<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CFP 2009 Blog</title>
	<atom:link href="http://www.cfp2009.org/wordpress/?feed=rss2" rel="self" type="application/rss+xml" />
	<link>http://www.cfp2009.org/wordpress</link>
	<description>Computers Freedom and Privacy Conference 2009, Creating the Future</description>
	<lastBuildDate>Fri, 19 Jun 2009 22:15:18 +0000</lastBuildDate>
	<generator>http://wordpress.org/?v=2.8.4</generator>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
			<item>
		<title>Privacy alert: Twitter disclosed email addresses when people sent DMs (UPDATED)</title>
		<link>http://www.cfp2009.org/wordpress/?p=242</link>
		<comments>http://www.cfp2009.org/wordpress/?p=242#comments</comments>
		<pubDate>Fri, 19 Jun 2009 17:15:43 +0000</pubDate>
		<dc:creator>JonPincus</dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[alert]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Twitter]]></category>

		<guid isPermaLink="false">http://www.cfp2009.org/wordpress/?p=242</guid>
		<description><![CDATA[UPDATE, 3 p.m. Pacific time: Twitter appears to have fixed the bug, and DMs from before June 11 do not appear to be affected.  But anybody you sent a DM to between June 11 and June 18 now has the email address you&#8217;re using on your Twitter account.
FYI &#8211; when you send a DM, the [...]]]></description>
			<content:encoded><![CDATA[<p><span style="color: #ff0000;">UPDATE, 3 p.m. Pacific time: Twitter appears to have fixed the bug, and DMs from before June 11 do not appear to be affected.  But anybody you sent a DM to between June 11 and June 18 now has the email address you&#8217;re using on your Twitter account.</span></p>
<blockquote><p>FYI &#8211; when you send a DM, the receiver CAN SEE YOUR EMAIL ADDRESS from the DM sent via email. BE AWARE!!! @twitter #security #fail</p></blockquote>
<blockquote><p>&#8211; ChicagoBungalow about 18 hours ago <a href="http://twitter.com/ChicagoBungalow/status/2229669091">on Twitter</a></p></blockquote>
<p>For those who aren&#8217;t on Twitter, a DM is a &#8220;direct message&#8221;, twitterspeak for a private message between two people.  When you receive a DM, Twitter notifies you via email.  And sure enough, just as ChicagoBungalow said, if I send you a DM, if you look at the email header information, you&#8217;ll see that the &#8220;Sender&#8221; field has an address like</p>
<blockquote><p>twitter-dm-jon_pincus=yahoo.com@postmaster.twitter.com</p></blockquote>
<p>This field is hidden by default &#8212; in gmail, you need to select &#8220;Show original&#8221; to see it &#8212; but once you find it, it doesn&#8217;t take a rocket scientist to figure out what yahoo.com account name I used to sign up on Twitter.</p>
<p>If I want somebody to have my email address, I&#8217;ll send it to them.  I don&#8217;t want Twitter giving it out for me. And most especially, I don&#8217;t want Twitter doing it behind my back.</p>
<p>jon</p>
<p>PS: I updated this post several times to clarify the description; thanks to all for the feedback, and @NiteStar for the gmail instructions.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.cfp2009.org/wordpress/?feed=rss2&amp;p=242</wfw:commentRss>
		<slash:comments>16</slash:comments>
		</item>
		<item>
		<title>Computers, Freedom, Privacy, and NEWS!</title>
		<link>http://www.cfp2009.org/wordpress/?p=240</link>
		<comments>http://www.cfp2009.org/wordpress/?p=240#comments</comments>
		<pubDate>Thu, 18 Jun 2009 19:07:54 +0000</pubDate>
		<dc:creator>KNelson</dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[CFP&N]]></category>

		<guid isPermaLink="false">http://www.cfp2009.org/wordpress/?p=240</guid>
		<description><![CDATA[More mentions of the 2009 Computers Freedom and Privacy Conference from the news and blogosphere. 
