So far this book has explored generative successes and the problems they cause at the technical and content layers of the Internet. This chapter takes up a case study of a problem at the social layer: privacy. Privacy showcases issues that can worry individuals who are not concerned about some of the other problems discussed in this book, like copyright infringement, and it demonstrates how generativity puts old problems into new and perhaps unexpected configurations, calling for creative solutions. Once again, we test the notion that solutions that might solve the generative problems at one layer—solutions that go light on law, and instead depend on the cooperative use of code to cultivate and express norms—might also work at another.


1

The heart of the next-generation privacy problem arises from the similar but uncoordinated actions of individuals that can be combined in new ways thanks to the generative Net. Indeed, the Net enables individuals in many cases to compromise privacy more thoroughly than the government and commercial institutions traditionally targeted for scrutiny and regulation. The standard approaches that have been developed to analyze and limit institutional actors do not work well for this new breed of problem, which goes far beyond the compromise of sensitive information.

PRIVACY 1.0

In 1973, a blue-ribbon panel reported to the U.S. Secretary of Health, Education, and Welfare (HEW) on computers and privacy. The report could have been written today:


3

It is no wonder that people have come to distrust computer-based record-keeping operations. Even in non-governmental settings, an individual’s control over the personal information that he gives to an organization, or that an organization obtains about him, is lessening as the relationship between the giver and receiver of personal data grows more attenuated, impersonal, and diffused. There was a time when information about an individual tended to be elicited in face-to-face contacts involving personal trust and a certain symmetry, or balance, between giver and receiver. Nowadays an individual must increasingly give information about himself to large and relatively faceless institutions, for handling and use by strangers—unknown, unseen and, all too frequently, unresponsive. Sometimes the individual does not even know that an organization maintains a record about him. Often he may not see it, much less contest its accuracy, control its dissemination, or challenge its use by others.1

The report pinpointed troubles arising not simply from powerful computing technology that could be used both for good and ill, but also from its impersonal quality: the sterile computer processed one’s warm, three-dimensional life into data handled and maintained by faraway faceless institutions, viewed at will by strangers. The worries of that era are not obsolete. We are still concerned about databases with too much information that are too readily accessed; databases with inaccurate information; and having the data from databases built for reasonable purposes diverted to less noble if not outright immoral uses.2

Government databases remain of particular concern, because of the unique strength and power of the state to amass information and use it for life-altering purposes. The day-to-day workings of the government rely on numerous databases, including those used for the calculation and provision of government benefits, decisions about law enforcement, and inclusion in various licensing regimes.3 Private institutional databases also continue to raise privacy issues, particularly in the realms of consumer credit reporting, health records, and financial data.


1

Due to political momentum generated by the HEW report and the growing controversy over President Richard Nixon’s use of government power to investigate political enemies, the U.S. Congress enacted comprehensive privacy legislation shortly after the report’s release. The Privacy Act of 1974 mandated a set of fair information practices, including disclosure of private information only with an individual’s consent (with exceptions for law enforcement, archiving, and routine uses), and established the right of the subject to know what was recorded about her and to offer corrections. While it was originally intended to apply to a broad range of public and private databases to parallel the HEW report, the Act was amended before passage to apply only to government agencies’ records.4 Congress never enacted a comparable comprehensive regulatory scheme for private databases. Instead, private databases are regulated only in narrow areas of sensitivity such as credit reports (addressed by a complex scheme passed in 1970 affecting the handful of credit reporting agencies)5 and video rental data,6 which has been protected since Supreme Court nominee Robert Bork’s video rental history was leaked to a newspaper during his confirmation process in 1987.7


1

The HEW report expresses a basic template for dealing with the informational privacy problem: first, a sensitivity is identified at some stage of the information production process—the gathering, storage, or dissemination of one’s private information—and then a legal regime is proposed to restrict these activities to legitimate ends. This template has informed analysis for the past thirty years, guiding battles over privacy both between individuals and government and between individuals and “large and faceless” corporations. Of course, a functional theory does not necessarily translate into successful practice. Pressures to gather and use personal data in commerce and law enforcement have increased, and technological tools to facilitate such data processing have matured without correspondingly aggressive privacy protections.8 (Consider Chapter Five’s description of the novel uses of tethered appliances to conduct surveillance.) In 1999, Scott McNealey, CEO of Sun Microsystems, was asked whether a new Sun technology to link consumer devices had any built-in privacy protection. “You have zero privacy anyway,” he replied. “Get over it.”9


1

McNealey’s words raised some ire at the time; one privacy advocate called them “a declaration of war.”10 McNealey has since indicated that he believes his answer was misunderstood.11 But the plain meaning of “getting over it” seems to have been heeded: while poll after poll indicates that the public is concerned about privacy,12 the public’s actions frequently belie these claims. Apart from momentary spikes in privacy concerns that typically arise in the wake of highprofile scandals—such as Watergate or the disclosure of Judge Bork’s video rentals—we routinely part with personal information and at least passively consent to its use, whether by surfing the Internet, entering sweepstakes, or using a supermarket discount card.

Current scholarly work on privacy tries to reconcile people’s nonchalant behavior with their seemingly heartfelt concerns about privacy. It sometimes calls for industry self-regulation rather than direct governmental regulation as a way to vindicate privacy interests, perhaps because such regulation is seen as more efficient or just, or because direct governmental intervention is understood to be politically difficult to achieve. Privacy scholarship also looks to the latest advances in specific technologies that could further weaken day-to-day informational privacy.13 One example is the increasing use of radio frequency identifiers (RFIDs) in consumer items, allowing goods to be scanned and tracked at a short distance. One promise of RFID is that a shopper could wheel her shopping cart under an arch at a grocery store and obtain an immediate tally of the price of its contents; one peril is that a stranger could drive by a house with an RFID scanner and instantly inventory its contents, from diapers to bacon to flat-screen TVs, immediately discerning the sort of people who live within.

