CITP Blog is hosted by Princeton University’s Center for Information Technology Policy, a research center that studies digital technologies in public life. Here you’ll find comment and analysis from the digital frontier, written by the Center’s faculty, students, and friends.
-
[This blog post is a continuation of our series about research ethics in computer science.] The widespread deployment of artificial intelligence and specifically machine learning algorithms causes concern for some…
-
Blockchains and voting
I’ve been asked about a number of ideas lately involving voting systems and blockchains. This blog piece talks about all the security properties that a voting system needs to have,…
-
BlockSci: a platform for blockchain science and exploration
The Bitcoin blockchain — currently 140GB and growing — contains a massive amount of data that can give us insights into the Bitcoin ecosystem, including how users, businesses, and miners…
-
Getting serious about research ethics: Security and Internet Measurement
[This blog post is a continuation of our series about research ethics in computer science that we started last week] Research projects in the information security and Internet measurement sub-disciplines…
-
Help us improve the usability of Tor and onion services!
Update 2017-09-11: We have collected several hundred responses, so we are now closing the survey to begin data analysis. Thanks for your help! We are looking for volunteers for a…
-
When the cookie meets the blockchain
Cryptocurrencies are portrayed as a more anonymous and less traceable method of payment than credit cards. So if you shop online and pay with Bitcoin or another cryptocurrency, how much…
-
Getting serious about research ethics in computer science
Digital technology mediates our public and private lives. That makes computer science a powerful discipline, but it also means that ethical considerations are essential in the development of these technologies.…
-
Design Ethics for Gender-Based Violence and Safety Technologies
Authored (and organized) by Kate Sim and Ben Zevenbergen. Digital technologies are increasingly proposed as innovative solution to the problems and threats faced by vulnerable groups such as children, women,…
-
LinkedIn reveals your personal email to your connections
[Huge thanks to Dillon Reisman, Arvind Narayanan, and Joanna Huey for providing great feedback on early drafts.] LinkedIn makes the primary email address associated with an account visible to all direct connections, as…
-
On Encryption, Archiving, and Accountability
“As Elites Switch to Texting, Watchdogs Fear Loss of Accountability“, says a headline in today’s New York Times. The story describes a rising concern among rule enforcers and compliance officers:…