-
Instead of using new technologies to preserve for ready discovery material that might in the past never have been stored, or deleting everything as soon as possible, we can develop systems that place sensitive information beyond reach until a specified amount of time has passed or other conditions are met.
-
Through historical accident, we've ended up with a global network that pretty much allows anybody to communicate with anyone else at any time.
-
We face paired dangers. The first is that our networks are successfully attacked. The second is that our fear of attack will cause us to destroy what makes the Internet special.
-
The problem is, we're moving to software-as-service, which can be yanked or transformed at any moment. The ability of your PC to run independent code is an important safety valve.
-
The last refuge of privacy cannot be placed solely in law or technology. It must repose in both, and a thoughtful combination of the two can help us thread a path between having all our secrets trivially discoverable and preserving nothing for our later selves for fear of that discovery.
-
I'm interested in harnessing the good will and distributed power of people, including novices.
-
All sorts of factors contribute to what Facebook or Twitter present in a feed, or what Google or Bing show us in search results. Our expectation is that those intermediaries will provide open conduits to others' content and that the variables in their processes just help yield the information we find most relevant.
-
The ability to make new work from old work - especially if that new work is different enough that it doesn't dent the market for the old work - is something that benefits all creators, since so few can claim not to have a giant or 10 supporting them underneath.
-
Technologically, the Internet works thanks to loose but trusted connections among its many constituent parts, with easy entry and exit for new ISPs or new forms of expanding access.
-
People may be due the benefits of a democratic electoral process. But in the United States, content curators appropriately have a First Amendment right to present their content as they see fit.
-
The Internet is a collective hallucination: one of the best humanity has ever generated.
-
Enterprising law-enforcement officers with a warrant can flick a distant switch and turn a standard mobile phone into a roving mic or eavesdrop on occupants of cars equipped with travel assistance systems.
-
Search engines generally treat personal names as search terms like any others: Data is data.
-
The crucial legacy of the personal computer is that anyone can write code for it and give or sell that code to you - and the vendors of the PC and its operating system have no more to say about it than your phone company does about which answering machine you decide to buy.
-
Owned technologies are easy to grasp because they're so prevalent. They're technologies that are developed and shaped by a defined group, usually someone selling it.
-
I think social networking is absolutely here to stay. Now, whether or not the label will Facebook forever, depends in part, I think, on whether Facebook wants to try to be less proprietary, be more central to the operation of defining and stewarding identity online.
-
I'm interested in helping secure the PC - we need innovation here. It's not just hug your PC, hate the iPhone. In fact I don't even hate the iPhone; I think it's really cool. I just don't want it to be the center of the ecosystem along with the Web 2.0 apps.
-
Being closed to outsiders made the iPhone reliable and predictable.
-
Attacks on Internet sites and infrastructure, and the compromise of secure information, pose a particularly tricky problem because it is usually impossible to trace an attack back to its instigator.
-
If you entrust your data to others, they can let you down or outright betray you.
-
A free Net may depend on some wisely developed and implemented locks and a community ethos that secures the keys to those locks among groups with shared norms and a sense of public purpose rather than in the hands of one gatekeeper.
-
The Internet's distinct configuration may have made cyberattacks easy to launch, but it has also kindled the flame of freedom.
-
The openness on which Apple had built its original empire had been completely reversed - but the spirit was still there among users. Hackers vied to 'jailbreak' the iPhone, running new apps on it despite Apple's desire to keep it closed.
-
Digital books and other texts are increasingly coming under the control of distributors and other gatekeepers rather than readers and libraries.