CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
[This is the second post in a series. The other posts are here: 1 3 4] Yesterday, I wrote about the AI Singularity, and why it won’t be a literal singularity,…
-
Why the Singularity is Not a Singularity
This is the first in a series of posts about the Singularity, that notional future time when machine intelligence explodes in capability, changing human life forever. Like many computer scientists,…
-
No boundaries for user identities: Web trackers exploit browser login managers
In this second installment of the “No Boundaries” series, we show how a long-known vulnerability in browsers’ built-in password managers is abused by third-party scripts for tracking on more than…
-
How have In-Flight Web Page Modification Practices Changed over the Past Ten Years?
When we browse the web, there are many parties and organizations that can see which websites we visit, because they sit on the path between web clients (our computers and…
-
Why the FCC should prevent ISPs from micromanaging our lives
Why the FCC should prevent ISPs from micromanaging our lives by Brett Frischmann and Evan Selinger* Network neutrality prevents broadband Internet service providers from micromanaging our lives online. Constraining the…
-
How the Contextual Integrity Framework Helps Explain Children’s Understanding of Privacy and Security Online
This post discusses a new paper that will be presented at the 2018 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW). I wrote this paper with co-authors…
-
AI and Policy Event in DC, December 8
Princeton’s Center for Information Technology Policy (CITP) recently launched an initiative on Artificial Intelligence, Machine Learning, and Public Policy. On Friday, December 8, 2017, we’ll be in Washington DC talking…
-
No boundaries: Exfiltration of personal data by session-replay scripts
This is the first post in our “No Boundaries” series, in which we reveal how third-party scripts on websites have been extracting personal information in increasingly intrusive ways. [0] by…
-
HOWTO: Protect your small organization against electronic adversaries
October is “cyber security awareness month“. Among other notable announcements, Google just rolled out “advanced protection” — free for any Google account. So, in the spirit of offering pragmatic advice…
-
The Second Workshop on Technology and Consumer Protection
Arvind Narayanan and I are excited to announce that the Workshop on Technology and Consumer Protection (ConPro ’18) will return in May 2018, once again co-located with the IEEE Symposium…