Futures, Wendy M. Grossman, net.wars, 6-13-09
US Justice Department Considers Possible Antitrust Violations in Google Books Deal, Rachel Balik, Finding Dulcinea, 6-11-09
Let’s Make a Data Deal, Brian Quinton, The Big Fat Marketing Blog, 6-10-09
Talk About Targeting, Cristina Smith, Privacy Gurus Blog. [...]]]></description>
			<content:encoded><![CDATA[<p><em>More mentions of the 2009 Computers Freedom and Privacy Conference from the news and blogosphere. </em></p>
<p><a href="http://www.pelicancrossing.net/netwars/">Futures</a>, Wendy M. Grossman, net.wars, 6-13-09</p>
<p><a href="http://www.findingdulcinea.com/news/Americas/2009/June/US-Justice-Department-Considers-Possible-Monopoly-in-Google-Books-Deal.html">US Justice Department Considers Possible Antitrust Violations in Google Books Deal</a>, Rachel Balik, Finding Dulcinea, 6-11-09</p>
<p><a href="http://bigfatmarketingblog.com/2009/06/10/lets-make-a-data-deal/">Let’s Make a Data Deal</a>, Brian Quinton, The Big Fat Marketing Blog, 6-10-09</p>
<p><a href="http://privacygurus.blogspot.com/2009/06/talk-about-targeting.html">Talk About Targeting</a>, Cristina Smith, Privacy Gurus Blog. 6-9-09</p>
<p><a href="http://www.gauravonomics.com/blog/my-talk-on-the-good-and-bad-sides-of-digital-activism-at-the-computers-freedom-and-privacy-2009-conference/">My Talk on the Good and Bad Sides of Digital Activism at the CFP 2009 Conference</a>, Gaurav Mishra, Gauravonomics Blog, 6-9-09</p>
<p><a href="http://www.itbusinessedge.com/cm/blogs/bentley/data-privacy-issues-still-plague-e-health-record-efforts/?cs=33204">Data Privacy Issues Still Plague E-Health Record Efforts</a>,  Lora Bentley, ITBusinessEdge 6-8-09</p>
]]></content:encoded>
			<wfw:commentRss>http://www.cfp2009.org/wordpress/?feed=rss2&amp;p=240</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Iran: routing around censorship, blogging anonymously, and following the coverage online</title>
		<link>http://www.cfp2009.org/wordpress/?p=226</link>
		<comments>http://www.cfp2009.org/wordpress/?p=226#comments</comments>
		<pubDate>Mon, 15 Jun 2009 18:23:58 +0000</pubDate>
		<dc:creator>JonPincus</dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Activism]]></category>
		<category><![CDATA[censorship]]></category>
		<category><![CDATA[iran]]></category>
		<category><![CDATA[tor]]></category>
		<category><![CDATA[Twitter]]></category>
		<category><![CDATA[voting]]></category>

		<guid isPermaLink="false">http://www.cfp2009.org/wordpress/?p=226</guid>
		<description><![CDATA[
from Twitter
The events in Iran the last several days illustrate a theme repeatedly at this year&#8217;s CFP in the panels on Internet censorship, China, anonymity, and social network activism: governments will routinely block access to the internet and SMS to prevent organizing.  Or at least they&#8217;ll try to &#8230;
As the video of CFP08&#8217;s panel on [...]]]></description>
			<content:encoded><![CDATA[<p style="text-align: center;"><a title="persiankiwi: Internet very slow ... " href="http://www.flickr.com/photos/31110324@N03/3629022303/"><img class="aligncenter" src="http://farm4.static.flickr.com/3394/3629022303_3688e1c091.jpg" alt="persiankiwi: Internet very slow ..." /></a></p>
<p style="text-align: center;"><em><a href="http://twitter.com/persiankiwi/statuses/2170788030">from Twitter</a></em></p>
<p>The events in Iran the last several days illustrate a theme repeatedly at this year&#8217;s CFP in the panels on Internet censorship, China, anonymity, and social network activism: governments will routinely block access to the internet and SMS to prevent organizing.  Or at least they&#8217;ll try to &#8230;</p>
<p>As the <a class="external text" title="http://www.cfp2008.org/video/BreakingSilence052408.mov" rel="nofollow" href="http://www.cfp2008.org/video/BreakingSilence052408.mov">video</a><em> </em>of CFP08&#8217;s panel on <a title="Breaking the Silence: Iranians Find a Voice on the Internet" href="http://www.cfp2008.org/wiki/index.php/Breaking_the_Silence:_Iranians_Find_a_Voice_on_the_Internet">Breaking the Silence: Iranians Find a Voice on the Internet</a> discusses, activists in Iran have plenty of practice in getting around their government&#8217;s technical and legal restrictions.   And so, despite horrendously slow internet speeds in Iran and multiple reports that the government is blocking SMS and Facebook, there continue to be viable communication channels in cyberspace:</p>
<p><span id="more-226"></span></p>
<ul>
