CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
by Yan Shvartzshnaider and Marshini Chetty In this post, we describe the Privacy through Contextual Integrity (PrivaCI) challenge that took place as part of the symposium on applications of contextual…
-
How can we scale private, smart contracts? Ed Felten on Arbitrum
Smart contracts are powerful virtual referees for holding money and carrying out agreed-on procedures in cases of disputes, but they can’t guarantee privacy and have strict scalability limitations. How can…
-
Thoughts on California’s Proposed Connected Device Privacy Bill (SB-327)
This post was authored by Noah Apthorpe. On September 6, 2018, the California Legislature presented draft legislation to Governor Brown regarding security and authentication of Internet-connected devices. This legislation would…
-
Serious design flaw in ESS ExpressVote touchscreen: “permission to cheat”
Kansas, Delaware, and New Jersey are in the process of purchasing voting machines with a serious design flaw, and they should reconsider while there is still time! Over the past…
-
Privacy, ethics, and data access: A case study of the Fragile Families Challenge
This blog post summarizes a paper describing the privacy and ethics process by which we organized the Fragile Families Challenge. The paper will appear in a special issue of the…
-
Securing the Vote — National Academies report
In this November’s election, could a computer hacker, foreign or domestic, alter votes (in the voting machine) or prevent people from voting (by altering voter registrations)? What should we do…
-
Why PhD experiences are so variable and what you can do about it
People who do PhDs seem to have either strongly positive or strongly negative experiences — for some, it’s the best time of their lives, while others regret the decision to…
-
What Are Machine Learning Models Hiding?
Machine learning is eating the world. The abundance of training data has helped ML achieve amazing results for object recognition, natural language processing, predictive analytics, and all manner of other…
-
Can Classes on Field Experiments Scale? Lessons from SOC412
Last semester, I taught a Princeton undergrad/grad seminar on the craft, politics, and ethics of behavioral experimentation. The idea was simple: since large-scale human subjects research is now common outside universities, we…
-
Demystifying The Dark Web: Peeling Back the Layers of Tor’s Onion Services
by Philipp Winter, Annie Edmundson, Laura Roberts, Agnieskza Dutkowska-Żuk, Marshini Chetty, and Nick Feamster Want to find US military drone data leaks online? Frolick in a fraudster’s paradise for people’s…