The Second Edition adds new consideration of artificial intelligence, algorithmic discrimination, and the rise of social media’s new gatekeepers. We track privacy developments after Edward Snowden’s revelations of NSA spying and mass personalization, and watch copyright wars shift from peer-to-peer to streaming (and stream takedowns). We follow as bits perfuse our lives and homes — join us!| Blown to Bits 2d Edition
So that I can blog about a wider range of subjects, I am moving my blogging activity over to a new Bits and Pieces blog. I’ll keep up my discussions of the digital explosion there, but I’ll also be talking about education and other issues of the day. See you there!| Blown to Bits 2d Edition
Annonymous Says:| Blown to Bits 2d Edition
A year and a half ago I blogged about the case of Steven Warshak, whose email the US government had obtained without a search warrant. At that point the opinion of the court was that no warrant was needed to obtain your email from your ISP. The reasoning was a bit like the original court view of telephone wiretapping–no warrant needed, since after all, what did you think was going to happen to your conversation once it left the confines of your house?| Blown to Bits 2d Edition
This entry was posted| Blown to Bits 2d Edition
I will be teaching a 2-day course, 9-5 on January 10 and 11, on Privacy, Secrecy, and Censorship. This Harvard Division of Continuing Education Professional Development course is for anyone who wants to learn about the digital explosion in one short burst, for either professional or personal reasons.| Blown to Bits 2d Edition
The Massachusetts Statute that was the subject of my last blog entry has been ruled unconstitutional by a federal judge.| Blown to Bits 2d Edition
Some time ago I blogged about the Massachusetts Supreme Judicial Court ruling that the state’s definition of “matter” did not include text messages. For that reason some creep avoided a conviction for texting a minor with some material that would have been criminal had the material been printed.| Blown to Bits 2d Edition
The Wall Street Journal reports on leakage of Facebook data to the advertising world, even data held behind what were supposed to be Facebook’s highest level of privacy settings.| Blown to Bits 2d Edition
In what is surely another example of people thinking something is a bright idea just because it is possible, cities are putting RFIDs in recycle bins. The trash collection process weighs the bins and logs who is being naughty in their recycling habits. I had a lot to say about this when the Fox News journalist contacted me. Credit where credit is due — I learned about the process of chipping dairy cows and weighing their milk production from the course project of an undergraduate from Wisco...| Blown to Bits 2d Edition