Jonathan Zittrain

Jonathan Zittrain
Jonathan L. Zittrain is an American professor of Internet law and the George Bemis Professor of International Law at Harvard Law School. He is also a professor at the Harvard Kennedy School, a professor of computer science at the Harvard School of Engineering and Applied Sciences, and co-founder and director of Harvard's Berkman Center for Internet & Society. Previously, Zittrain was Professor of Internet Governance and Regulation at the Oxford Internet Institute of the University of Oxford and visiting professor...
NationalityAmerican
ProfessionEducator
Date of Birth24 December 1969
CountryUnited States of America
This is completely irrelevant. Let me repeat that, this is completely irrelevant. Domain names are nearly meaningless at this point.
Instead of using new technologies to preserve for ready discovery material that might in the past never have been stored, or deleting everything as soon as possible, we can develop systems that place sensitive information beyond reach until a specified amount of time has passed or other conditions are met.
How an individual's reputation is protected online is too important and subtle a policy matter to be legislated by a high court, which is institutionally mismatched to the evolving intricacies of the online world.
I don't know how much thought is behind it, but it seems to me highly effective the way that Facebook will let somebody tag a photo with a friend's name, then others who are a friend of that friend can perhaps immediately see the photo, and the friend, in the meantime, has a chance to wander back and un-tag it.
I'm interested in helping secure the PC - we need innovation here. It's not just hug your PC, hate the iPhone. In fact I don't even hate the iPhone; I think it's really cool. I just don't want it to be the center of the ecosystem along with the Web 2.0 apps.
I'm interested in harnessing the good will and distributed power of people, including novices.
The crucial legacy of the personal computer is that anyone can write code for it and give or sell that code to you - and the vendors of the PC and its operating system have no more to say about it than your phone company does about which answering machine you decide to buy.
The increasing legal pressure against archives has created anxieties among researchers, librarians, and journalists. They cite the need to protect sources who wish to make a record for posterity; procuring documents and interviews from those sources will be difficult if the fruits are only one subpoena away from disclosure.
All sorts of factors contribute to what Facebook or Twitter present in a feed, or what Google or Bing show us in search results. Our expectation is that those intermediaries will provide open conduits to others' content and that the variables in their processes just help yield the information we find most relevant.
The law basically says that if you crack a system meant to protect a copyright work, you go to jail; if you produce software for the purpose of cracking anti-circumvention measures, you go to jail.
The Internet works thanks to loose but trusted connections among its many constituent parts, with easy entry and exit for new Internet service providers or new forms of expanding access.
The Internet's distinct configuration may have made cyberattacks easy to launch, but it has also kindled the flame of freedom.
The Internet's distinct configuration may have facilitated anonymous threats, copyright infringement, and cyberattacks, but it has also kindled the flame of freedom in ways that the framers of the American constitution would appreciate - the Federalist papers were famously authored pseudonymously.
The last refuge of privacy cannot be placed solely in law or technology. It must repose in both, and a thoughtful combination of the two can help us thread a path between having all our secrets trivially discoverable and preserving nothing for our later selves for fear of that discovery.