Week 11 Notes

Created Tuesday 21 July 2020

Kyllo vs US - Marijuana Growing operation / Heat Lamps
Reasonable Expectation of Privacy

Katz vs US - Wiretap
Content-Type: text/x-zim-wiki
Wiki-Format: zim 0.4
Creation-Date: 2020-05-12T19:52:42-04:00

Week 1 Class Notes

LIS-5411 - Information Policy

Welcome to the course! If you can read this, you're in the right place.
Be sure NOT to leave the classroom until the professor has indicated it is okay to do so.

Syllabus

The Lambchop Machine

Information's role in "Capitalism," either as input or output.
Content-Type: text/x-zim-wiki
Wiki-Format: zim 0.4
Creation-Date: 2020-05-19T20:07:30-04:00

Week 2 Class Notes

Created Tuesday 19 May 2020

From economics to law -

Specialized Language - 3 types:

— next up, "Intellectual" "Property"


Week 3 Notes

Created Tuesday 26 May 2020

Property

- from singular (MINE)
- to multiple (STICKS)
..and back? — EXCLUSION!

Three types

IP Clause/Copyright Clause
To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries.

Basic types of IP

Trade Secret*
Trademark*

Patent
Copyright


Week 4 Notes


TRADE SECRET

- must be a secret
- economic advantage
- potentially perpetual
- corporate right of privacy

TRADEMARK

Mostly not too controversial except
● Unfairly scoped and/or wielded (e.g. Sam Bucks Coffee?)
● Weirdly Deceptive? (Famous Amos Cookies?)
● And wait – what is FSU doing?


PATENT


Must be:
● Novel (new)
● Non-obvious
● Useful
prototype?

Not patentable theoretically - Naturally occuring things like – plants and algorithms.
BUT
- man made living things
- not the "thing" but the process....

Reverse Engineering?
Patent don't care.
This is why a lot of people oppose them CATEGORICALLY.
First to invent
First to FILE

Software Patents / Patent Trolls

Content-Type: text/x-zim-wiki
Wiki-Format: zim 0.4
Creation-Date: 2020-06-09T20:15:07-04:00

Week 5 Notes

Created Tuesday 09 June 2020

COPYRIGHT


●Automatic (Berne Convention)

but, must be registered to sue
● “Expression of an idea”
● Not infinite, but almost-- (70+life)

Fair Use (is a defense, not a right)


– Purpose/Character (of the new work)
– Nature of copied work
– Amount of copied work
– (NEGATIVE) Effect on “value”

- (the 5th mystery test, — is it "icky?")










Content-Type: text/x-zim-wiki
Wiki-Format: zim 0.4
Creation-Date: 2020-06-16T20:17:41-04:00

Week 6 Notes

Created Tuesday 16 June 2020

Compulsory Licensing


Orphan Works


Richard Stallman
GNU - Gnu's Not Unix

Linus Torvalds
LINUX - Linux Is Not UniX

Microsoft
EULA (End User License Agreement)
- One person, one computer, one use, that's about it.
(no copying, no taking part, no decompiling etc)

GPL ( General Public License)

The Linksys thing - GPL Violation. WRT54G
OpenWRT
DD-WRT
Tomato





Content-Type: text/x-zim-wiki
Wiki-Format: zim 0.4
Creation-Date: 2020-06-23T20:20:55-04:00

Week 7 Notes

Created Tuesday 23 June 2020

Invisible Barbecue:

FCC - Telephone
FCC- Radio/Television: Scarcity -> Censorship

3 big things about the internet:

  1. Packet Switched
  2. Digitization
  3. PUBLICLY FUNDED "utility"


Telephones: Circuit Switched Network (Smart)
Internet: Packet Switched Network (Dumb)


(illustration of 1 and 2)
"Here, send this packet to someone closer to the destination than you, also I'm going to send more than I need just in case someone's stupid"

  1. C D B (1 of 4)
  2. A E E (2 of 4) etc...
  3. F A E
  4. E D F

encrypted? Cafe Dead Beef.... (groan)




xfinitywifi
Content-Type: text/x-zim-wiki
Wiki-Format: zim 0.4
Creation-Date: 2020-06-30T20:16:33-04:00

Week 8 notes

Created Tuesday 30 June 2020

Privacy - 3 parts

  1. Secrecy (todays' topic)
  2. Anonymity (next week)
  3. A belief in the first two

Encryption

A sends message to B without C eavesdropping (C your way out?)

Cipher - "system"
Key
Ciphertext - "gibberish"
Cleartext - "the message"

Steganography

Encryption- better? It's not "you can't find the message" - it's "yeah, you have a copy but you STILL can't read it. So THERE!"

(private key) (public key)
[huge prime 1 x huge prime 2] = [superhuge composite]
easy ----------->
<---------------------nearly impossibly hard

"The bookstore method" - "One-time pad"

...but what if you CANT meet?

Phil Zimmerman "Pretty Good Privacy" or PGP

Phil went to jail (for a very short time)
...so why was he QUICKLY freed?

It's the other thing you can do with these keys - a weird reverse:
Instead of -
Locking with PUBLIC, unlocking with PRIVATE. (secret messages)

Locked with PRIVATE, unlocked with PUBLIC. (only I could have locked it — and therefore this is authentication)



Hashing

how to store passwords without storing passwords:
Remember — encryption yields "gibberish" --- UNIQUE

Like encryption, except:

  1. The "gibberish" is short
  2. You CANT decrypt it (ideally)
password = $MRNFIEFIJ@ifnjdfieuc92
MuchB3tterpasswordTAC0S = $KNFWIHIH$F

00000kdf3ouirfnjd













Content-Type: text/x-zim-wiki
Wiki-Format: zim 0.4
Creation-Date: 2020-07-07T19:56:40-04:00

Week 9 Notes


How did Frederick Douglass figure out he was a slave?


Privacy - 3 parts

  1. Secrecy (last weeks' topic)
  2. Anonymity (this week)
  3. A belief in the first two


Third-party?

Proxy.
(Is that like a VPN?)
Virtual Private Network?

(only as "good" as the third-party)

TOR - The Onion Router