Misplaced Pages

Seth Schoen: Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactively← Previous editNext edit →Content deleted Content addedVisualWikitext
Revision as of 19:15, 31 August 2014 editSer Amantio di Nicolao (talk | contribs)Autopatrolled, Administrators6,257,228 edits External links: retag, replaced: {{US-writer-stub}} → {{US-nonfiction-writer-stub}} using AWB← Previous edit Revision as of 22:21, 29 May 2015 edit undoDavidIvar (talk | contribs)373 editsm repaired dead link. marked dead link. added archive-url to dead external linkNext edit →
Line 3: Line 3:
'''Seth David Schoen''' (born September 27, 1979) is senior staff ] for the ], a technology civil rights organisation, and has been actively involved in discussing digital ] law and ] since the 1990s. He is an expert in ]. '''Seth David Schoen''' (born September 27, 1979) is senior staff ] for the ], a technology civil rights organisation, and has been actively involved in discussing digital ] law and ] since the 1990s. He is an expert in ].


In February 2008, Schoen collaborated with a Princeton research group led by ] that discovered a vulnerability of ] that undermined the basic assumptions of computer encryption security.<ref>{{cite web|url=http://citp.princeton.edu/memory/ |title=Center for Information Technology Policy » Lest We Remember: Cold Boot Attacks on Encryption Keys |publisher=Citp.princeton.edu |date= |accessdate=2010-02-24}}</ref><ref>{{cite news| url=http://www.nytimes.com/2008/02/22/technology/22chip.htm | work=] | title=Researchers Find Way to Steal Encrypted Data | first=John | last=Markoff | date=February 22, 2008 | accessdate=May 23, 2010}}</ref> In October 2005, Schoen led a small research team at EFF to decode the tiny tracking dots hidden in the printouts of some laser printers.<ref>{{cite web|url=https://www.eff.org/press/archives/2005/10/16 |title=Press Releases: October, 2005 &#124; Electronic Frontier Foundation |publisher=Eff.org |date= |accessdate=2010-02-24}}</ref> In February 2008, Schoen collaborated with a Princeton research group led by ] that discovered a vulnerability of ] that undermined the basic assumptions of computer encryption security.<ref>{{cite web|url=http://citp.princeton.edu/memory/ |title=Center for Information Technology Policy » Lest We Remember: Cold Boot Attacks on Encryption Keys |publisher=Citp.princeton.edu |date= |accessdate=2010-02-24}}</ref><ref>{{cite news| url=http://www.nytimes.com/2008/02/22/technology/22chip.html?_r=0 | work=] | title=Researchers Find Way to Steal Encrypted Data | first=John | last=Markoff | date=February 22, 2008 | accessdate=May 29, 2015}}</ref> In October 2005, Schoen led a small research team at EFF to decode the tiny tracking dots hidden in the printouts of some laser printers.<ref>{{cite web|url=https://www.eff.org/press/archives/2005/10/16 |title=Press Releases: October, 2005 &#124; Electronic Frontier Foundation |publisher=Eff.org |date= |accessdate=2010-02-24}}</ref>


Seth attended ] in ] from 1993–1997. While attending ], Schoen founded ] to protest the ] the state made university employees swear. Schoen later worked for ], where he developed the ]. After he left Linuxcare, he forked the project to create the ] rescue system, of which he is a lead developer. Schoen was formerly a board member and the Secretary of the ], a Texas-based ], until he stepped down in November 2006. Seth attended ] in ] from 1993–1997. While attending ], Schoen founded ] to protest the ] the state made university employees swear. Schoen later worked for ], where he developed the ]. After he left Linuxcare, he forked the project to create the ] rescue system, of which he is a lead developer. Schoen was formerly a board member and the Secretary of the ], a Texas-based ], until he stepped down in November 2006.
Line 14: Line 14:
== External links == == External links ==
* *
* * {{Dead link|date=May 2015}}
* , CBS 5 News, October 18, 2005 * {{cite web |url=http://cbs5.com/topstories/local_story_291215551.html |title=Computer Printers Track Users |last1=Kwon |first1=Sue |date=18 October 2005 |website= |publisher=CBS 5 News |access-date= |quote=|archive-url=http://web.archive.org/web/20060721063632/http://cbs5.com/topstories/local_story_291215551.html|archive-date=2006-07-26|dead-url=yes}}
* *
* *

Revision as of 22:21, 29 May 2015

Seth Schoen at the 2012 Mystery Hunt

Seth David Schoen (born September 27, 1979) is senior staff technologist for the Electronic Frontier Foundation, a technology civil rights organisation, and has been actively involved in discussing digital copyright law and encryption since the 1990s. He is an expert in trusted computing.

In February 2008, Schoen collaborated with a Princeton research group led by Edward Felten that discovered a vulnerability of DRAM that undermined the basic assumptions of computer encryption security. In October 2005, Schoen led a small research team at EFF to decode the tiny tracking dots hidden in the printouts of some laser printers.

Seth attended Northfield Mount Hermon School in Northfield, Massachusetts from 1993–1997. While attending UC Berkeley, Schoen founded Californians for Academic Freedom to protest the loyalty oath the state made university employees swear. Schoen later worked for Linuxcare, where he developed the Linuxcare Bootable Business Card. After he left Linuxcare, he forked the project to create the LNX-BBC rescue system, of which he is a lead developer. Schoen was formerly a board member and the Secretary of the Peer-Directed Projects Center, a Texas-based non-profit corporation, until he stepped down in November 2006.

Schoen is the author of the DeCSS haiku.

References

  1. "Center for Information Technology Policy » Lest We Remember: Cold Boot Attacks on Encryption Keys". Citp.princeton.edu. Retrieved 2010-02-24.
  2. Markoff, John (February 22, 2008). "Researchers Find Way to Steal Encrypted Data". The New York Times. Retrieved May 29, 2015.
  3. "Press Releases: October, 2005 | Electronic Frontier Foundation". Eff.org. Retrieved 2010-02-24.
  4. E. Gabriella Coleman (2013). Coding Freedom: The Ethics and Aesthetics of Hacking. Princeton University Press. p. 161. ISBN 0-691-14461-3.

External links

Template:Persondata


Stub icon

This article about a United States writer of non-fiction is a stub. You can help Misplaced Pages by expanding it.

Categories: