-
The Mirage of Internet Security: A Response to the Bash Bug
(Image Source: https://flic.kr/p/mjhubJ) Recently in our class on the Law of Evidence, the discussion turned to the security of email accounts, specifically Gmail. Our teacher asked a general question, about how easy it would…
-
An Explanation of Bitcoins, Part II (The Technology)
(Image Source: https://flic.kr/p/e9LG7B) (This post is based in part on a paper earlier published by Rostrum Law Review) This post first explains the Bitcoin Network itself and some of its vulnerabilities, and then the cyptography…
-
An Explanation of Bitcoins, Part I (The Philosophy)
(Image Source: https://flic.kr/p/e9LG7B) (This post is based in part on a paper published by Rostrum Law Review) Most of the currencies in the world right now, and all the reserve currencies, are fiat currencies, declared to…
-
Data Retention Protocols: A Critical Appraisal of the Telecom Surveillance Apparatus in India and Abroad (Part II)
The second post in the two-part series on Data Retention laws in India and abroad, by Balaji Subramanian. The first part can be found here. In Foreign Lands: US and the EU Earlier, I’ve…
-
Data Retention Protocols: A Critical Appraisal of the Telecom Surveillance Apparatus in India and Abroad (Part I)
The following is the first in a two-post series by Balaji Subramanian on Data Retention, a second-year student at NALSAR. Balaji is quite interested in Technology and Cyber Law, and has worked on issues ranging from Cyber Forensics…