Revision as of 22:56, 21 December 2010 edit70.36.139.23 (talk)No edit summary← Previous edit | Revision as of 11:10, 18 January 2011 edit undoDocWatson42 (talk | contribs)Extended confirmed users, Pending changes reviewers217,182 editsm Performed minor clean up and wikification.Next edit → | ||
Line 3: | Line 3: | ||
'''Seth David Schoen''' (born September 27, 1979) is senior staff ] for the ], a technology civil rights organisation, and has been actively involved in discussing digital ] law and ] since the 1990s. He is an expert in ]. | '''Seth David Schoen''' (born September 27, 1979) is senior staff ] for the ], a technology civil rights organisation, and has been actively involved in discussing digital ] law and ] since the 1990s. He is an expert in ]. | ||
In February 2008, Schoen collaborated with a Princeton research group led by ] that discovered a vulnerability of ] that undermined the basic assumptions of computer encryption security.<ref>{{cite web|url=http://citp.princeton.edu/memory/ |title=Center for Information Technology Policy » Lest We Remember: Cold Boot Attacks on Encryption Keys |publisher=Citp.princeton.edu |date= |accessdate=2010-02-24}}</ref><ref>{{cite news| url=http://www.nytimes.com/2008/02/22/technology/22chip.htm | work=The New York Times | title=Researchers Find Way to Steal Encrypted Data | first=John | last=Markoff | date=February 22, 2008 | accessdate=May 23, 2010}}</ref> In October 2005, Schoen led a small research team at EFF to decode the tiny tracking dots hidden in the printouts of some laser printers.<ref>{{cite web|url=http://www.eff.org/news/archives/2005_10.php#004063 |title=Press Releases: October, 2005 | Electronic Frontier Foundation |publisher=Eff.org |date= |accessdate=2010-02-24}}</ref> | In February 2008, Schoen collaborated with a Princeton research group led by ] that discovered a vulnerability of ] that undermined the basic assumptions of computer encryption security.<ref>{{cite web|url=http://citp.princeton.edu/memory/ |title=Center for Information Technology Policy » Lest We Remember: Cold Boot Attacks on Encryption Keys |publisher=Citp.princeton.edu |date= |accessdate=2010-02-24}}</ref><ref>{{cite news| url=http://www.nytimes.com/2008/02/22/technology/22chip.htm | work=] | title=Researchers Find Way to Steal Encrypted Data | first=John | last=Markoff | date=February 22, 2008 | accessdate=May 23, 2010}}</ref> In October 2005, Schoen led a small research team at EFF to decode the tiny tracking dots hidden in the printouts of some laser printers.<ref>{{cite web|url=http://www.eff.org/news/archives/2005_10.php#004063 |title=Press Releases: October, 2005 | Electronic Frontier Foundation |publisher=Eff.org |date= |accessdate=2010-02-24}}</ref> | ||
Seth attended ] in ] from |
Seth attended ] in ] from 1993–1997. While attending ], Schoen founded ] to protest the ] the state made university employees swear. Schoen later worked for ], where he developed the ]. After he left Linuxcare, he forked the project to create the ] rescue system, of which he is a lead developer. Schoen was formerly a board member and the Secretary of the ], a Texas-based ], until he stepped down in November 2006. | ||
Schoen is the author of the ] ];{{Context-inline|date=February 2010}} the haiku was submitted through an anonymous remailer. | Schoen is the author of the ] ];{{Context-inline|date=February 2010}} the haiku was submitted through an anonymous remailer. | ||
Line 31: | Line 31: | ||
{{DEFAULTSORT:Schoen, Seth}} | {{DEFAULTSORT:Schoen, Seth}} | ||
] | ] | ||
⚫ | ] | ||
] | ] | ||
] | ] | ||
] | ] | ||
⚫ | ] | ||
Revision as of 11:10, 18 January 2011
Seth David Schoen (born September 27, 1979) is senior staff technologist for the Electronic Frontier Foundation, a technology civil rights organisation, and has been actively involved in discussing digital copyright law and encryption since the 1990s. He is an expert in trusted computing.
In February 2008, Schoen collaborated with a Princeton research group led by Edward Felten that discovered a vulnerability of DRAM that undermined the basic assumptions of computer encryption security. In October 2005, Schoen led a small research team at EFF to decode the tiny tracking dots hidden in the printouts of some laser printers.
Seth attended Northfield Mount Hermon School in Northfield, Massachusetts from 1993–1997. While attending UC Berkeley, Schoen founded Californians for Academic Freedom to protest the loyalty oath the state made university employees swear. Schoen later worked for Linuxcare, where he developed the Linuxcare Bootable Business Card. After he left Linuxcare, he forked the project to create the LNX-BBC rescue system, of which he is a lead developer. Schoen was formerly a board member and the Secretary of the Peer-Directed Projects Center, a Texas-based non-profit corporation, until he stepped down in November 2006.
Schoen is the author of the DeCSS haiku; the haiku was submitted through an anonymous remailer.
References
- "Center for Information Technology Policy » Lest We Remember: Cold Boot Attacks on Encryption Keys". Citp.princeton.edu. Retrieved 2010-02-24.
- Markoff, John (February 22, 2008). "Researchers Find Way to Steal Encrypted Data". The New York Times. Retrieved May 23, 2010.
- "Press Releases: October, 2005 | Electronic Frontier Foundation". Eff.org. Retrieved 2010-02-24.
External links
- Personal homepage
- Vitanuova, Seth's weblog
- "Computer Printers Track Users", CBS 5 News, October 18, 2005
- DeCSS haiku
- The History of the DeCSS Haiku
- Californians for Academic Freedom (archived)
This article about an American writer is a stub. You can help Misplaced Pages by expanding it. |