CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
Last week I wrote about the antitrust issues raised by the use of encryption to “protect” content. Here’s a concrete example. HD-DVD, one of the two candidates for the next-gen…
-
Controlling Software Updates
Randy Picker questions part of the computer science professors’ Grokster brief (of which I was a co-signer), in which we wrote: Even assuming that Respondents have the right and ability…
-
Michigan Email Registry as a Tax on Bulk Emailers
I wrote on Friday about the new registry of kids’ email addresses being set up by the state of Michigan. I wasn’t impressed. A commenter pointed out an important fact…
-
Encryption and Copying
Last week I criticized Richard Posner for saying that labeling content and adding filtering to P2P apps would do much to reduce infringement on P2P net. In responding to comments,…
-
RIAA Saber-Rattling against Antispoofing Technologies?
The RIAA has fired a shot across the bow of P2P companies whose products incorporate anti-spoofing technologies, according to a story (subscribers only) in Friday’s National Journal Tech Daily, by…
-
Michigan Debuts Counterproductive Do-Not-Spam List for Kids
The state of Michigan has a new registry of kids’ email addresses in the state. Parents can put their kids’ addresses on the list. It’s illegal to send to addresses…
-
Chess Computer Crushes Elite Human Player
Last week Hydra, a chess-playing computer, completed its rout of Michael Adams, the seventh-ranked human player in the world. Hydra won five of six games, and Adams barely escaped with…
-
Posner and Becker, Law and Economics
Richard Posner and Gary Becker turn their bloggic attention to the Grokster decision this week. Posner returns to the argument of his Aimster opinion. Becker is more cautious. After reiterating…
-
Book Club Discussion: Code, Chapter 5
This week in Book Club we read Chapter 5 of Lawrence Lessig’s Code, and Other Laws of Cyberspace. Let’s discuss the chapter in the comments area below. For next week,…
-
GAO Data: Porn Rare on P2P; Filters Ineffective
P2P nets have fewer pornographic images than the Web, and P2P porn filters are ineffective, according to data in a new report from the U.S. Government Accountability Office (GAO). Mind…