CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
The article on me and my pro-tinkering work, from the June 20th issue of the Economist, is now available on line.
-
Dornseif on Source Code and Object Code
Maximillian Dornseif offers another comment on my source code vs. object code posting. He points out, correctly, that we can still define “source code” and “object code” reasonably. We can…
-
More on Berman-Coble's Peer-to-Peer Definition
In a previous posting, I remarked on the overbreadth of the Berman-Coble bill’s definition of “peer to peer file trading network”. The definition has another interesting quirk, which looks to…
-
China Now Re-Routing Google Requests
Reuters reports that, since the weekend, some requests for Google from inside China are being rerouted to other, government-approved search engines. (Link at wirednews.com) UPDATE (3pm EDT, Sept. 10): Ben…
-
John Gilmore on Spam and Censorship
Politech has an interesting message from John Gilmore about the effect of anti-spam measures.
-
Wireless LANs, Security, and Intrusions
News.com has an article about drive-by spam. The idea is that a spammer will find a building with a wireless LAN. The spammer will then connect to that LAN, without…
-
China Blocks Altavista
The Great Firewall of China is now blocking Altavista too.
-
Dornseif: Technological Definitions in the Law
Maximillian Dornseif offers some comments following up on my previous posts about Source vs. Object Code, and definitions in the Berman-Coble bill. A brief excerpt: The court system and legal…
-
The Other Digital Divide
Long and well-written articleby Drew Clark and Bara Vaida in the National Journal’s Tech Daily, about the history of the current Hollywood vs. Silicon Valley battle over copy protection. If…
-
"Peer to Peer" in the Berman-Coble Bill
Yesterday’s defense of the Berman-Coble bill resurrected the argument that the bill only hurts the bad guys, because it authorizes hacking only of peer to peer file trading networks. And…