CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
A California state appeals court has ruled in DVD-CCA v. Bunner, holding that the DeCSS program is not a trade secret, so a lower court was wrong to order Andrew…
-
Paris Hilton: Auteur
Some day a great book will be written, dissecting the current copyright mania. And the page-three example, showing just how ridiculous things got, will be this: a legal dispute over…
-
U.S. Fed Trojan-Horse Technology to Soviet Spies
The U.S. fed booby-trapped technology to Soviet economic spies in the 1980’s, according to a new book by former Air Force secretary Thomas C. Reed. This was reported in a…
-
Great Books vs. Must-Read Books
Dan Simon has an interesting reaction to my post on must-read books in science and technology. I can’t do Dan’s post justice with a single quote, but here’s a sample:…
-
Shielding P2P Users' Identities
New P2P technologies are more effectively shielding the identities and net addresses of their users, according to a John Borland story at news.com. This is not surprising given that the…
-
Support the Grey Album
Today many websites have turned themselves grey, to protest EMI Records’ decision to try to block the Grey Album, DJ Danger Mouse’s clever and widely acclaimed musical work, in which…
-
Great Books
Arnold Kling points to a recent survey that asked university presidents to name five books every student should read. The top ten books on the list are: The Bible, The…
-
Want to Know Who's Googling You?
Phil Libin at Vastly Important Notes points out a way to discover how often you’re being Googled. The trick is to buy a Google AdWords advertisement keyed to your own…
-
Diebold Looking for Help
A reliable source tells me that a headhunter, working for e-voting vendor Diebold, is calling security experts, trying to find somebody to help Diebold improve the security of their systems.
-
Monoculture
Lately, computer security researchers have been pointing out the risks of software monoculture. The idea is that if everybody uses the same software product, then a single virtual pathogen can…