This work on privacy generally hews to the original analytic template of 1973: both the analysis and suggested solutions talk in terms of institutions gathering data, and of developing ways to pressure institutions to better respect their customers’ and clients’ privacy. This approach is evident in discussions about electronic commerce on the Internet. Privacy advocates and scholars have sought ways to ensure that Web sites disclose to people what they are learning about consumers as they browse and buy. The notion of “privacy policies” has arisen from this debate. Through a combination of regulatory suasion and industry best practices, such policies are now found on many Web sites, comprising little-read boilerplate answering questions about what information a Web site gathers about a user and what it does with the information. Frequently the answers are, respectively, “as much as it can” and “whatever it wants”—but, to some, this is progress. It allows scholars and companies alike to say that the user has been put on notice of privacy practices.

Personal information security is another area of inquiry, and there have been some valuable policy innovations in this sphere. For example, a 2003 California law requires firms that unintentionally expose their customers’ private data to others to alert the customers to the security breach.14 This has led to a rash of well-known banks sending bashful letters to millions of their customers, gently telling them that, say, a package containing tapes with their credit card and social security numbers has been lost en route from one processing center to another.15 Bank of America lost such a backup tape with 1.2 million cus- tomer records in 2005.16 That same year, a MasterCard International security breach exposed information of more than 40 million credit card holders.17 Boston College lost 120,000 alumni records to hackers as a result of a breach.18 The number of incidents shows little sign of decreasing,19 despite the incentives provided by the embarrassment of disclosure and the existence of obvious ways to improve security practices. For minimal cost, firms could minimize some types of privacy risks to consumers—for example, by encrypting their backup tapes before shipping them anywhere, making them worthless to anyone without a closely held digital key.


1

Addressing Web site privacy and security has led to elaborations on the traditional informational privacy framework. Some particularly fascinating issues in this framework are still unfolding: is it fair, for example, for an online retailer like Amazon to record the average number of nanoseconds each user spends contemplating an item before clicking to buy it? Such data could be used by Amazon to charge impulse buyers more, capitalizing on the likelihood that this group of consumers does not pause long enough to absorb the listed price of the item they just bought. A brief experiment by Amazon in differential pricing resulted in bad publicity and a hasty retreat as some buyers noticed that they could save as much as $10 on a DVD by deleting browser cookies that indicated to Amazon that they had visited the site before.20 As this example suggests, forthrightly charging one price to one person and another price to someone else can generate resistance. Offering individualized discounts, however, can amount to the same thing for the vendor while appearing much more palatable to the buyer. Who would complain about receiving a coupon for $10 off the listed price of an item, even if the coupon were not transferable to any other Amazon user? (The answer may be “someone who did not get the coupon,” but to most people the second scenario is less troubling than the one in which different prices were charged from the start.)21

If data mining could facilitate price discrimination for Amazon or other online retailers, it could operate in the tangible world as well. As a shopper uses a loyal-customer card, certain discounts are offered at the register personalized to that customer. Soon, the price of a loaf of bread at the store becomes indeterminate: there is a sticker price, but when the shopper takes the bread up front, the store can announce a special individualized discount based on her relationship with the store. The sticker price then becomes only that, providing little indication of the price that shoppers are actually paying. Merchants can also vary service. Customer cards augmented with RFID tags can serve to identify those undesirable customers who visit a home improvement store, monopolize the attention of the attendants, and exit without having bought so much as a single nail. With these kinds of cards, the store would be able to discern the “good” (profitable) customers from the “bad” (not profitable) ones and appropriately alert the staff to flee from bad customers and approach good ones.

PRIVACY 2.0

While privacy issues associated with government and corporate databases remain important, they are increasingly dwarfed by threats to privacy that do not fit the standard analytical template for addressing privacy threats. These new threats fit the generative pattern also found in the technical layers for Internet and PC security, and in the content layer for ventures such as Wikipedia. The emerging threats to privacy serve as an example of generativity’s downsides on the social layer, where contributions from remote amateurs can enable vulnerability and abuse that calls for intervention. Ideally such intervention would not unduly dampen the underlying generativity. Effective solutions for the problems of Privacy 2.0 may have more in common with solutions to other generative problems than with the remedies associated with the decades-old analytic template for Privacy 1.0.

The Era of Cheap Sensors

We can identify three successive shifts in technology from the early 1970s: cheap processors, cheap networks, and cheap sensors.22 The third shift has, with the help of the first two, opened the doors to new and formidable privacy invasions.

The first shift was cheap processors. Moore’s Law tells us that processing power doubles every eighteen months or so.23 A corollary is that existing processing power gets cheaper. The cheap processors available since the 1970s have allowed Bill Gates’s vision of a “computer on every desk” to move forward. Cheap processors also underlie information appliances: thanks to Moore’s Law, there is now sophisticated microprocessor circuitry in cars, coffeemakers, and singing greeting cards.

Cheap networks soon followed. The pay-per-minute proprietary dial-up networks gave way to an Internet of increasing bandwidth and dropping price. The all-you-can-eat models of measurement meant that, once established, idle network connections were no cheaper than well-used ones, and a Web page in New York cost no more to access from London than one in Paris. Lacking gatekeepers, these inexpensive processors and networks have been fertile soil for whimsical invention to take place and become mainstream. This generativity has occurred in part because the ancillary costs to experiment—both for software authors and software users—have been so low.

