This paper examines three historical imaginaries associated with encryption, considering how they are intertwined in contemporary policy debates.
Filtered results
With widespread smart contract implementation on the horizon, there is much conversation about how to regulate this new technology. Noting the failure of contract law to address the inequities of standardised contracts in the digital environment can help prevent them from being codified further into smart contracts.
Agribusinesses are buying into big data for its predictive powers, bypassing farmers and aggregating previously proprietary farming data. Given this power asymmetry, what are the ethics of the use of big data in big agriculture?
Using copyright to fight revenge porn
Revenge porn is an increasingly pervasive and troubling abuse of privacy in the networked information society. Some victims are fighting back using copyright law. But does it work?
Addressing the right to privacy in 2015
Don’t let the legal and legitimate pursuit of privacy be marginalised or criminalised, argues Becky Kazansky of the Tactical Technology Collective.