Jonathan Poritz's Shared Materials Page

Shortcuts to sections below: [Please note: the full article texts on this page are posted merely as a convenience for the reader (and author!). In many cases, I do not own the copyright, and even when I do, I remind visitors that there are laws regarding the use (and Fair Use [see this wonderful article produced by the the EFF if you're unsure]) of copyrighted materials. Please read, quote, print out, and generally use in any way these materials only in a manner consistent with relevant laws and general scholarly good taste. In particular, when you wish to reprint large portions of any of these articles, I believe you are obligated to ask permission of the copyright owner. I would certainly appreciate it if you mention to me when you quote and/or link to even short excerpts, whether or not it is an article of which I remain the copyright owner. Thank you!]


  1. Blockchain Pixie Dust
  2. Ivanka's Syllabus
  3. Academic Governance on the Virtual Shop Floor
  4. The Tenured IT Expert? Technology experts should have the academic freedom to speak on behalf of what's best for education, not just a university's bottom line.
  5. Open Access to Technology: Shared Governance of the Academy's Virtual Worlds
  6. Universal Gates in Other Universes
  7. Sharing the Power Over, and the Responsibility for, Information Technology Decisions in Academia
  8. Information Technology Wants to Be Free
  9. On entropy-preserving stochastic averages
  10. Who searches the searchers? community privacy in the age of monolithic search engines
  11. Intrusion-Tolerant Middleware: The Road to Automatic Security
  12. Trust[ed| in] computing, signed code, and the heat death of the Internet
  13. Hash woes
  14. Secure intrusion-tolerant replication on the Internet
  15. Social preferences and price cap regulation
  16. Around polygons in $\RR^3$ and $S^3$
  17. The moduli space of boundary compactifications of $SL(2,\RR)$
  18. Boundary compactifications of $SL(2,\RR)$ and $SL(2,\CC)$
  19. Ford and Dirichlet domains for cyclic subgroups of $PSL(2,\CC)$ acting on $H^3_\RR$ and $\partial H^3_\RR$
  20. Parabolic vector bundles and Hermitian-Yang-Mills connections over a Riemann surface


  1. Lies, Damned Lies, or Statistics:  How to Tell the Truth with Statistics
  2. Education is Not an App: The future of university teaching in the Internet age
  3. Yet Another Introductory Number Theory Textbook  (Cryptology Emphasis Version)
    [Please note: what follows is information about the first version of this book. A more current version is in the process of being written, the PDF of which can be found
    here, and whose source files will be posted probably in August of 2015; come back then if you want the recent version in a form you can modify yourself.]

Talks (those which have been saved in some form that can be shared):

  1. Open Educational Resources Backgrounder at Otero Junior College
  2. Open Access Week 2018 at The University of Denver, Open Educational Resources: Not Just "Free, As In Beer" But Also "Freedom, As In Academic."
  3. Open Access Week 2018 at The University of Denver, Open Educational Resources: the First 2500 Years
  4. CSU-Pueblo Convocation 2018 Academic Session: Open Educational Resources
  5. Fun With Crypto -- Keeping Secrets [From Ancient Greek Warriors, Enemies of the Roman Empire, Medieval English Kings, and Modern Superpowers]
  6. OER Council Contribution to Colorado Department of Higher Education Report to the Joint Budget Committee of the Colorado General Assembly
  7. Open Educational Resources for Public Higher Ed in Colorado
  8. Digital Security HOWTO: Protect your Data, Communications, and Activities, & Painlessly Integrate Teaching Simple Security Into Classes
  9. Technology and the Future of Higher Equation: The 'Net as Neoliberal Dystopia [Yes, that should have been "Higher Education", but this misprint in the conference program was amusing to a mathematician.]
  10. Encrypt Your Email and Hard Drive: A Practical and Mathematical Introduction to Protecting Your Data from Criminals and Surveillance
  11. Information Technology Wants to Be Free the Colorado State University—Pueblo on 25 September 2014.

Reports for Governments [Colorado and the European Union] and Corporations [IBM]:

  1. COLORADO OPEN EDUCATIONAL RESOURCES COUNCIL: Report to the Joint Budget Committee and The Education Committees of the General Assembly -- Open Educational Resources in Colorado
  2. Property attestation--scalable and privacy-friendly security assessment of peer computers
  3. Alternative computational devices and architectures
    • With Giovanni Cherubini, Heike Riel and Gian Salis
    • Published [internally to IBM] 2003
    • Unfortunately, this is an IBM Confidential research report.
  4. Full Design of Dependable Third Party Services
  5. First specification of APIs and protocols for the MAFTIA middleware
  6. Specification of dependable trusted third parties

Articles in Progress:

  1. Finding geometry in classical number theory: the Chinese Remainder Theorem, Kronecker's Theorem and wrapping lines around tori
    • Under construction
  2. Perelman proves Poincaré
  3. Hash chains: a weak link in trusted computing
  4. Who?ogle: an associative interface to the web which preserves individual and community privacy
    • In preparation, watch this space.
  5. Hem-lines, web rankings and other correlates of the stock market
    • In preparation, watch this space.
  6. Ergodic theory and cryptography
    • In preparation, watch this space.


  1. Method and device for verifying the security of a computing platform
  2. Attestation of computing platforms
  3. Method and system to authenticate an application in a computing platform operating in Trusted Computing Group (TCG) domain

NOTE1: I was happy to contribute this piece to Inside Higher Ed and would be used to assigning to them the copyright in situations like this ... but I never had any discussion — and certainly not a written agreement — about the issue with them before the article appeared. Afterwards, I have asked them and they haven't answered specifically the issue about copyright ownership. Since copyright law is one of my side areas of interest, I have to say that in my inexpert opinion, the copyright would probably default to me: the only thing going against that would possibly be the works for hire doctrine, but I wasn't really hired to contribute my part to the article.... Anyway, if IHE wants to assert copyright ownership, I would be happy to talk to them about it!

NOTE2: Despite extensive research, it remains unclear to me who owns the copyright on MAFTIA deliverables — perhaps it is some branch of the EU? — and the MAFTIA web site does not clearly answer this question. In cases where this could be a concern, I suggest contacting one of the senior (former) MAFTIA organizers or perhaps the EU Information Society and Media Directorate-General (see this web site).

Jonathan Poritz (
Last modified:
Creative Commons License Everything on Jonathan Poritz's web pages is by Jonathan A. Poritz and is licensed under a
Creative Commons Attribution-ShareAlike 4.0 International License unless otherwise specified.