Pub Case Study

Topics: World Wide Web, Human rights, Freedom of speech Pages: 2 (473 words) Published: December 3, 2012

Although many people believe that the World Wide Web is anonymous and secured from censorship, the reality is very different. Government, law courts, and other officials who want to censor, examine or trace a file of materials on the Web need merely go to the server (the online computer) where they think the file is stored. Using their subpoena power, they can comb through the server’s drives to find the files they are looking for and the identity of the person who created the files.

On Friday, June 30, 2000, however, researchers at AT&T Labs announced the creation Publius, a software program that enables Web users to encrypt (translate into a secret code) their files – text, pictures or music – break them up like the pieces of a jigsaw puzzle, and store the encrypted pieces on many different servers scattered all over the globe on the World Wide Web. As a result, anyone wanting to examine or censor the files or wanting to trace the original transaction that produced the file would find it impossible to succeed because they would have to examine the contents of dozens of different servers all over the world, and the files in the servers would be encrypted and fragmented in a way that would make the pieces impossible to identify without the help of the person who created the file. A person authorized to retrieve the file, however, would look through a directory of his files posted on a Publius-affiliated website, and the Publius network would reassemble the file for him at his request. Researchers published a description of Publius at

Although many people welcomed the way that the new software would enhance freedom of speech on the Web, many others were dismayed. Bruce Taylor, an antipornography activist for the National Law Center for Children and Families, stated “It’s nice to be anonymous, but who wants to be more anonymous than criminals, terrorists, child molesters, child pornographers, hackers, and email virus...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • case study Essay
  • case study Essay
  • Case Study Essay
  • CASE STUDY Essay
  • Case Study Research Paper
  • Case Study Essay
  • case study Essay

Become a StudyMode Member

Sign Up - It's Free