CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
A new anti-terrorism bill criminalizes some uses of encryption: Sec. 2801. Unlawful use of encryption (a) Any person who, during the commission of a felony under Federal law, knowingly and…
-
CCIA Files Antitrust Complaint against Microsoft
The Computer and Communications Industry Association, a trade group, has filed a lengthy antitrust complaint against Microsoft with European authorities. The complaint centers on allegedly anticompetitive aspects of Windows XP.…
-
Terrorist Website Hoaxer Responds
Brian McWilliams, who perpetrated the terrorist website hoax I wrote about yesterday, has now posted his response, including a quasi-apology. [Link credit: Politech]
-
Static Control Files for DMCA Exemption
I wrote previously about the lawsuit filed by printer maker Lexmark against Static Control, a maker of toner cartridge remanufacturing parts. Lexmark claims that Static Control is violating the DMCA…
-
Terrorist Website Hoax
This one leaves me speechless. According to a fascinating story over at ComputerWorld, tech journalist Brian McWilliams has admitted to running a hoax website that claimed to be the site…
-
Valenti Interview
If you’re interested in technology regulation, don’t miss Derek Slater’s interview with MPAA chief Jack Valenti, in Harvard Political Review. Slater asks only four questions about copyright and technology, but…
-
Still More on Programs vs. Data
My previous postings on the program vs. data distinction have drawn quite a few comments. (To see them, click the “followups” links on my previous postings.) I’m going to let…
-
Spread of the Slammer/Sapphire Worm
A new paper by well-regarded networking researchers analyzes the spread of the recent Slammer/Sapphire worm. The worm spread at astonishing speed, doubling the number of infected hosts every 8.5 seconds,…
-
More on Programs vs. Data
Karl-Friedrich Lenz reacts to my previous posting on how to distinguish programs from data, by insisting on the importance of having a simple definition of “program.” He is right about…
-
Standards, or Collusion?
John T. Mitchell at InteractionLaw writes about the potential antitrust implications of backroom deals between copyright owners and technology makers. If a copyright holder were to agree with the manufacturers…