CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
OK, time to dive in here from my hotel room. A little while ago I posted a guest entry on the Berkman blog that offers a few details about how…
-
Guest Blogger: JD Lasica
I’m happy to welcome JD Lasica, author of the new book Darknet: Hollywood’s War Against the Digital Generation, and co-founder of OurMedia, who will be guest-blogging here this coming week.…
-
Reading Code in 2005
[This post is part of the Book Club reading Lawrence Lessig’s Code and Other Laws of Cyberspace. Please use the comments area below to discuss the Preface and Chapter 1.…
-
Analysis of Fancy E-Voting Protocols
Karlof, Sastry, and Wagner have an interesting new paper looking at fancy voting protocols designed by Neff and Chaum, and finding that they’re not yet ready for use. The protocols…
-
CDT Closes Eyes, Wishes for Good DRM
The Center for Democracy and Technology just released a new copyright policy paper. Derek Slater notes, astutely, that it tries at all costs to take the middle ground. It’s interesting…
-
Intellectual Property, Innovation, and Decision Architectures
Tim Wu has an interesting new draft paper on how public policy in areas like intellectual property affects which innovations are pursued. It’s often hard to tell in advance which…
-
MacIntel: It's Not About DRM
The big tech news today is that Apple will start using Intel microprocessors (the same brand used in PCs) in its Macintosh computers, starting next year. Some have speculated that…
-
Book Club: Code and Other Laws of Cyberspace
[Index of all book club postings] [RSS feed (book club postings)] [RSS feed (book club comments, but not postings)] Freedom to Tinker is hosting an online book club discussion of…
-
Virtually Unprotected
Today’s New York Times has a strongly worded editorial saying the U.S. is vulnerable to a devastating cyberattack, and national action is required. We are indeed vulnerable to cyberattack, but…
-
Book Club
I’m thinking about running a Freedom to Tinker book club. I would choose a book and invite readers to read it along with me, one chapter per week. I would…