<li>Octavia Nasr&#8217;s <a href="http://www.cnn.com/2009/WORLD/meast/06/14/iran.protests.twitter/index.html">Tear gas and Twitter: Iranians take their protests online</a> on <em>CNN.com, </em>the BBC&#8217;s <a href="http://news.bbc.co.uk/2/hi/middle_east/8099579.stm">Internet brings events to life</a> and Ben Parr&#8217;s <a href="http://mashable.com/2009/06/14/new-media-iran/">HOW TO: Track Iran Election with social media</a> on <em>Mashable </em>are excellent overviews.</li>
<li><a href="http://tehranbureau.com/">Tehran Bureau</a>, the bloggers at <a href="http://niacblog.wordpress.com/">niacINsight</a>, <a href="http://www.huffingtonpost.com/2009/06/13/iran-demonstrations-viole_n_215189.html">Nico Pitney</a> at the <em>Huffington Pos</em>t, <a href="http://andrewsullivan.theatlantic.com/the_daily_dish/">Andrew Sullivan</a> at <em>The Atlantic </em>, and <a href="http://thelede.blogs.nytimes.com/2009/06/15/mondays-updates-on-irans-disputed-election/">the New York Times&#8217; </a><em><a href="http://thelede.blogs.nytimes.com/2009/06/15/mondays-updates-on-irans-disputed-election/">The Lede</a> </em>and many others highlight and contextualize the online news.</li>
<li>Blogs like <a href="http://raymankojast.blogspot.com/">Raye Man Kojast? Where Is My Vote?</a>,  <a href="http://25khordad.wordpress.com/">25khordad</a>, <a href="http://www.flickr.com/search/?q=iran&amp;ss=2&amp;s=rec">Flickr</a>, YouTube, and aggregators like <a href="http://friendfeed.com/iran-primary-sources">Iran primary sources</a> are also playing important roles in keeping information flowing.</li>
<li>Twitter is a particularly vibrant source of first-person information and links via the <a href="http://search.twitter.com/search?q=%23iranelection">#iranelection</a> hashtag.  <a href="http://iran.twazzup.com/">Twazzup&#8217;s page</a> is a great way to view it.</li>
</ul>
<p>Additional resources for people in Iran:</p>
<ul>
<li> proxy servers can often let you access sites the government is trying to block.  <a href="http://whatismyipaddress.com/staticpages/index.php/how-do-I-use-a-proxy-server">How do I use a proxy server?</a> has instructions for many different browsers.  Austin Heap has been keeping <a href="http://blog.austinheap.com/2009/06/15/working-iran-proxy-list/">an updated list of available proxy servers</a> and there&#8217;s also <a href="http://iran.twazzup.com/search?q=proxy%20OR%20proxies%20OR%20%23iranproxy">a lot of information on Twitter</a>.</li>
<li>If you need to remain anonymous, <a href="http://www.torproject.org/">Tor can help</a> &#8212; there&#8217;s a Farsi download page at <a href="http://www.torproject.org/index.html.fa">گمنامی آنلاين : Tor </a>For bloggers, Global Voices Advocacy&#8217;s <a href="http://advocacy.globalvoicesonline.org/projects/guide/">Anonymous blogging with Wordpress and Tor</a> is important reading.  There&#8217;s a lot more information and many additional tools <a href="https://www.sesawe.net/spip.php">at sesawe.net</a>, which also has <a href="https://www.sesawe.net/spip.php?lang=fa">Farsi-language pages</a>.</li>
</ul>
<p>At CFP09, Gaurav, Ralf, Nancy and I ended the <a href="http://cfp09.wetpaint.com/page/Online+activism+around+the+world">Online activism around the world</a> panel discussing with a sobering discussion of whether social network sites favored grassroots activists or regimes in power.  At least so far, the protestors in Iran seem to be using the Internet to route around censorship, and social networks &#8212; Twitter, YouTube, Flickr, Facebook &#8212; are a huge part of it.</p>
<p>Twitter figures prominently in the &#8220;coverage of the coverage&#8221;, with headlines across the world like <span class="status-body"><span class="entry-content"><a href="http://flash-politique.fr/?p=309">La révolution n’est pas télévisée, elle est twiterrisée</a> and <a href="http://www.foxnews.com/story/0,2933,526403,00.html">Twitter links Iran protestors to the outside world</a>. </span></span>Twazzup, who provided a custom page for CFP09, has done a great job steadly enhancing <a href="http://iran.twazzup.com/search?q=&amp;l=all">their Iran coverage</a>.  Dolores M. Bernal&#8217;s <a href="http://mynewsjunkie.com/2009/06/13/twitter-users-shame-cnn-for-not-covering-iran-elections-riots/">Twitter users shame CNN for not covering Iran elections, riots</a> on <em>News Junkie</em>, Mark Drapeau&#8217;s <a href="http://www.examiner.com/examiner/x-13483-DC-Technology-and-Politics-Examiner~y2009m6d14-How-online-wordofmouth-can-change-mainstream-media-election-coverage">How online word-of-mouth can change mainstream election media coverage</a> in the <em>Examiner,</em> and Brian Stelter&#8217;s <a href="http://www.nytimes.com/2009/06/15/business/media/15cable.html">Real-time criticism of CNN&#8217;s coverage of Iran</a> in the <em>New York Times</em> illustrate the effect Twitter can have on other media.  As Ralf said in our panel, Twitter changes everything &#8230; hopefully enough to make a difference.</p>
