American - Educator | December 24, 1969 -
Through historical accident, we've ended up with a global network that pretty much allows anybody to communicate with anyone else at any time.
Jonathan Zittrain
TimeThroughUpPrettyHistorical
I'm interested in helping secure the PC - we need innovation here. It's not just hug your PC, hate the iPhone. In fact I don't even hate the iPhone; I think it's really cool. I just don't want it to be the center of the ecosystem along with the Web 2.0 apps.
InnovationHateCoolThinkHugWant
How an individual's reputation is protected online is too important and subtle a policy matter to be legislated by a high court, which is institutionally mismatched to the evolving intricacies of the online world.
WorldReputationImportantMatter
Search engines generally treat personal names as search terms like any others: Data is data.
TreatSearchDataPersonalOthers
When I think about privacy on social media sites, there's kind of the usual suspect problems, which doesn't make them any less important or severe; it's just we kind of know their shape, and we kind of know how we're going to solve them.
Social MediaProblemsThinkMedia
I think social networking is absolutely here to stay. Now, whether or not the label will Facebook forever, depends in part, I think, on whether Facebook wants to try to be less proprietary, be more central to the operation of defining and stewarding identity online.
IdentityNetworkingThinkNowTry
The problem is, we're moving to software-as-service, which can be yanked or transformed at any moment. The ability of your PC to run independent code is an important safety valve.
MomentSafetyMovingProblemRunPC
The increasing legal pressure against archives has created anxieties among researchers, librarians, and journalists. They cite the need to protect sources who wish to make a record for posterity; procuring documents and interviews from those sources will be difficult if the fruits are only one subpoena away from disclosure.
LegalPressureWishWillProtect
Instead of using new technologies to preserve for ready discovery material that might in the past never have been stored, or deleting everything as soon as possible, we can develop systems that place sensitive information beyond reach until a specified amount of time has passed or other conditions are met.
TimePastReachInformationPlace
The last refuge of privacy cannot be placed solely in law or technology. It must repose in both, and a thoughtful combination of the two can help us thread a path between having all our secrets trivially discoverable and preserving nothing for our later selves for fear of that discovery.
FearTechnologyPathLawHelp
We face paired dangers. The first is that our networks are successfully attacked. The second is that our fear of attack will cause us to destroy what makes the Internet special.
FearFaceInternetSpecialWillUs
Technologically, the Internet works thanks to loose but trusted connections among its many constituent parts, with easy entry and exit for new ISPs or new forms of expanding access.
ConnectionsInternetEasyNewExit
Copyright © 2024 QuotesDict Jonathan Zittrain quotes