Notes

INTRODUCTION: ANONYMIZATION USING TOR Between February 20 and March 4, 2015, the United States Federal Bureau of Investigation (FBI) administered and monitored a child pornography website in an effort to identify those who accessed the website’s illicit content. This website, “Playpen,” had more than 150,000 users worldwide. The FBI’s investigation was known as “Operation Pacifier.” […]

Introduction Mobile banking, digital payments, peer-to-peer lending, and e-commerce are no longer ideas drawn from science fiction. The rise of the internet has disrupted our notion of financial payments; we can now shop, invest, and manage our payments online. The emerging industry of financial technology (“fintech”) deepens and broadens the range of financial services that […]

I. Introduction Encryption, though once the narrow province of countries, commanders, and spies, has become widely commonplace. Akin to Prometheus bringing Zeus’s fire to common man, modern computing has made even the most advanced encryption seamlessly and transparently available to the masses. People of the modern world routinely utilize encryption standards strong enough to protect […]

Introduction – Creative Content Users Creating the New Regime Conventional copyright doctrine views copyright from a “top down” perspective where copyright holders possess the power and control over their exclusive rights, expecting potential users to seek permission for any and all protected uses. However, this viewpoint does not map onto what is occurring in our […]