<p style="text-align: center;"><a title="Tonight, we are all Iranians" href="http://www.flickr.com/photos/31110324@N03/3629022159/"><img class="aligncenter" src="http://farm3.static.flickr.com/2427/3629022159_7474c020a5.jpg" alt="Tonight, we are all Iranians" width="500" height="255" /></a><em><br />
CFP09 speaker Michael Anti, on Twitter</em></p>
<p>jon</p>
]]></content:encoded>
			<wfw:commentRss>http://www.cfp2009.org/wordpress/?feed=rss2&amp;p=226</wfw:commentRss>
		<slash:comments>5</slash:comments>
<enclosure url="http://www.cfp2008.org/video/BreakingSilence052408.mov" length="170903123" type="video/quicktime" />
		</item>
		<item>
		<title>&#8220;CFP moments&#8221;</title>
		<link>http://www.cfp2009.org/wordpress/?p=222</link>
		<comments>http://www.cfp2009.org/wordpress/?p=222#comments</comments>
		<pubDate>Thu, 11 Jun 2009 17:15:02 +0000</pubDate>
		<dc:creator>JonPincus</dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Activism]]></category>
		<category><![CDATA[cfp09]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[panopticon]]></category>
		<category><![CDATA[Twitter]]></category>

		<guid isPermaLink="false">http://www.cfp2009.org/wordpress/?p=222</guid>
		<description><![CDATA[Every Computers, Freedom, and Privacy conference has some magic moments that capture the essence of CFP.  For example, when I think of 2005 in Seattle, I remember the grainy surveillance camera and eyecam footage projected in parallel with the opening &#8220;panopticon&#8221; knot of people surrounding Undersecretary of State Frank Moss after the ACLU&#8217;s RFID demonstration, [...]]]></description>
			<content:encoded><![CDATA[<p>Every Computers, Freedom, and Privacy conference has some magic moments that capture the essence of CFP.  For example, when I think of 2005 in Seattle, I remember the grainy surveillance camera and eyecam footage projected in parallel with the opening &#8220;panopticon&#8221; knot of people surrounding Undersecretary of State Frank Moss after the ACLU&#8217;s RFID demonstration, and the four local teens on danah body&#8217;s panel explaining their use of technology to astonished oldsters like me.</p>
<p>What about 2009?</p>
<p>For me, magic happened a coupel of times on Thursday:</p>
<ul>
<li>the panelists on the  Internet and social change in China panel using Twitter and their cellphones to track reports of the demonstrations in Hong Kong and the mass censorship of the Chinese internet</li>
<li>at the closing Panopticon panel, where speakers like Anne Roth and Steven Hatfill talked about how their lives had been turned upside down by total government surveillance &#8212; at the same time as tweets about the unexpected success of the Chaffetz amendment limiting whole-body imaging (aka &#8220;digital strip search&#8221;) showed the potential for privacy advocates using social network activism</li>
</ul>
<p>What are the other &#8220;CFP moments&#8221; you particularly remember, from CFP 2009 or past years?</p>
<p>jon</p>
<p style="text-align: center;"><object width="400" height="320" data="http://www.ustream.tv/flash/video/1604637" type="application/x-shockwave-flash"><param name="flashvars" value="autoplay=false" /><param name="src" value="http://www.ustream.tv/flash/video/1604637" /><param name="allowfullscreen" value="true" /></object></p>
<p style="text-align: center;"><em>Panel, June 4: the Internet and social change in China</em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.cfp2009.org/wordpress/?feed=rss2&amp;p=222</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Goals for CFP 2010 &#8230; your thoughts?</title>
		<link>http://www.cfp2009.org/wordpress/?p=219</link>
		<comments>http://www.cfp2009.org/wordpress/?p=219#comments</comments>
		<pubDate>Tue, 09 Jun 2009 19:55:07 +0000</pubDate>
		<dc:creator>JonPincus</dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cfp2010]]></category>
		<category><![CDATA[goals]]></category>
		<category><![CDATA[planning]]></category>

		<guid isPermaLink="false">http://www.cfp2009.org/wordpress/?p=219</guid>
		<description><![CDATA[The next few weeks will be a little schizophrenic around here, as we wrap up CFP 2009 and start the planning for CFP 2010.  For ideas about speakers or topics you&#8217;d like to see at the conference, please continue to use the CFP 2010 brainstorming thread.   This thread is specifically for discussions about the goals.