The most recent technological shift has been the availability of cheap sensors. Sensors that are small, accurate, and inexpensive are now found in cameras, microphones, scanners, and global positioning systems. These characteristics have made sensors much easier to deploy—and then network—in places where previously it would have been impractical to have them.

The proliferation of cheap surveillance cameras has empowered the central authorities found within the traditional privacy equation. A 2002 working paper estimated that the British government had spent several hundred million dollars on closed-circuit television systems, with many networked to central law enforcement stations for monitoring.24 Such advances, and the analysis that follows them, fit the template of Privacy 1.0: governments have access to more information thanks to more widely deployed monitoring technologies, and rules and practices are suggested to prevent whatever our notions might be of abuse.25 To see how cheap processors, networks, and sensors create an entirely new form of the problem, we must look to the excitement surrounding the participatory technologies suggested by one meaning of “Web 2.0.” In academic circles, this meaning of Web 2.0 has become known as “peer production.”

The Dynamics of Peer Production


1

The aggregation of small contributions of individual work can make oncedifficult tasks seem easy. For example, Yochai Benkler has approvingly described the National Aeronautics and Space Administration’s (NASA’s) use of public volunteers, or “clickworkers.”26 NASA had a tedious job involving pictures of craters from the moon and Mars. These were standard bitmap images, and they wanted the craters to be vectorized: in other words, they wanted people to draw circles around the circles they saw in the photos. Writing some custom software and deploying it online, NASA asked Internet users at large to undertake the task. Much to NASA’s pleasant surprise, the clickworkers accomplished in a week what a single graduate student would have needed a year to complete.27 Cheap networks and PCs, coupled with the generative ability to costlessly offer new code for others to run, meant that those who wanted to pitch in to help NASA could do so.


1

The near-costless aggregation of far-flung work can be applied in contexts other than the drawing of circles around craters—or the production of a free encyclopedia like Wikipedia. Computer scientist Luis von Ahn, after noting that over nine billion person-hours were spent playing Windows Solitaire in a single year, devised the online “ESP” game, in which two remote players are randomly paired and shown an image. They are asked to guess the word that best describes the image, and when they each guess the same word they win points.28 Their actions also provide input to a database that reliably labels images for use in graphical search engines—improving the ability of image search engines to identify images. In real time, then, people are building and participating in a collective, organic, worldwide computer to perform tasks that real computers cannot easily do themselves.29

These kinds of grid applications produce (or at least encourage) certain kinds of public activity by combining small, individual private actions. Benkler calls this phenomenon “coordinate coexistence producing information.”30 Benkler points out that the same idea helps us find what we are looking for on the Internet, even if we do not go out of our way to play the ESP game; search engines commonly aggregate the artifacts of individual Internet activity, such as webmasters’ choices about where to link, to produce relevant search results. Search engines also track which links are most often clicked on in ordered search results in order, and then more prominently feature those links in future searches.31 The value of this human-derived wisdom has been noted by spammers, who create “link farms” of fake Web sites containing fragments of text drawn at random from elsewhere on the Web (“word salad”) that link back to the spammers’ sites in an attempt to boost their search engine rankings. The most useful links are ones placed on genuinely popular Web sites, though, and the piles of word salad do not qualify.


1

As a result, spammers have turned to leaving comments on popular blogs that ignore the original entry to which they are attached and instead simply provide links back to their own Web sites. In response, the authors of blogging software have incorporated so-called captcha boxes that must be navigated before anyone can leave a comment on a blog. Captchas—now used on many mainstream Web sites including Ticketmaster.com—ask users to prove that they are human by typing in, say, a distorted nonsense word displayed in a small graphic.32 Computers can start with a word and make a distorted image in a heartbeat, but they cannot easily reverse engineer the distorted image back to the word. This need for human intervention was intended to force spammers to abandon automated robots to place their blog comment spam. For a while they did, reportedly setting up captcha sweatshops that paid people to solve captchas from blog comment prompts all day long.33 (In 2003, the going rate was $2.50/hour for such work.)34 But spammers have continued to explore more efficient solutions. A spammer can write a program to fill in all the information but the captcha, and when it gets to the captcha it places it in front of a real person trying to get to a piece of information—say on a page a user might get after clicking a link that says, “You’ve just won $1000! Click here!”35—or perhaps a pornographic photo.36 The captcha had been copied that instant from a blog where a spammer’s robot was waiting to leave a comment, and then pasted into the prompt for the human wanting to see the next page. The human’s answer to the captcha was then instantly ported back over to the blog site in order to solve the captcha and leave the spammed comment.37 Predictably, companies have also sprung up to meet this demand, providing custom software to thwart captchas on a contract basis of $100 to $5,000 per project.38 Generative indeed: the ability to remix different pieces of the Web, and to deploy new code without gatekeepers, is crucial to the spammers’ work. Other uses of captchas are more benign but equally subtle: a project called reCAPTCHA provides an open API to substitute for regular captchas where a Web site might want to test to see if it is a human visiting.39 reCAPTCHA creates an image that pairs a standard, automatically generated test word image with an image of a word from an old book that a computer has been unable to properly scan and translate. When the user solves the captcha by entering both words, the first word is used to validate that the user is indeed human, and the second is used to put the human’s computing power to work to identify one more word of one more book that otherwise would be unscannable.

