As technology critic Evgeny Morozov points out, this is welfarism funded by clicks and not taxes and is accompanied by the erosion of citizen privacy and public interest.
Genetic engineering and horizontal gene transfer are phrases that have been used with delight by scare-mongers with limited appreciation of subtleties essential to their understanding.
India needs to steer international policy discussions at the World Summit on Information Society review to align with its domestic policy priorities.
At the heart of the new cyber-weapons problem is the forced confrontation of our historically most effective forms of defence with their own limitations.
If companies like Facebook, Google and Microsoft stand to earn revenues from Digital India, they should be made to contribute to the Universal Service Obligation fund which, in turn, can be used to advance public interest in specific ways.
It’s time the government standardised its communications online and made relevant information available and intuitively accessible.
Narendra Modi will be mistaken if he thinks American companies will treat the NDA differently from the previous regime.
Modi’s one-hour long speech, which was peppered with jokes, rhetorical flourishes and history lessons, was a logical culmination of his Silicon Valley and US tour.
With a strong emotional pitch, softball questions and Facebook HQ as friendly ground, the PM hits a home run – with one eye firmly on home
Modi’s method of reaching out to Silicon Valley marks a sharp difference with the approach of Chinese President Xi Jinping.
Before it was quickly retracted, the draft National Encryption Policy’s recommendations were so intrusive on privacy that they were as good as saying “don’t use encryption”.
Inspired by the disclosures of NSA whistleblower Edward Snowden, a campaign for a new global treaty against government mass surveillance was launched today in New York City.
Wales answers questions on zero-rating and net-neutrality, how digital connectivity will play a role in achieving global development, and access to openly available content.
The problem with a master key is ensuring it stays safe and secret. If someone were able to find out what the key is, then the secure system is completely broken.
Volkswagen has set aside €6.5 billion to cover the costs of the growing scandal over cheating on emissions tests in the US. Putting a number on the cost further down line will be far harder, however, as it is a crisis which calls into question the ethical credentials […]
The larger issue is that the NDA government, of late, has shown a pronounced tendency to use use a sledgehammer to kill a fly.
While it was still ‘alive’, the policy was widely panned for being ambiguous at best and for suggesting the government wanted to assume an autocratic stance on access to encrypted information.
Users of social networks in general, and of social networking kingpin Facebook in particular, are ill-equipped to evaluate the price they’re paying in this trade.
The department proposes some practices that effectively run counter to the philosophy of encryption – of data as well as devices.
Going after companies like Hacking Team alone is meaningless because they fulfil a need, albeit one we may not have fully understood but whose legitimacy manifests from time to time.
In the post-9/11 period, if a captured terrorist was found to possess an F-91W, the person was assumed to have been trained in bomb-making.
Article updated. The collaborative coding platform GitHub became the subject of a DDoS attack on August 25, its second this year after having been targeted by a massive attack in March. The issue first appeared at 3.05 pm IST, according to GitHub’s status log, when administrators began inspecting “connectivity […]
Get up to speed on the day’s top news.
The names of various prominent figures appearing in the data base have already been published, some of whom insist they never used the site.
Fair warning: ACAT works only on PCs running Windows 7 or higher.
People have till August 20 to comment on the draft bill, criticised by many as compromising privacy rights.
One of the documents even goes as far as to “highlight [AT&T’s] extreme willingness to help with NSA’s SIGINT and Cyber missions”.
While the movement in March elicited surprise from observers for being so passionate and widespread, it drew flak soon after for projecting net neutrality as a monolithic entity devoid of gray areas.
The judge was keen to protect consumers from so-called “speculative invoicing”, where copyright owners send offers to settle claims for grossly disproportionate amounts.
For developing countries, universal Internet access has become a checkbox that must be ticked as they move toward a more developed future. Sadly, ‘abstract’ notions such as online privacy are of no immediate concern to them.
The government remains evasive on the question of whether it will implement a privacy law safeguarding the information it collects from its citizens.
Stampede at Jharkhand temple kills 11 A stampede occurred near a Durga temple at Belabagan, 350 kilometres from Ranchi at 5 am on Monday. Devotees who were trying to break the queue caused a commotion, which led to the stampede. The injured are currently being treated at a nearby hospital. Chief […]
Person who rewrote Nehru page also edited entry for Nihal Chand, Minister in Modi Cabinet.
ISPs are set to approach the Ministry of Communications and IT and seek definitions of pornography in general and child pornography in particular.
The moral paternalism implicit in the government’s order blocking access to 857 websites is what makes it a naïve and simplistic response to a genuine problem
The DoT says it draws its authority to block sites from Section 79(3)(b) of the Information Technology Act 2000 and Article 19(2) of the Constitution, as the department claims the contents relate to questions of “morality, decency”.
The open letter urges the UN to support a ban on offensive autonomous weapons systems
The following is the note of dissent submitted by Usha Ramanathan, a researcher, advocate and dissenting member of the committee that drafted the Human DNA Profiling Bill. The Wire published a criticism of the Bill on July 24, 2015. The committee was put together by the Department of […]
Three grenade attacks create panic, but public opinion stays in favour of continuation of services
If Moore’s Law does continue for just two or three more decades, typical handheld devices may well exceed the human brain in intelligence