Potential [...]]]></description>
			<content:encoded><![CDATA[<p>The next few weeks will be a little schizophrenic around here, as we wrap up CFP 2009 and start the planning for CFP 2010.  For ideas about speakers or topics you&#8217;d like to see at the conference, please continue to use the <a href="http://www.cfp2009.org/wordpress/?p=143">CFP 2010 brainstorming</a> thread.   This thread is specifically for discussions about the goals.</p>
<p>Potential co-chair Elizabeth Stark and I came up with these as a first cut &#8230; what do others think?</p>
<ul>
<li>&#8220;from conference to community&#8221;: move towards a year-round community, with online hubs and smaller in-person regional workshops/salons complementing the main conference</li>
<li>reconnect CFP with hackers and the free culture community</li>
<li>diversify CFP community and conference &#8212; planning team, audience, presenters, &#8230;</li>
<li>build on the high-quality content, engagement with government, and online visibility success of 2009 and continue &#8220;rebooting CFP&#8221;</li>
</ul>
<p>Please discuss!</p>
<p>jon</p>
]]></content:encoded>
			<wfw:commentRss>http://www.cfp2009.org/wordpress/?feed=rss2&amp;p=219</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
		<item>
		<title>&#8220;Online activism around the world&#8221; on the CFP Wetpaint wiki</title>
		<link>http://www.cfp2009.org/wordpress/?p=208</link>
		<comments>http://www.cfp2009.org/wordpress/?p=208#comments</comments>
		<pubDate>Mon, 08 Jun 2009 19:38:29 +0000</pubDate>
		<dc:creator>JonPincus</dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Activism]]></category>
		<category><![CDATA[CFP Program]]></category>
		<category><![CDATA[wiki]]></category>

		<guid isPermaLink="false">http://www.cfp2009.org/wordpress/?p=208</guid>
		<description><![CDATA[At Thursday&#8217;s Online activism around the world session, Ralf Bendrath described how the path to getting 75,000 people in the streets in Germany to protest surveillance started with &#8220;a mailing list and a wiki&#8221;, and I showed Willow Witte&#8217;s slide of the Join the Impact wiki and talked about the work Baratunde Thurston had done [...]]]></description>
			<content:encoded><![CDATA[<p>At Thursday&#8217;s <a href="http://cfp09.wetpaint.com/page/Online+activism+around+the+world"><em>Online activism around the world</em></a> session, Ralf Bendrath described how the path to getting 75,000 people in the streets in Germany to protest surveillance started with &#8220;a mailing list and a wiki&#8221;, and I showed Willow Witte&#8217;s slide of the Join the Impact wiki and talked about the work Baratunde Thurston had done with the Voter Suppression Wiki.   Notice a theme here?</p>
<p>The <a href="http://cfp09.wetpaint.com/page/Online+activism+around+the+world">wiki page</a> we&#8217;ve created for the session has the video, presentations by Ralf, Gaurav Mishra, and me, and links out to moderator Nancy Scola&#8217;s <a class="external" rel="nofollow" href="http://techpresident.com/blog-entry/global-digital-activism-case-study-germanys-freedom-not-fear" target="_blank">Global Digital Activism Case Study: Germany&#8217;s Freedom Not Fear</a> in <em>techPresident </em>as well as Gaurav&#8217;s <a class="external" rel="nofollow" href="http://www.gauravonomics.com/blog/the-4cs-social-media-framework/" target="_blank">The 4Cs Social Media Framework</a>, which provided a great intellectual framework for the session.  There&#8217;s also a document Katrina Neubauer put together <a href="http://attachments.wetpaintserv.us/FuJyffKiATt3t1lURQ%2BOjw%3D%3D60416">summarizing panelists&#8217; email responses to a handful of questions</a>.  If there&#8217;s other information that should be here, please add it to the page or leave it as a comment here &#8230; thanks!</p>