* * *

What do captchas have to do with privacy? New generative uses of the Internet have made the solutions proposed for Privacy 1.0 largely inapplicable. Fears about “mass dataveillance”40 are not misplaced, but they recognize only part of the problem, and one that represents an increasingly smaller slice of the pie. Solutions such as disclosure41 or encryption42 still work for Privacy 1.0, but new approaches are needed to meet the challenge of Privacy 2.0, in which sensitive data is collected and exchanged peer-to-peer in configurations as unusual as that of the spammers’ system for bypassing captchas.


1

The power of centralized databases feared in 1973 is now being replicated and amplified through generative uses of individual data and activity. For example, cheap sensors have allowed various gunshot-detecting technologies to operate through microphones in public spaces.43 If a shot is fired, sensors associated with the microphones triangulate the shot’s location and summon the police. To avoid false alarms, the system can be augmented with help from the public at large, minimizing the need for understaffed police to make the initial assessment about what is going on when a suspicious sound is heard. Interested citizens can review camera feeds near a reported shot and press a button if they see something strange happening on their computer monitors. Should a citizen do so, other citizens can be asked for verification. If the answer is yes, the police can be sent.


1

In November of 2006, the state of Texas spent $210,000 to set up eight webcams along the Mexico border as part of a pilot program to solicit the public’s help in reducing illegal immigration.44 Webcam feeds were sent to a public Web site, and people were invited to alert the police if they thought they saw suspicious activity. During the month-long trial the Web site took in just under twenty-eight million hits. No doubt many were from the curious rather than the helpful, but those wanting to volunteer came forward, too. The site registered over 220,000 users, and those users sent 13,000 e-mails to report suspicious activity. At three o’clock in the morning one woman at her PC saw someone signal a pickup truck on the webcam. She alerted police, who seized over four hundred pounds of marijuana from the truck’s occupants after a highspeed chase. In separate incidents, a stolen car was recovered, and twelve undocumented immigrants were stopped. To some—especially state officials— this was a success beyond any expectation;45 to others it was a paltry result for so much investment.46


1

Beyond any first-order success of stopping crime, some observers welcome involvement by members of the public as a check on law enforcement surveillance.47 Science fiction author David Brin foresaw increased use of cameras and other sensors by the government and adopted an if-you-can’t-beat-themjoin- them approach to dealing with the privacy threat. He suggested allowing ubiquitous surveillance so long as the watchers themselves were watched: live cameras could be installed in police cars, station houses, and jails. According to Brin, everyone watching everywhere would lessen the likelihood of unobserved government abuse. What the Rodney King video did for a single incident48— one that surely would have passed without major public notice but for the amateur video capturing what looked like excessive force by arresting officers— Brin’s proposal could do for nearly all state activities. Of course, Brin’s calculus does not adequately account for the invasions of privacy that would take place whenever random members of the public could watch—and perhaps record— every interaction between citizens and authorities, especially since many of those interactions take place at sensitive moments for the citizens. And ubiquitous surveillance can lead to other problems. The Sheriff’s Office of Anderson County, Tennessee, introduced one of the first live “jailcams” in the country, covering a little area in the jail where jailors sit and keep an eye on everything— the center of the panopticon.49 The Anderson County webcam was very Web 2.0: the Web site included a chat room where visitors could meet other viewers, there was a guestbook to sign, and a link to syndicated advertising to help fund the webcam. However, some began using the webcam to make crank calls to jailors at key moments and even, it is claimed, to coordinate the delivery of contraband.50 The webcam was shut down.

This example suggests a critical difference between Privacy 1.0 and 2.0. If the government is controlling the observation, then the government can pull the plug on such webcams if it thinks they are not helpful, balancing whatever policy factors it chooses.51 Many scholars have considered the privacy problems posed by cheap sensors and networks, but they focus on the situations where the sensors serve only government or corporate masters. Daniel Solove, for instance, has written extensively on emergent privacy concerns, but he has focused on the danger of “digital dossiers” created by businesses and governments.52 Likewise, Jerry Kang and Dana Cuff have written about how small sensors will lead to “pervasive computing,” but they worry that the technology will be abused by coordinated entities like shopping malls, and their prescriptions thus follow the pattern established by Privacy 1.0.53 Their concerns are not misplaced, but they represent an increasingly smaller part of the total picture. The essence of Privacy 2.0 is that government or corporations, or other intermediaries, need not be the source of the surveillance. Peer-to-peer technologies can eliminate points of control and gatekeeping from the transfer of personal data and information just as they can for movies and music. The intellectual property conflicts raised by the generative Internet, where people can still copy large amounts of copyrighted music without fear of repercussion, are rehearsals for the problems of Privacy 2.0.54

The Rodney King beating was filmed not by a public camera, but by a private one, and its novel use in 1991 is now commonplace. Many private cameras, including camera-equipped mobile phones, fit the generative mold as devices purchased for one purpose but frequently used for another. The Rodney King video, however, required news network attention to gain salience. Videos depicting similar events today gain attention without the prior approval of an intermediary.55 With cheap sensors, processors, and networks, citizens can quickly distribute to anywhere in the world what they capture in their backyard. Therefore, any activity is subject to recording and broadcast. Perform a search on a video aggregation site like YouTube for “angry teacher” or “road rage” and hundreds of videos turn up. The presence of documentary evidence not only makes such incidents reviewable by the public at large, but for, say, angry teachers it also creates the possibility of getting fired or disciplined where there had not been one before. Perhaps this is good: teachers are on notice that they must account for their behavior the way that police officers must take responsibility for their own actions.


