Computer Ethics, Spring 2017


Comm 010, 4:15-6:45 Thursdays
Class 8

Week 8 Readings

Mar 16
Read Chapter 3, on Speech


News

Uber is sneaky: https://www.nytimes.com/2017/03/03/technology/uber-greyball-program-evade-authorities.html.
Uber tries to identify municipal officials who are using the Uber app. Uber tries to prevent these officials from getting rides, in case they are investigating. Some tricks:

Who talks about you to all those personal-information-collecting sites? news.ycombinator.com/item?id=13802068.

Sci-Hub: now at sci-hub.ac. (In addition to still being at sci-hub.cc.)


To keep Tor hack source code secret, DOJ dismisses child porn case: arstechnica.com/tech-policy/2017/03/doj-drops-case-against-child-porn-suspect-rather-than-disclose-fbi-hack.

Dropbox works even harder to avoid being a file-sharing site: dropbox.com/help/16.

Judge in Edina, Minnesota grants subpoena for all Google search records for the name "Douglas" made by town residents from 12/1/2016 to 1/7/2017: citypages.com/news/edina-police-ask-for-whole-citys-google-searches-and-a-judge-says-yes/416319633.



If you want your papers encrypted when I return them, let me know. You'll need to install GPG, and send me your public key. I'll use that to encrypt your paper before returning it.

A key is created with gpg --gen-key. It may take some time. You'll be asked to enter your email address as your identifier.
To export your own public key, use gpg --export your_email_addr. Add the -a option for easier manageability as text. You'll need to send this public key to me.





Continue with ยง230