<p>There were a lot of logistical challenges with this panel, and so four of the invited panelists weren&#8217;t able to attend in person.   We&#8217;ll try to work with Basem Fathy, Evgeny Morozov, Michael Bolognino, and Willow Witte to incoporoate their perspectives on the page as well, via a presentation, video, blog post, and/or article.  Over time, we&#8217;ll hopefully have with similar pages for other sessions as well. In other words, stay tuned for more!</p>
<p>And it&#8217;d be great to hear what others thought of the session &#8212; and thoughts what other campaigns we should have covered.  So please feel kick off some discussion in the comments!</p>
<p>jon</p>
]]></content:encoded>
			<wfw:commentRss>http://www.cfp2009.org/wordpress/?feed=rss2&amp;p=208</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Computers, Freedom, Privacy, and NEWS!</title>
		<link>http://www.cfp2009.org/wordpress/?p=206</link>
		<comments>http://www.cfp2009.org/wordpress/?p=206#comments</comments>
		<pubDate>Mon, 08 Jun 2009 19:34:49 +0000</pubDate>
		<dc:creator>KNelson</dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[CFP&N]]></category>

		<guid isPermaLink="false">http://www.cfp2009.org/wordpress/?p=206</guid>
		<description><![CDATA[More CFP09 news and blog coverage. 
China&#8217;s &#8220;Green Dam Youth Escort&#8221; software, Rebecca MacKinnon, RConversation, 6-8-09
Computers Freedom and Privacy, Mike Banks Valentine, Larry English , 6-8-09
The role of design in protecting cyberspace: thoughts from CFP 2009, Ian Glazer, tuesdaynight, 6-8-09
Signs of the Times News fit, Keine Kommentare, privacy laws, 6-7-09
House Curbs &#8220;Virtual Strip Searches&#8221; At [...]]]></description>
			<content:encoded><![CDATA[<p><em>More CFP09 news and blog coverage. </em></p>
<p><a href="http://rconversation.blogs.com/rconversation/2009/06/chinas-green-dam-youth-escort-software.html" target="_blank">China&#8217;s &#8220;Green Dam Youth Escort&#8221; software</a>, Rebecca MacKinnon, RConversation, 6-8-09</p>
<p><a href="http://www.wdqa.cn/816111-Computers-Freedom-and-Privacy.html" target="_blank">Computers Freedom and Privacy</a>, Mike Banks Valentine, Larry English , 6-8-09</p>
<p><a href="http://www.tuesdaynight.org/2009/06/08/the-role-of-design-in-protecting-cyberspace-thoughts-from-cfp-2009.html">The role of design in protecting cyberspace: thoughts from CFP 2009</a>, Ian Glazer, tuesdaynight, 6-8-09</p>
<p><a href="http://privacylaws.edublogs.org/2009/06/07/signs-of-the-times-news-fit-sun-07-jun-2009/" target="_blank">Signs of the Times News fit</a>, Keine Kommentare, privacy laws, 6-7-09</p>
<p><a href="http://www.cbsnews.com/blogs/2009/06/05/politics/politicalhotsheet/entry5067007.shtml" target="_blank">House Curbs &#8220;Virtual Strip Searches&#8221; At Airports</a>, Declan McCullagh, CBS News Political Hotsheet, 6-5-09</p>
<p><a href="http://usacm.acm.org/usacm/weblog/index.php?p=708#more-708" target="_blank">CFP Panel on Voting and the Internet</a>, Association for Computing Machinery Weblog,  6-5-09</p>
