CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
Last week, I asked readers to name five must-read books on science and technology. The results are below. I included nominations from my comments section, from the comments over at…
-
California Court: DeCSS Not a Trade Secret
A California state appeals court has ruled in DVD-CCA v. Bunner, holding that the DeCSS program is not a trade secret, so a lower court was wrong to order Andrew…
-
Paris Hilton: Auteur
Some day a great book will be written, dissecting the current copyright mania. And the page-three example, showing just how ridiculous things got, will be this: a legal dispute over…
-
U.S. Fed Trojan-Horse Technology to Soviet Spies
The U.S. fed booby-trapped technology to Soviet economic spies in the 1980’s, according to a new book by former Air Force secretary Thomas C. Reed. This was reported in a…
-
Great Books vs. Must-Read Books
Dan Simon has an interesting reaction to my post on must-read books in science and technology. I can’t do Dan’s post justice with a single quote, but here’s a sample:…
-
Shielding P2P Users' Identities
New P2P technologies are more effectively shielding the identities and net addresses of their users, according to a John Borland story at news.com. This is not surprising given that the…
-
Support the Grey Album
Today many websites have turned themselves grey, to protest EMI Records’ decision to try to block the Grey Album, DJ Danger Mouse’s clever and widely acclaimed musical work, in which…
-
Great Books
Arnold Kling points to a recent survey that asked university presidents to name five books every student should read. The top ten books on the list are: The Bible, The…
-
Want to Know Who's Googling You?
Phil Libin at Vastly Important Notes points out a way to discover how often you’re being Googled. The trick is to buy a Google AdWords advertisement keyed to your own…
-
Diebold Looking for Help
A reliable source tells me that a headhunter, working for e-voting vendor Diebold, is calling security experts, trying to find somebody to help Diebold improve the security of their systems.