Revision as of 12:15, 29 February 2020 editInternetArchiveBot (talk | contribs)Bots, Pending changes reviewers5,381,160 edits Bluelink 1 book for verifiability. ) #IABot (v2.0) (GreenC bot← Previous edit | Revision as of 05:37, 28 March 2020 edit undoJeffyTheDragonSlayer (talk | contribs)194 editsm Princeton wikilinkTag: Visual editNext edit → | ||
Line 3: | Line 3: | ||
'''Seth David Schoen''' (born September 27, 1979) is senior staff ] for the ], a technology civil rights organisation, and has been actively involved in discussing digital ] law and ] since the 1990s. He is an expert in ]. | '''Seth David Schoen''' (born September 27, 1979) is senior staff ] for the ], a technology civil rights organisation, and has been actively involved in discussing digital ] law and ] since the 1990s. He is an expert in ]. | ||
In February 2008, Schoen collaborated with a Princeton research group led by ] that discovered a vulnerability of ] that undermined the basic assumptions of computer encryption security.<ref>{{cite web|url=http://citp.princeton.edu/memory/ |title=Center for Information Technology Policy » Lest We Remember: Cold Boot Attacks on Encryption Keys |publisher=Citp.princeton.edu |date= |accessdate=2010-02-24}}</ref><ref>{{cite news| url=https://www.nytimes.com/2008/02/22/technology/22chip.html?_r=0 | work=] | title=Researchers Find Way to Steal Encrypted Data | first=John | last=Markoff | date=February 22, 2008 | accessdate=May 29, 2015}}</ref> In October 2005, Schoen led a small research team at EFF to decode the tiny tracking dots hidden in the printouts of some laser printers.<ref>{{cite web|url=https://www.eff.org/press/archives/2005/10/16 |title=Press Releases: October, 2005 | Electronic Frontier Foundation |publisher=Eff.org |date= |accessdate=2010-02-24}}</ref> | In February 2008, Schoen collaborated with a ] research group led by ] that discovered a vulnerability of ] that undermined the basic assumptions of computer encryption security.<ref>{{cite web|url=http://citp.princeton.edu/memory/ |title=Center for Information Technology Policy » Lest We Remember: Cold Boot Attacks on Encryption Keys |publisher=Citp.princeton.edu |date= |accessdate=2010-02-24}}</ref><ref>{{cite news| url=https://www.nytimes.com/2008/02/22/technology/22chip.html?_r=0 | work=] | title=Researchers Find Way to Steal Encrypted Data | first=John | last=Markoff | date=February 22, 2008 | accessdate=May 29, 2015}}</ref> In October 2005, Schoen led a small research team at EFF to decode the tiny tracking dots hidden in the printouts of some laser printers.<ref>{{cite web|url=https://www.eff.org/press/archives/2005/10/16 |title=Press Releases: October, 2005 | Electronic Frontier Foundation |publisher=Eff.org |date= |accessdate=2010-02-24}}</ref> | ||
Seth attended ] in ] from 1993–1997. While attending ], Schoen founded ] to protest the ] the state made university employees swear. Schoen later worked for ], where he developed the ]. After he left Linuxcare, he forked the project to create the ] rescue system, of which he is a lead developer. Schoen was formerly a board member and the Secretary of the ], a Texas-based ], until he stepped down in November 2006. | Seth attended ] in ] from 1993–1997. While attending ], Schoen founded ] to protest the ] the state made university employees swear. Schoen later worked for ], where he developed the ]. After he left Linuxcare, he forked the project to create the ] rescue system, of which he is a lead developer. Schoen was formerly a board member and the Secretary of the ], a Texas-based ], until he stepped down in November 2006. |
Revision as of 05:37, 28 March 2020
Seth David Schoen (born September 27, 1979) is senior staff technologist for the Electronic Frontier Foundation, a technology civil rights organisation, and has been actively involved in discussing digital copyright law and encryption since the 1990s. He is an expert in trusted computing.
In February 2008, Schoen collaborated with a Princeton research group led by Edward Felten that discovered a vulnerability of DRAM that undermined the basic assumptions of computer encryption security. In October 2005, Schoen led a small research team at EFF to decode the tiny tracking dots hidden in the printouts of some laser printers.
Seth attended Northfield Mount Hermon School in Northfield, Massachusetts from 1993–1997. While attending UC Berkeley, Schoen founded Californians for Academic Freedom to protest the loyalty oath the state made university employees swear. Schoen later worked for Linuxcare, where he developed the Linuxcare Bootable Business Card. After he left Linuxcare, he forked the project to create the LNX-BBC rescue system, of which he is a lead developer. Schoen was formerly a board member and the Secretary of the Peer-Directed Projects Center, a Texas-based non-profit corporation, until he stepped down in November 2006.
Schoen is the author of the DeCSS haiku.
References
- "Center for Information Technology Policy » Lest We Remember: Cold Boot Attacks on Encryption Keys". Citp.princeton.edu. Retrieved 2010-02-24.
- Markoff, John (February 22, 2008). "Researchers Find Way to Steal Encrypted Data". The New York Times. Retrieved May 29, 2015.
- "Press Releases: October, 2005 | Electronic Frontier Foundation". Eff.org. Retrieved 2010-02-24.
- E. Gabriella Coleman (2013). Coding Freedom: The Ethics and Aesthetics of Hacking. Princeton University Press. p. 161. ISBN 0-691-14461-3.
External links
- Personal homepage
- Vitanuova, Seth's weblog
- Kwon, Sue (18 October 2005). "Computer Printers Track Users". CBS 5 News. Archived from the original on 2006-07-21.
- DeCSS haiku
- The History of the DeCSS Haiku
- Californians for Academic Freedom (archived)