hawkins - CC ...

images

The Global Corporate

By Kate Westmoreland Edited by Yunnan Jiang 1.     Introduction Accessing online records and ...

technology-512210_1280

Legal Issues in Comp

By Deborah Beth Medows, Symposium Editor When this author first conceived ...

Microsoft Mobile

A Victory for Compat

By Stacy Ruegilin – Edited by Ken Winterbottom Microsoft Corp. v. ...