Computer Ethics, Spring 2017
Comm 010, 4:15-6:45 Thursdays
Class 8
Week 8 Readings
Mar 16
Read Chapter 3, on Speech
News
Uber is sneaky: https://www.nytimes.com/2017/03/03/technology/uber-greyball-program-evade-authorities.html.
Uber tries to identify municipal officials who are using the Uber app. Uber
tries to prevent these officials from getting rides, in case they are
investigating. Some tricks:
- Populating the app with "ghost cars", to make Uber's fleet look larger
- Identifying app users who may be investigators because they:
- open and close the app frequently
- are located near municipal government offices
- Checking credit cards for evidence of police or municipal connection
- Looking up serial number ranges for locally available cheap cell
phones, and treating them differently
- Using social-media information when available
Who talks about you to all those personal-information-collecting sites? news.ycombinator.com/item?id=13802068.
Sci-Hub: now at sci-hub.ac. (In addition
to still being at sci-hub.cc.)
To keep Tor hack source code secret, DOJ dismisses child porn case: arstechnica.com/tech-policy/2017/03/doj-drops-case-against-child-porn-suspect-rather-than-disclose-fbi-hack.
Dropbox works even harder to avoid being a file-sharing site: dropbox.com/help/16.
Judge in Edina, Minnesota grants subpoena for all Google search records for
the name "Douglas" made by town residents from 12/1/2016 to 1/7/2017: citypages.com/news/edina-police-ask-for-whole-citys-google-searches-and-a-judge-says-yes/416319633.
If you want your papers encrypted when I return them, let me know. You'll
need to install GPG, and send me your
public key. I'll use that to encrypt your paper before
returning it.
A key is created with
gpg --gen-key. It may take some time. You'll be asked to enter your
email address as your identifier.
To export your own public key, use gpg
--export your_email_addr. Add the -a option for easier
manageability as text. You'll need to send this public key to me.
Continue with ยง230