Here's a chilling first-person account of a university professor who was asked to stop using the anonymizing network software, Tor. University IT and campus security staffers came knocking on Prof. Paul Cesarini's door asking why he was using Tor, and…
Tag: Internet
Entrenchment of Non-Privacy Norms Online
Gaia Bernstein, an Associate Professor at Seton Hall University School of Law (and guest blogger over at Law & Technology Theory) has a thoughtful post about how particular diffusion characteristics made the Internet vulnerable to the establishment of what she…
Protecting Consumers in the Next Tech-ade
The FTC is holding a set of public hearings November 6-8 called Protecting Consumers in the Next Tech-ade, bringing together a diverse collection of scholars and practioners "to examine the key technological and business developments that will shape consumers' core…
CFP: Identity and Identification in a Networked World Graduate Student Symposium
[I am one of the organizers the following graduate student symposium to be held this fall at NYU] CALL FOR PAPERS Identity and Identification in a Networked World: A Multidisciplinary Graduate Student Symposium When: September 29-30, 2006 Where: New York…
Read More CFP: Identity and Identification in a Networked World Graduate Student Symposium
Designing a New Internet with a New Architecture
Wired News reports that David Clark is beginning work (within academia and with the help of the NSF) on a new "clean slate" internet architecture:Clark, who served as chief protocol architect for the government's internet development initiative in the 1980s,…
More Concerns with Google Print Library
Siva Vaidhyanathan (a professor in my department, btw) has posted reader comments from his original request for feedback as to some of the concerns with of Google's plan to digitize library books. He was kind enough to include my repsonse,…
Tinkering Web Content – Greasemonkey
In this post on Google Autolink, Dan Gillmor mentions his support of "user-modifiable Web content once it's reached the user's computer." The basic argument here is that once a website's content is called by your browser and resides on your…
