Skip to main content
Skip to content
Case File
d-33614House OversightOther

Compilation of crypto and surveillance reading list with no direct allegations

The document only lists publicly available articles, videos, and archival links related to cryptocurrency, privacy, and surveillance. It contains no specific claims, names, transactions, or actionable References to academic and media pieces on crypto and privacy. Mentions a session on private infrastructure for government surveillance. Includes citations of works by David O’Brien, Matt Olsen, Bruc

Date
November 11, 2025
Source
House Oversight
Reference
House Oversight #024263
Pages
1
Persons
0
Integrity
No Hash Available

Summary

The document only lists publicly available articles, videos, and archival links related to cryptocurrency, privacy, and surveillance. It contains no specific claims, names, transactions, or actionable References to academic and media pieces on crypto and privacy. Mentions a session on private infrastructure for government surveillance. Includes citations of works by David O’Brien, Matt Olsen, Bruc

Tags

privacycryptocurrencyacademic-referenceshouse-oversightgovernment-surveillance

Ask AI About This Document

0Share
PostReddit

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
httos://coincenter.org/entry/what-are-smart-contracts-and-what-can-we-do-with-them archived at https://perma.cc/BH6T-J6S7. [OPTIONAL] e Arvind Narayanan; “What Happened to the Crypto Dream, Part 1,” Co-published by the IEEE Computer and Reliability Societies (March/April 2013) http://randomwalker.info/publications/crypto-dream-part1.pdf archived at https://perma.cc/DX8U-QJ5A. e Arvind Narayanan, “What Happened to the Crypto Dream?, Part 2," Co-published by the IEEE and Reliability Societies (May/June 2013) http://randomwalker.info/publications/crypto-dream-part2.pdf archived at https://perma.cc/F482-84AY. e Lawrence Lessig Code 2.0 lecture from COALA Blockchain Workshop: https://www.youtube.com/watch?v=pcYJTIDhYFO. e Chelsea Barabas and Ethan Zuckerman, “Can Bitcoin be used for Good?,” The Atlantic (April 7, 2016) http://www.theatlantic.com/technology/archive/2016/04/bitcoin-hype/477141/ archived at https://perma.cc/V94Q-CCP3. Day 4: Private Infrastructures for Government Surveillance Digital privacy has at times been understood as privacy against corporate intrusion (think ad networks); against government (think the various government intelligence-gathering establishments around the world); and against one another (think drones as well as more pedestrian technologies that empower people to document facts about, or even doxx, each other). This session will look at the second form of surveillance, especially as effectuated through the cooperation or compulsion of private intermediaries. How successful is such surveillance, and will it continue to be effective as the public reacts by potentially adopting privacy-enhancing tools? How successful do we want it to be, and how might frameworks agreeable within jurisdictions that embrace the rule of law be used or abused within those that do not? Readings: e David O’Brien, Matt Olsen, Bruce Schneier, and Jonathan Zittrain, et al. “Don’t Panic. Making Progress on the ‘Going Dark’ Debate,” The Berkman Center for Internet & Society at Harvard University (Feb 1, 2016) https://cyber.law.harvard.edu/pubrelease/dont-panic/Dont_Panic_ Making Progress on Going Dark_Debate.pdf archived at https://perma.cc/NT9M-ELAG. e John Cassidy, “Lessons from Apple vs. The F.B.I.,” The New Yorker (March 29, 2016) http://Awww.newyorker.com/news/john-cassidy/lessons-from-apple-versus-the-f-b-i archived at https://perma.cc/282P-A7MS.

Technical Artifacts (14)

View in Artifacts Browser

Email addresses, URLs, phone numbers, and other technical indicators extracted from this document.

Domainawww.newyorker.com
Domaincoincenter.org
URLhttp://Awww.newyorker.com/news/john-cassidy/lessons-from-apple-versus-the-f-b-i
URLhttp://randomwalker.info/publications/crypto-dream-part1.pdf
URLhttp://randomwalker.info/publications/crypto-dream-part2.pdf
URLhttp://www.theatlantic.com/technology/archive/2016/04/bitcoin-hype/477141
URLhttps://cyber.law.harvard.edu/pubrelease/dont-panic/Dont_Panic_
URLhttps://perma.cc/282P-A7MS
URLhttps://perma.cc/BH6T-J6S7
URLhttps://perma.cc/DX8U-QJ5A
URLhttps://perma.cc/F482-84AY
URLhttps://perma.cc/NT9M-ELAG
URLhttps://perma.cc/V94Q-CCP3
URLhttps://www.youtube.com/watch?v=pcYJTIDhYFO

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.