Author
Tomáš Minárik
Bio: Tomáš Minárik is an academic researcher from NATO Cooperative Cyber Defence Centre of Excellence. The author has contributed to research in topic(s): European Union law & The Right to Privacy. The author has an hindex of 1, co-authored 1 publication(s) receiving 13 citation(s).
Papers
More filters
[...]
TL;DR: The human rights connotations of the anonymity provided by Tor are explored, coming to the conclusion that this anonymity is an integral part of certain human rights, particularly the right to privacy and theright to freedom of expression.
Abstract: Tor is one of the most popular technical means of anonymising one's identity and location online. While it has been around for more than a decade, it is only in recent years that Tor has begun appearing in mainstream media and openly catching the attention of governments and private citizens alike. The conflicting interests related to the use and abuse of Tor also raise a number of legal issues that are yet to be analysed in depth in academic literature. This article focuses on a number of relevant legal issues pertaining to Tor and reflects our initial legal comments, while noting that all of the identified legal questions merit further research. After introducing the technical side of Tor and the attitudes of governments towards it, we (1) explore the human rights connotations of the anonymity provided by Tor, coming to the conclusion that this anonymity is an integral part of certain human rights, particularly the right to privacy and the right to freedom of expression. Government activities with respect to Tor should thus not be unlimited. In relation to this, we (2) provide a closer look at the problem of content liability of the Tor exit node operators. Finally, we (3) point out several legal problems in conducting criminal investigations with the need to obtain the evidence from the Tor network. We conduct this legal analysis in the context of international and European law, paying a particular attention to the case law of the European Court of Human Rights and the Court of Justice of the European Union.
13 citations
Cited by
More filters
[...]
TL;DR: This study presents an integrated cloud incident handling and forensic‐by‐design model and demonstrates the utility of the model for organisational cloud users to undertake incident investigations (e.g. collect and analyse residual data from cloud storage applications).
Abstract: Summary
Information security incident handling strategies or models are important to ensure the security of organisations, particularly in cloud and big data environments. However, existing strategies or models may not adequate as cloud data are generally virtualised, geographically distributed and ephemeral, presenting both technical and jurisdictional challenges. We present an integrated cloud incident handling and forensic-by-design model. We then seek to validate the model using a set of controlled experiments on a cloud-related incident. Three popular cloud storage applications were deployed namely, Dropbox, Google Drive, and OneDrive. This study demonstrates the utility of the model for organisational cloud users to undertake incident investigations (e.g. collect and analyse residual data from cloud storage applications). Copyright © 2016 John Wiley & Sons, Ltd.
80 citations
Dissertation•
[...]
01 Jan 2019
TL;DR: The Europos deliktų teisės kontekste as mentioned in this paper, a group of Europos Teisių Teismo groups, has been formed to promote the development of the Eurovision Song Contest 2019.
Abstract: Disertacijoje, remiantis Europos Žmogaus Teisių Teismo nagrinėtose Delfi AS v. Estonia,
MTE & Index v. Hungary, Pihl v. Sweden ir Tamiz v. the United Kingdom bylose suformuluotais
interneto tinklalapių valdytojų saviraiskos laisvės ribojimo būtinumo demokratinėje visuomenėje
vertinimo elementais, nustatyti ir įvertinti interneto tinklalapių valdytojų deliktinės civilinės
atsakomybės už anoniminiais svetainės lankytojų komentarais tretiesiems asmenims sukeltą
žalą, susijusią su jų teisės į privatų gyvenimą pažeidimais, taikymą pateisinantys kriterijai.