1

If so, it is not just officers and teachers: we are all on notice. The famed “Bus Uncle” of Hong Kong upbraided a fellow bus passenger who politely asked him to speak more quietly on his mobile phone.56 The mobile phone user learned an important lesson in etiquette when a third person captured the argument and then uploaded it to the Internet, where 1.3 million people have viewed one version of the exchange.57 (Others have since created derivative versions of the exchange, including karaoke and a ringtone.) Weeks after the video was posted, the Bus Uncle was beaten up in a targeted attack at the restaurant where he worked.58 In a similar incident, a woman’s dog defecated on the floor of a South Korean subway. She refused to clean it up, even when offered a tissue—though she cleaned the dog—and left the subway car at the next stop. The incident was captured on a mobile phone camera and posted to the Internet, where the poster issued an all points bulletin seeking information about the dog owner and her relatives, and about where she worked. She was identified by others who had previously seen her and the dog, and the resulting firestorm of criticism apparently caused her to quit her job.59

The summed outrage of many unrelated people viewing a disembodied video may be disproportionate to whatever social norm or law is violated within that video. Lives can be ruined after momentary wrongs, even if merely misdemeanors. Recall verkeersbordvrij theory from Chapter Six: it suggests that too many road signs and driving rules change people into automatons, causing them to trade in common sense and judgment for mere hewing to exactly what the rules provide, no more and no less. In the same way, too much scrutiny can also turn us into automatons. Teacher behavior in a classroom, for example, is largely a matter of standards and norms rather than rules and laws, but the presence of scrutiny, should anything unusual happen, can halt desirable pedagogical risks if there is a chance those risks could be taken out of context, misconstrued, or become the subject of pillory by those with perfect hindsight.


2

These phenomena affect students as well as teachers, regular citizens rather than just those in authority. And ridicule or mere celebrity can be as chilling as outright disapprobation. In November 2002 a Canadian teenager used his high school’s video camera to record himself swinging a golf ball retriever as though it were a light saber from Star Wars.60 By all accounts he was doing it for his own amusement. The tape was not erased, and it was found the following spring by someone else who shared it, first with friends and then with the Internet at large. Although individuals want privacy for themselves, they will line up to see the follies of others, and by 2006 the “Star Wars Kid” was estimated to be the most popular word-of-mouth video on the Internet, with over nine hundred million cumulative views.61 It has spawned several parodies, including ones shown on prime time television. This is a consummately generative event: a repurposing of something made for completely different reasons, taking off beyond any expectation, and triggering further works, elaborations, and commentaries— both by other amateurs and by Hollywood.62 It is also clearly a privacy story. The student who made the video has been reported to have been traumatized by its circulation, and in no way did he seek to capitalize on his celebrity.


1

In this hyperscrutinized reality, people may moderate themselves instead of expressing their true opinions. To be sure, people have always balanced between public and private expression. As Mark Twain observed: “We are discreet sheep; we wait to see how the drove is going, and then go with the drove. We have two opinions: one private, which we are afraid to express; and another one—the one we use—which we force ourselves to wear to please Mrs. Grundy, until habit makes us comfortable in it, and the custom of defending it presently makes us love it, adore it, and forget how pitifully we came by it. Look at it in politics.”63

Today we are all becoming politicians. People in power, whether at parliamentary debates or press conferences, have learned to stick to carefully planned talking points, accepting the drawbacks of appearing stilted and saying little of substance in exchange for the benefits of predictability and stability.64 Ubiquitous sensors threaten to push everyone toward treating each public encounter as if it were a press conference, creating fewer spaces in which citizens can express their private selves.

Even the use of “public” and “private” to describe our selves and spaces is not subtle enough to express the kind of privacy we might want. By one definition they mean who manages the space: a federal post office is public; a home is private. A typical restaurant or inn is thus also private, yet it is also a place where the public gathers and mingles: someone there is “in public.” But while activities in private establishments open to the public are technically in the public eye,65 what transpires there is usually limited to a handful of eyewitnesses— likely strangers—and the activity is ephemeral. No more, thanks to cheap sensors and cheap networks to disseminate what they glean. As our previously private public spaces, like classrooms and restaurants, turn into public public spaces, the pressure will rise for us to be on press conference behavior.

There are both significant costs and benefits inherent in expanding the use of our public selves into more facets of daily life. Our public face may be kinder, and the expansion may cause us to rethink our private prejudices and excesses as we publicly profess more mainstream standards and, as Twain says, “habit makes us comfortable in it.” On the other hand, as law professors Eric Posner and Cass Sunstein point out, strong normative pressure can prevent outlying behavior of any kind, and group baselines can themselves be prejudiced. Outlying behavior is the generative spark found at the social layer, the cultural innovation out of left field that can later become mainstream. Just as our information technology environment has benefited immeasurably from experimentation by a variety of people with different aims, motives, and skills, so too is our cultural environment bettered when commonly held—and therefore sometimes rarely revisited—views can be challenged.66

The framers of the U.S. Constitution embraced anonymous speech in the political sphere as a way of being able to express unpopular opinions without having to experience personal disapprobation.67 No defense of a similar principle was needed for keeping private conversations in public spaces from becoming public broadcasts—disapprobation that begins with small “test” groups but somehow becomes society-wide—since there were no means by which to perform that transformation. Now that the means are there, a defense is called for lest we run the risk of letting our social system become metaphorically more appliancized: open to change only by those few radicals so disconnected from existing norms as to not fear their imposition at all.

