Книга: Code 2.0
Cohen, it seems to me, is plainly right about anonymity, and the Cohen Theorem is inspirational. However efficient the alternative may be, we should certainly architect cyberspaces to ensure anonymity — or more precisely, pseudonymity — first. If the code is going to monitor what I do, then at least it should not know that it is “I” that it is monitoring. I am less troubled if it knows that “14AH342BD7” read such and such; I am deeply troubled if that number is tied back to my name.
Cohen is right for a second reason as well: All of the good that comes from monitoring could be achieved while protecting privacy. It may take a bit more coding to build in routines for breaking traceability; it may take more planning to ensure that privacy is protected. But if those rules are embedded up front, the cost would not be terribly high. It is far cheaper to architect privacy protections now rather than retrofit for them later.
- The Anonymity That Imperfection Allows
- The Internet
- Глава 7 Другие встроенные процедуры
- Концепции, на основе которых можно управлять рынком, рискованны
- 3.10.1. Установка и настройка принтера, подключенного непосредственно к компьютеру
- 4.2.2. Флэш-накопители (USB-накопители)
- Configuring TCP
- Обходное решение для MSVC6
- 7.4 Using Outline Mode