<p><a href="http://freedom-to-tinker.com/blog/felten/internet-voting-how-far-can-we-go-safely" target="_blank">Internet Voting: How Far Can We Go Safely?</a>, Ed Felton, Freedom to Tinker, 6-5-09</p>
<p><a href="http://rawstory.com/08/news/2009/06/05/bush-fbi-sent-18-armored-agents-to-search-my-house-wiretap-whisteblower-says/" target="_blank">Bush FBI sent 18 armored agents to search my house, wiretap whistleblower says</a>, John Byrne, The Raw Story, 6-5-09</p>
<p><a href="http://personaldemocracy.com/node/8423" target="_blank">Global Digital Activism Case Study: Germany&#8217;s Freedom Not Fear</a>, Nancy Scola, Personal Democracy Forum, 6-5-09</p>
]]></content:encoded>
			<wfw:commentRss>http://www.cfp2009.org/wordpress/?feed=rss2&amp;p=206</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Computers, Freedom, Privacy and NEWS!</title>
		<link>http://www.cfp2009.org/wordpress/?p=202</link>
		<comments>http://www.cfp2009.org/wordpress/?p=202#comments</comments>
		<pubDate>Fri, 05 Jun 2009 18:50:57 +0000</pubDate>
		<dc:creator>KNelson</dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[CFP&N]]></category>

		<guid isPermaLink="false">http://www.cfp2009.org/wordpress/?p=202</guid>
		<description><![CDATA[Below is more blog and news coverage of CFP09.  If you&#8217;re blogging about the conference, let us know so we can include you in your links!
NSA Whistleblower Meets Anthrax ‘Person of Interest’, Kevin Poulsen, Wired.com&#8217;s Threat Level, 6-4-09
Deep Packet Inspection Here to Stay, Say Computers, Freedom and Privacy Conference Experts, Douglas Streeks, BroadbandCensus.com, 6-4-09
Are We [...]]]></description>
			<content:encoded><![CDATA[<p><em>Below is more blog and news coverage of CFP09.  If you&#8217;re blogging about the conference, let us know so we can include you in your links!</em></p>
<p><a href="http://www.wired.com/threatlevel/2009/06/5954/">NSA Whistleblower Meets Anthrax ‘Person of Interest’</a>, Kevin Poulsen, Wired.com&#8217;s Threat Level, 6-4-09</p>
<p><a href="http://broadbandcensus.com/2009/06/deep-packet-inspection-here-to-stay-say-computers-freedom-and-privacy-conference-experts/">Deep Packet Inspection Here to Stay, Say Computers, Freedom and Privacy Conference Experts</a>, Douglas Streeks, BroadbandCensus.com, 6-4-09</p>
<p><a href="http://www.securitymanagement.com/news/are-we-really-inching-toward-cybarmageddon-005738">Are We Really Inching Toward Cybarmageddon?</a>, Matthew Harwood, Security Management, 6-4-09</p>
<p><a href="http://www.wired.com/threatlevel/2009/06/cfp-evote/">Is Internet Voting Safe? Vote Here</a>, Kevin Poulsen, Wired.com&#8217;s Threat Level, 6-4-09</p>
<p><a href="http://csrlaw.wordpress.com/2009/06/04/live-blogging-from-the-computers-freedom-privacy-cfp-conference-in-washington-d-c-2/">Business and the Internet on Tiananmen’s 20th Anniversary</a>, Chip Pitts, CRS Law, 6-4-09</p>
]]></content:encoded>
			<wfw:commentRss>http://www.cfp2009.org/wordpress/?feed=rss2&amp;p=202</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>CFP 2010 brainstorming thread</title>
		<link>http://www.cfp2009.org/wordpress/?p=143</link>
		<comments>http://www.cfp2009.org/wordpress/?p=143#comments</comments>
		<pubDate>Thu, 04 Jun 2009 23:17:06 +0000</pubDate>
		<dc:creator>JonPincus</dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://www.cfp2009.org/wordpress/?p=143</guid>
		<description><![CDATA[I know, I know, CFP09 isn&#8217;t even over &#8230; but it&#8217;s not too early to be thinking about CFP 2010!