Privacy 2.0 is about more than those who are famous or those who become involuntary “welebrities.” For those who happen to be captured doing particularly fascinating or embarrassing things, like Star Wars Kid or an angry teacher, a utilitarian might say that nine hundred million views is first-order evidence of a public benefit far exceeding the cost to the student who made the video. It might even be pointed out that the Star Wars Kid failed to erase the tape, so he can be said to bear some responsibility for its circulation. But the next-generation privacy problem cannot be written off as affecting only a few unlucky victims. Neither can it be said to affect only genuine celebrities who must now face constant exposure not only to a handful of professional paparazzi but also to hordes of sensor-equipped amateurs. (Celebrities must now contend with the consequences of cell phone videos of their slightest aberrations—such as one in which a mildly testy exchange with a valet parker is quickly circulated and exaggerated online68—or more comprehensive peer-produced sites like Gawker Stalker,69 where people send in local sightings of celebrities as they happen. Gawker strives to relay the sightings within fifteen minutes and place them on a Google map, so that if Jack Nicholson is at Starbucks, one can arrive in time to stand awkwardly near him before he finishes his latte.)

Cybervisionary David Weinberger’s twist on Andy Warhol’s famous quotation is the central issue for the rest of us: “On the Web, everyone will be famous to fifteen people.”70 Although Weinberger made his observation in the context of online expression, explaining that microaudiences are worthy audiences, it has further application. Just as cheap networks made it possible for businesses to satisfy the “long tail,” serving the needs of obscure interests every bit as much as popular ones71 (Amazon is able to stock a selection of books virtually far beyond the best sellers found in a physical bookstore), peer-produced databases can be configured to track the people who are of interest only to a few others.


3

How will the next-generation privacy problem affect average citizens? Early photo aggregation sites like Flickr were premised on a seemingly dubious assumption that turned out to be true: not only would people want an online repository for their photos, but they would often be pleased to share them with the public at large. Such sites now boast hundreds of millions of photos,72 many of which are also sorted and categorized thanks to the same distributed energy that got Mars’s craters promptly mapped. Proponents of Web 2.0 sing the praises of “folksonomies” rather than taxonomies—bottom-up tagging done by strangers rather than expert-designed and -applied canonical classifications like the Dewey Decimal System or the Library of Congress schemes for sorting books.73 Metadata describing the contents of pictures makes images far more useful and searchable. Combining user-generated tags with automatically generated data makes pictures even more accessible. Camera makers now routinely build cameras that use global positioning systems to mark exactly where on the planet each picture it snaps was taken and, of course, to time- and datestamp them. Web sites like Riya, Polar Rose, and MyHeritage are perfecting facial recognition technologies so that once photos of a particular person are tagged a few times with his or her name, their computers can then automatically label all future photos that include the person—even if their image appears in the background. In August 2006 Google announced the acquisition of Neven Vision, a company working on photo recognition, and in May 2007 Google added a feature to its image search so that only images of people could be returned (to be sure, still short of identifying which image is which).74 Massachusetts officials have used such technology to compare mug shots in “Wanted” posters to driver’s license photos, leading to arrests.75 Mash together these technologies and functionalities through the kind of generative mixing allowed by their open APIs and it becomes trivial to receive answers to questions like: Where was Jonathan Zittrain last year on the fourteenth of February?, or, Who could be found near the entrance to the local Planned Parenthood clinic in the past six months? The answers need not come from government or corporate cameras, which are at least partially secured against abuse through well-considered privacy policies from Privacy 1.0. Instead, the answers come from a more powerful, generative source: an army of the world’s photographers, including tourists sharing their photos online without firm (or legitimate) expectations of how they might next be used and reused.

As generativity would predict, those uses may be surprising or even offensive to those who create the new tools or provide the underlying data. The Christian Gallery News Service was started by antiabortion activist Neal Horsley in the mid 1990s. Part of its activities included the Nuremberg Files Web site, where the public was solicited for as much information as possible about the identities, lives, and families of physicians who performed abortions, as well as about clinic owners and workers.76 When a provider was killed, a line would be drawn through his or her name. (The site was rarely updated with new information, and it became entangled in a larger lawsuit lodged under the U.S. Freedom of Access to Clinic Entrances Act.77 The site remains accessible.) An associated venture solicits the public to take pictures of women arriving at clinics, including the cars in which they arrive (and corresponding license plates), and posts the pictures in order to deter people from nearing clinics.78

With image recognition technology mash-ups, photos taken as people enter clinics or participate in protests can be instantly cross-referenced with their names. One can easily pair this type of data with Google Maps to provide finegrained satellite imagery of the homes and neighborhoods of these individuals, similar to the “subversive books” maps created by computer consultant and tinkerer Tom Owad, tracking wish lists on Amazon.79

This intrusion can reach places that the governments of liberal democracies refuse to go. In early 2007, a federal court overseeing the settlement of a class action lawsuit over New York City police surveillance of public activities held that routine police videotaping of public events was in violation of the settlement: “The authority . . . conferred upon the NYPD ‘to visit any place and attend any event that is open to the public, on the same terms and conditions of the public generally,’ cannot be stretched to authorize police officers to videotape everyone at a public gathering just because a visiting little old lady from Dubuque . . . could do so. There is a quantum difference between a police officer and the little old lady (or other tourist or private citizen) videotaping or photographing a public event.”80

