Copyright and censorship are access control issues, concerned with limiting access to some information to people in a particular group. In the former case, the group consists of people who have paid for the bits in question; in the latter, they meet some other criterion. Privacy is largely an access control issue. It's about being able to limit the number of people who can see who you're exchanging email with, what you're reading and what music you're listening to. In theory, there is no compelling reason why they should be in conflict, and in the pre-electronic world, they usually weren't Copyright was protected by the cost of small-scale duplication; it was simpler and cheaper to buy a book or a record than to make a single copy, and people who made large numbers of copies could usually be tracked down and prosecuted.
[...] Fig The effect of Stirmark In general, it's not clear how to design marking schemes that will resist a chosen distortion attack, in which the attacker who understands the marking scheme mangles the content in such a way as to cause maximum damage to the mark while doing minimal damage to the marked content Applications of Copyright Marking Scheme The applications of marking techniques are much broader than just DVDs and still pictures distributed on the Net. Radio adverts in the United States are commonly marked with a serial number, to enable auditing agencies to check automatically whether stations are playing them as often as they claim. [...]
[...] Probably the first historical mention is in Herodotus who records tricks used during the wars between the Greeks and the Persians—including hiding a message in the belly of a hare carried by a hunter, tattooing it on the shaven head of a slave whose hair was then allowed to grow back, and writing it on the wooden base under the wax of a writing tablet. Francis Bacon proposed a system that embedded a binary message in a book at one bit per letter by alternating between two different fonts. [...]
[...] For images, there is a tool we developed called Stirmark, which introduces the same kind of errors The technology of privacy includes two mechanism: those with which people obligations of confidentiality to third parties, which individuals can use to protect their own types of discharge and those privacy in the face of surveillance or other intrusion by third parties. The former are more important in the general scheme of things: without the obligations of confidentiality owed to us by doctors, lawyers, bankers, and other service providers, society would be very different. [...]
[...] Other situations in which coercion may be a problem include where soldiers or intelligence agents could be captured; where police power is abused, for example to seize a key on the grounds of a supposed criminal investigation but where in reality they've been bribed to obtain commercially confidential information; and where private individuals may be tortured by robbers into revealing information such as the secret codes for their bank cards and the location of safes. In such circumstances, there is a serious problem with systems where private keys are long-lived. [...]
[...] If the product is intangible, such as software or audio, the copyright owner may want some means of pursuing you if you distribute copies widely. So the ultimate use of digital cash technology may be in a closed application such as road tolling. Related technologies may be used to protect voters in online elections Other applications and issues The control of meta-information, and applications of anonymity and deniability, surface in a number of other applications. They are: The Right to Remain Ignorant Location Security Peer-to-Peer and Censorship-Resistant [...]
APA Style reference
For your bibliographyOnline reading
with our online readerContent validated
by our reading committee