CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
The theory of contextual integrity (CI) has inspired work across the legal, privacy, computer science and HCI research communities. Recognizing common interests and common challenges, the time seemed ripe for…
-
Automating Inequality: Virginia Eubanks Book Launch at Data & Society
What does it mean for public sector actors to implement algorithms to make public services to be more efficient? How are these systems experienced by the families and people who…
-
Website operators are in the dark about privacy violations by third-party scripts
by Steven Englehardt, Gunes Acar, and Arvind Narayanan. Recently we revealed that “session replay” scripts on websites record everything you do, like someone looking over your shoulder, and send it…
-
Roundup: My First Semester as a Post-Doc at Princeton
As Princeton thaws from under last week’s snow hurricane, I’m taking a moment to reflect on my first four months in the place I now call home. This roundup post…
-
Singularity Skepticism 4: The Value of Avoiding Errors
[This is the fourth in a series of posts. The other posts in the series are here: 1 2 3.] In the previous post, we did a deep dive into…
-
Singularity Skepticism 3: How to Measure AI Performance
[This is the third post in a series. The other posts are here: 1 2 4] On Thursday I wrote about progress in computer chess, and how a graph of Elo…
-
Singularity Skepticism 2: Why Self-Improvement Isn’t Enough
[This is the second post in a series. The other posts are here: 1 3 4] Yesterday, I wrote about the AI Singularity, and why it won’t be a literal singularity,…
-
Why the Singularity is Not a Singularity
This is the first in a series of posts about the Singularity, that notional future time when machine intelligence explodes in capability, changing human life forever. Like many computer scientists,…
-
No boundaries for user identities: Web trackers exploit browser login managers
In this second installment of the “No Boundaries” series, we show how a long-known vulnerability in browsers’ built-in password managers is abused by third-party scripts for tracking on more than…
-
How have In-Flight Web Page Modification Practices Changed over the Past Ten Years?
When we browse the web, there are many parties and organizations that can see which websites we visit, because they sit on the path between web clients (our computers and…