The court expressed concern about a chilling of speech and political activities if authorities were videotaping public events. But police surveillance becomes moot when an army of little old ladies from Dubuque is naturally videotaping and sharing nearly everything—protests, scenes inside a mall (such that amateur video exists of a random shootout in a Salt Lake City, Utah, mall),81 or picnics in the park. Peer-leveraging technologies are overstepping the boundaries that laws and norms have defined as public and private, even as they are also facilitating beneficial innovation. Cheap processors, networks, and sensors enable a new form of beneficial information flow as citizen reporters can provide footage and frontline analysis of newsworthy events as they happen.82 For example, OhmyNews is a wildly popular online newspaper in South Korea with citizen-written articles and reports. (Such writers provide editors with their names and national identity numbers so articles are not anonymous.) Similarly, those who might commit atrocities within war zones can now be surveilled and recorded by civilians so that their actions may be watched and ultimately punished, a potential sea change for the protection of human rights.83


1

For privacy, peer-leveraging technologies might make for a much more constrained world rather than the more chaotic one that they have wrought for intellectual property. More precisely, a world where bits can be recorded, manipulated, and transmitted without limitation means, in copyright, a free-for-all for the public and constraint upon firms (and perhaps upstream artists) with content to protect. For privacy, the public is variously creator, beneficiary, and victim of the free-for-all. The constraints—in the form of privacy invasion that Jeffrey Rosen crystallizes as an “unwanted gaze”—now come not only from the well-organized governments or firms of Privacy 1.0, but from a few people generatively drawing upon the labors of many to greatly impact rights otherwise guaranteed by a legal system.

Privacy and Reputation

At each layer where a generative pattern can be discerned, this book has asked whether there is a way to sift out what we might judge to be bad generative results from the good ones without unduly damaging the system’s overall generativity. This is the question raised at the technical layer for network security, at the content layer for falsehoods in Wikipedia and failures of intellectual property protection, and now at the social layer for privacy. Can we preserve generative innovations without giving up our core privacy values? Before turning to answers, it is helpful to explore a final piece of the Privacy 2.0 mosaic: the impact of emerging reputation systems. This is both because such systems can greatly impact our privacy and because this book has suggested reputational tools as a way to solve the generative sifting problem at other layers.


2

Search is central to a functioning Web,84 and reputation has become central to search. If people already know exactly what they are looking for, a network needs only a way of registering and indexing specific sites. Thus, IP addresses are attached to computers, and domain names to IP addresses, so that we can ask for www.drudgereport.com and go straight to Matt Drudge’s site. But much of the time we want help in finding something without knowing the exact online destination. Search engines help us navigate the petabytes of publicly posted information online, and for them to work well they must do more than simply identify all pages containing the search terms that we specify. They must rank them in relevance. There are many ways to identify what sites are most relevant. A handful of search engines auction off the top-ranked slots in search results on given terms and determine relevance on the basis of how much the site operators would pay to put their sites in front of searchers.85 These search engines are not widely used. Most have instead turned to some proxy for reputation. As mentioned earlier, a site popular with others—with lots of inbound links—is considered worthier of a high rank than an unpopular one, and thus search engines can draw upon the behavior of millions of other Web sites as they sort their search results.86 Sites like Amazon deploy a different form of ranking, using the “mouse droppings” of customer purchasing and browsing behavior to make recommendations—so they can tell customers that “people who like the Beatles also like the Rolling Stones.” Search engines can also more explicitly invite the public to express its views on the items it ranks, so that users can decide what to view or buy on the basis of others’ opinions. Amazon users can rate and review the items for sale, and subsequent users then rate the first users’ reviews. Sites like Digg and Reddit invite users to vote for stories and articles they like, and tech news site Slashdot employs a rating system so complex that it attracts much academic attention.87

eBay uses reputation to help shoppers find trustworthy sellers. eBay users rate each others’ transactions, and this trail of ratings then informs future buyers how much to trust repeat sellers. These rating systems are crude but powerful. Malicious sellers can abandon poorly rated eBay accounts and sign up for new ones, but fresh accounts with little track record are often viewed skeptically by buyers, especially for proposed transactions involving expensive items. One study confirmed that established identities fare better than new ones, with buyers willing to pay, on average, over 8 percent more for items sold by highly regarded, established sellers.88 Reputation systems have many pitfalls and can be gamed, but the scholarship seems to indicate that they work reasonably well.89 There are many ways reputation systems might be improved, but at their core they rely on the number of people rating each other in good faith well exceeding the number of people seeking to game the system—and a way to exclude robots working for the latter. For example, eBay’s rating system has been threatened by the rise of “1-cent eBooks” with no shipping charges; sellers can create alter egos to bid on these nonitems and then have the phantom users highly rate the transaction.90 One such “feedback farm” earned a seller a thousand positive reviews over four days. eBay intervenes to some extent to eliminate such gaming, just as Google reserves the right to exact the “Google death penalty” by de-listing any Web site that it believes is unduly gaming its chances of a high search engine rating.91

These reputation systems now stand to expand beyond evaluating people’s behavior in discrete transactions or making recommendations on products or content, into rating people more generally. This could happen as an extension of current services—as one’s eBay rating is used to determine trustworthiness on, say, another peer-to-peer service. Or, it could come directly from social networking: Cyworld is a social networking site that has twenty million subscribers; it is one of the most popular Internet services in the world, largely thanks to interest in South Korea.92 The site has its own economy, with $100 million worth of “acorns,” the world’s currency, sold in 2006.93

Not only does Cyworld have a financial market, but it also has a market for reputation. Cyworld includes behavior monitoring and rating systems that make it so that users can see a constantly updated score for “sexiness,” “fame,” “friendliness,” “karma,” and “kindness.” As people interact with each other, they try to maximize the kinds of behaviors that augment their ratings in the same way that many Web sites try to figure out how best to optimize their presentation for a high Google ranking.94 People’s worth is defined and measured precisely, if not accurately, by the reactions of others. That trend is increasing as social networking takes off, partly due to the extension of online social networks beyond the people users already know personally as they “befriend” their friends’ friends’ friends.