Struktūralizmo koncepcija grindžiamoje pirmojoje darbo dalyje atskleidžiamas is EŽTK 10
straipsnio kylancios interneto tinklalapių valdytojų saviraiskos laisvės ir privataus gyvenimo
kategorijos, kaip interneto tinklalapių valdytojų saviraiskos laisvės ribojimo prielaidos, turinys
bei isskirti konkretūs interneto tinklalapių valdytojų civilinės atsakomybės už žalą, treciųjų
asmenų patiriamą dėl jų teisės į privatų gyvenimą pažeidimo anoniminiais svetainių lankytojų
komentarais, taikymą pateisinantys kriterijai. Antrojoje disertacijos dalyje, kuri grindžiama
funkcionalizmo principu, kompleksinės minėtose Europos Žmogaus Teisių Teismo bylose priimtų
sprendimų analizės pagrindu įvertintas kiekvieno kriterijaus turinys, palyginti jų turinio ir
taikymo skirtingose bylose ypatumai, įvertinta sių kriterijų problematika ir reiksmė, taip pat
nustatytas jų tarpusavio santykis. Tai yra pirmasis tokio pobūdžio mokslinis tyrimas ne tik
Lietuvos, bet ir Europos deliktų teisės kontekste. Tyrimas parodė, kad kertiniai interneto tinklalapių valdytojų civilinės atsakomybės už žalą,
kylancią tretiesiems asmenims dėl jų teisės į privatų gyvenimą pažeidimo anoniminiais svetainės
lankytojų komentarais, taikymą pateisinantys kriterijai yra i) komentarų paskelbimo kontekstas
ir pacių komentarų turinys bei ii) interneto tinklalapio valdytojo taikytos isankstinės komentarų
teisėtumo užtikrinimo priemonės ir faktinis elgesys po komentarų paskelbimo. Tuo metu kiti
Europos Žmogaus Teisių Teismo praktikoje isskiriami kriterijai (t. y. i) nukentėjusiojo asmens
veiksmai iki ir po komentarų pasirodymo, ii) jam komentarų sukeltos pasekmės, iii) komentarų
autorių atsakomybės galimybė kaip tam tikra alternatyva interneto tinklalapių valdytojų
atsakomybei ir iv) civilinės atsakomybės taikymo pasekmės konkreciam interneto tinklalapio
valdytojui) vertintini kaip papildomi ir neturintys esminės įtakos interneto svetainės valdytojų
civilinės atsakomybės taikymo faktui, taciau reiksmingi sprendžiant dėl jų civilinės atsakomybės
taikymo masto.
50 citations
[...]
TL;DR: In this paper, the authors argue that the reluctance of states to engage in international law-making has left a power vacuum, lending credence to claims that international law fails in addressing modern challenges posed by rapid technological development.
Abstract: Several indicators point to a crisis at the heart of the emerging area of international cyber security law. First, proposals for binding international treaties by leading stakeholders, including China and Russia, have been met with little enthusiasm by other states, and are generally seen as having limited prospects of success. Second, states are extremely reluctant to commit themselves to specific interpretations of controversial legal questions and thus to express their cyber opinio juris. Third, instead of interpreting or developing rules, state representatives seek refuge in the more ambiguous term ‘norms’. This article argues that the reluctance of states to engage in international law-making has left a power vacuum, lending credence to claims that international law fails in addressing modern challenges posed by rapid technological development. In response, several non-state-driven norm-making initiatives have sought to fill the void, including Microsoft's cyber norms proposals and the Tallinn Manual project. The article then contends that this emerging body of non-binding norms presents states with a critical window of opportunity to reclaim a central law-making position, similar to historical precedents including the development of legal regimes for Antarctica and nuclear safety. Whether the supposed crisis will lead to the demise of inter-state cyberspace governance or a recalibration of legal approaches will thus be decided in the near future. States should assume a central role if they want to ensure that the existing power vacuum is not exploited in a way that would upset their ability to achieve strategic and political goals.
25 citations
[...]
TL;DR: It is argued that online anonymity should not be conceptualized in absolute terms but as an inherently fluid and transitional condition that characterizes any kind of social interaction online.
Abstract: Whenever we navigate the Web, we leave a trace through our IP address, which can in turn be used to establish our identity – for instance, by cross-checking it with a user’s Internet subscription. By using software such as VPN and Tor, however, it might be possible to avoid leaving such traces. A lively debate among policymakers, security professionals, hacker communities, and human rights associations has recently ensued regarding the question if such anonymity is acceptable and in which form. This article introduces the Crosscurrent special section dedicated to this topic by providing a brief overview of this debate and by pointing to the necessity of considering online anonymity from multiple, interrelated perspectives. By taking into account both technical and social dimensions, we argue that online anonymity should not be conceptualized in absolute terms but as an inherently fluid and transitional condition that characterizes any kind of social interaction online.
13 citations
[...]
TL;DR: This experiment studies how property and liability, two core legal institutions attached to individual persons, react and can be transformed when applied to a peer to peer, distributed design.
Abstract: In this paper I infuse political and legal theory with peer to peer decentralized design features. This experiment studies how property and liability, two core legal institutions attached to individual persons, react and can be transformed (like chemical elements) when applied to a peer to peer, distributed design. This empirical and evolutionary approach of hacking the law, seen as a regulatory system, is then applied to the peer production of law itself, as a political advocacy method for achieving legal reform inspired by the peer to peer ethos.
11 citations