CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
There seems to be an active rivalry between the authors of competing computer viruses, with back-and-forth insults included in the textual comments within each virus, according to a Mike Musgrove…
-
Avi Rubin's Election Judge Experience
Avi Rubin, the John Hopkins computer science professor and leading critic of e-voting, has posted a fascinating account of his day as an election judge in Baltimore, Maryland, using the…
-
Super Tuesday
Today is a major primary election in several U.S. states. In Maryland, it will be the first use of the controversial new Diebold e-voting machines that were the subject of…
-
Must-Read Books: My List
Below is my list of six must-read books on science and technology. I know: I asked you for five, and now I’ve allowed myself six. I just couldn’t narrow it…
-
Must-Read Books: Readers' Choices
Last week, I asked readers to name five must-read books on science and technology. The results are below. I included nominations from my comments section, from the comments over at…
-
California Court: DeCSS Not a Trade Secret
A California state appeals court has ruled in DVD-CCA v. Bunner, holding that the DeCSS program is not a trade secret, so a lower court was wrong to order Andrew…
-
Paris Hilton: Auteur
Some day a great book will be written, dissecting the current copyright mania. And the page-three example, showing just how ridiculous things got, will be this: a legal dispute over…
-
U.S. Fed Trojan-Horse Technology to Soviet Spies
The U.S. fed booby-trapped technology to Soviet economic spies in the 1980’s, according to a new book by former Air Force secretary Thomas C. Reed. This was reported in a…
-
Great Books vs. Must-Read Books
Dan Simon has an interesting reaction to my post on must-read books in science and technology. I can’t do Dan’s post justice with a single quote, but here’s a sample:…
-
Shielding P2P Users' Identities
New P2P technologies are more effectively shielding the identities and net addresses of their users, according to a John Borland story at news.com. This is not surprising given that the…