{"id":225,"date":"2008-03-17T17:52:33","date_gmt":"2008-03-18T01:52:33","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/2008\/03\/17\/ethics\/"},"modified":"2008-03-17T17:53:10","modified_gmt":"2008-03-18T01:53:10","slug":"ethics","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2008\/03\/17\/ethics\/","title":{"rendered":"Ethics&#8230;?"},"content":{"rendered":"<p>This blog post on freedom-to-tinker came up in my feed reader today: <a href=\"http:\/\/www.freedom-to-tinker.com\/?p=1265\">http:\/\/www.freedom-to-tinker.com\/?p=1265<\/a><\/p>\n<p>The post is an e-mail from a company that makes e-voting machines that is threatening legal action if their voting machine is analyzed and the results published.<\/p>\n<p>What does everyone think of this?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This blog post on freedom-to-tinker came up in my feed reader today: http:\/\/www.freedom-to-tinker.com\/?p=1265 The post is an e-mail from a company that makes e-voting machines that is threatening legal action if their voting machine is analyzed and the results published. &hellip; <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2008\/03\/17\/ethics\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":19,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-225","post","type-post","status-publish","format-standard","hentry","category-ethics"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=225"}],"version-history":[{"count":0,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/225\/revisions"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}