If you&#8217;ve got an idea for a panel, workshop, or tutorial, please submit it via the CFP 2010 submission system.  Or use this thread for brainstorming!  A few questions to think about &#8230;

What do you want [...]]]></description>
			<content:encoded><![CDATA[<p>I know, I know, CFP09 isn&#8217;t even over &#8230; but it&#8217;s not too early to be thinking about CFP 2010!</p>
<p>If you&#8217;ve got an idea for a panel, workshop, or tutorial, please submit it via <a href="http://www.cfp2010.org/submissions/index.html">the CFP 2010 submission system</a>.  Or use this thread for brainstorming!  A few questions to think about &#8230;</p>
<ul>
<li>What do you want to see more of?</li>
<li>What other topics should we cover?</li>
<li>Who should we get as speakers?</li>
<li>How can we make the online aspects better?</li>
</ul>
<p>Other topics, suggestions, critiques, etc. welcome &#8230;</p>
<p>Please discuss!</p>
<p>jon</p>
<p>PS: thanks to Lenny Foner for getting the submission system up so quickly!</p>
]]></content:encoded>
			<wfw:commentRss>http://www.cfp2009.org/wordpress/?feed=rss2&amp;p=143</wfw:commentRss>
		<slash:comments>6</slash:comments>
		</item>
		<item>
		<title>Deep Packet Inspection</title>
		<link>http://www.cfp2009.org/wordpress/?p=194</link>
		<comments>http://www.cfp2009.org/wordpress/?p=194#comments</comments>
		<pubDate>Thu, 04 Jun 2009 20:50:46 +0000</pubDate>
		<dc:creator>GuestBlogger</dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://www.cfp2009.org/wordpress/?p=194</guid>
		<description><![CDATA[Despite the varied backgrounds of the panelists, there was a good deal of agreement about the uses and abuses of Deep Packet Inspection during the discussion today.  The overall conclusion was that the technology itself was neutral, but that specific uses could be either good or evil, and the solution to this was not to [...]]]></description>
			<content:encoded><![CDATA[<p>Despite the varied backgrounds of the panelists, there was a good deal of agreement about the uses and abuses of Deep Packet Inspection during the discussion today.  The overall conclusion was that the technology itself was neutral, but that specific uses could be either good or evil, and the solution to this was not to ban the technology outright, but rather to encourage openness on the part of ISPs as to how they are using DPI on their networks, as well as guidelines to its appropriate use.  Whether those guidelines should be in the form of legislation or not was one of the points of contention.</p>
<p>When discussing the negative uses of DPI, the panel mostly focused on the actions of ISPs, who want to limit specific types of traffic in order to increase their profits.  While legislation may be effective at ensuring that DPI is not used to compromise net neutrality or privacy in the US and other relatively open countries, it will do nothing to ensure that DPI is not used for bad ends in less open countries, such as Iran or China, where DPI will almost certainly become a valuable tool in their censorship and surveillance arsenal, if it isn&#8217;t already.  The possible uses of DPI for overt censorship of political speech, as opposed to limiting economic competition was not directly addressed by the panel. However, Ralf Bendrath of the Delft University of Technology, brought up the issue of non-ISP actors who have an interest in using DPI to monitor traffic when he discussed recent court cases in Europe where the music industry has attempted to force ISPs to use DPI to prevent the transfer of copyrighted MP3s.  He brought up the valid point that once the ISPs have put advanced DPI technology in place in order to &#8220;manage traffic&#8221; or bill users different amounts for different services, they may have trouble fending off legal requirements to use it to do more.</p>
<p>At the same time, there are many valid uses of Deep Packet Inspection.  It is used in routers to allow for IP sharing on a home network, to assist in the transition to IPv6, and to defend against denial of service attacks and other network-breaking attempts.</p>
<p>What I took away from this panel is that Deep Packet Inspection is the latest in a long series of technology that is being defined in the public mind by its worst uses (see: last year&#8217;s substantial limiting of Usenet access by several major ISPs because child pornography was being traded on a couple of groups; the general demonization of P2P file sharing because it is frequently used to transfer copyrighted material, despite other more legally clear uses.)  I think what we should be more concerned about is the varied actors who have a vested interest in limited our choices to serve their own desires&#8211; be they advertisers who want to invade our privacy to sell to us, governments who want to control what political views we are exposed to, or ISPs who want to prevent us from using internet services that compete with their interests.  The debate over what rights we, as internet users, have, and how to keep corporations and governments from abusing those rights, regardless of what technology they use to do it, seems to be much more substantial and much deeper than just DPI.</p>
<p>-Eliza Bonner<br />
Guest Blogger</p>
]]></content:encoded>
			<wfw:commentRss>http://www.cfp2009.org/wordpress/?feed=rss2&amp;p=194</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