1

The whole-person ratings of social networks like Cyworld will eventually be available in the real world. Similar real-world reputation systems already exist in embryonic form. Law professor Lior Strahilevitz has written a fascinating monograph on the effectiveness of “How’s My Driving” programs, where commercial vehicles are emblazoned with bumper stickers encouraging other drivers to report poor driving.95 He notes that such programs have resulted in significant accident reductions, and analyzes what might happen if the program were extended to all drivers. A technologically sophisticated version of the scheme dispenses with the need to note a phone number and file a report; one could instead install transponders in every vehicle and distribute TiVo-like remote controls to drivers, cyclists, and pedestrians. If someone acts politely, say by allowing you to switch lanes, you can acknowledge it with a digital thumbsup that is recorded on that driver’s record. Cutting someone off in traffic earns a thumbs-down from the victim and other witnesses. Strahilevitz is supportive of such a scheme, and he surmises it could be even more effective than eBay’s ratings for online transactions since vehicles are registered by the government, making it far more difficult escape poor ratings tied to one’s vehicle. He acknowledges some worries: people could give thumbs-down to each other for reasons unrelated to their driving—racism, for example. Perhaps a bumper sticker expressing support for Republicans would earn a thumbs-down in a blue state. Strahilevitz counters that the reputation system could be made to eliminate “outliers”—so presumably only well-ensconced racism across many drivers would end up affecting one’s ratings. According to Strahilevitz, this system of peer judgment would pass constitutional muster if challenged, even if the program is run by the state, because driving does not implicate one’s core rights. “How’s My Driving?” systems are too minor to warrant extensive judicial review. But driving is only the tip of the iceberg.


1

Imagine entering a café in Paris with one’s personal digital assistant or mobile phone, and being able to query: “Is there anyone on my buddy list within 100 yards? Are any of the ten closest friends of my ten closest friends within 100 yards?” Although this may sound fanciful, it could quickly become mainstream. With reputation systems already advising us on what to buy, why not have them also help us make the first cut on whom to meet, to date, to befriend? These are not difficult services to offer, and there are precursors today.96 These systems can indicate who has not offered evidence that he or she is safe to meet—as is currently solicited by some online dating sites—or it may use Amazon-style matching to tell us which of the strangers who have just entered the café is a good match for people who have the kinds of friends we do. People can rate their interactions with each other (and change their votes later, so they can show their companion a thumbs-up at the time of the meeting and tell the truth later on), and those ratings will inform future suggested acquaintances. With enough people adopting the system, the act of entering a café can be different from one person to the next: for some, the patrons may shrink away, burying their heads deeper in their books and newspapers. For others, the entire café may perk up upon entrance, not knowing who it is but having a lead that this is someone worth knowing. Those who do not participate in the scheme at all will be as suspect as brand new buyers or sellers on eBay.

Increasingly, difficult-to-shed indicators of our identity will be recorded and captured as we go about our daily lives and enter into routine transactions— our fingerprints may be used to log in to our computers or verify our bank accounts, our photo may be snapped and tagged many times a day, or our license plate may be tracked as people judge our driving habits. The more our identity is associated with our daily actions, the greater opportunities others will have to offer judgments about those actions. A government-run system like the one Strahilevitz recommends for assessing driving is the easy case. If the state is the record keeper, it is possible to structure the system so that citizens can know the basis of their ratings—where (if not by whom) various thumbs-down clicks came from—and the state can give a chance for drivers to offer an explanation or excuse, or to follow up. The state’s formula for meting out fines or other penalties to poor drivers would be known (“three strikes and you’re out,” for whatever other problems it has, is an eminently transparent scheme), and it could be adjusted through accountable processes, just as legislatures already determine what constitutes an illegal act, and what range of punishment it should earn.

Generatively grown but comprehensively popular unregulated systems are a much trickier case. The more that we rely upon the judgments offered by these private systems, the more harmful that mistakes can be.97 Correcting or identifying mistakes can be difficult if the systems are operated entirely by private parties and their ratings formulas are closely held trade secrets. Search engines are notoriously resistant to discussing how their rankings work, in part to avoid gaming—a form of security through obscurity.98 The most popular engines reserve the right to intervene in their automatic rankings processes—to administer the Google death penalty, for example—but otherwise suggest that they do not centrally adjust results. Hence a search in Google for “Jew” returns an anti- Semitic Web site as one of its top hits,99 as well as a separate sponsored advertisement from Google itself explaining that its rankings are automatic.100 But while the observance of such policies could limit worries of bias to search algorithm design rather than to the case-by-case prejudices of search engine operators, it does not address user-specific bias that may emerge from personalized judgments.

Amazon’s automatic recommendations also make mistakes; for a period of time the Official Lego Creator Activity Book was paired with a “perfect partner” suggestion: American Jihad: The Terrorists Living Among Us Today. If such mismatched pairings happen when discussing people rather than products, rare mismatches could have worse effects while being less noticeable since they are not universal. The kinds of search systems that say which people are worth getting to know and which should be avoided, tailored to the users querying the system, present a set of due process problems far more complicated than a stateoperated system or, for that matter, any system operated by a single party. The generative capacity to share data and to create mash-ups means that ratings and rankings can be far more emergent—and far more inscrutable.

SOLVING THE PROBLEMS OF PRIVACY 2.0

Cheap sensors generatively wired to cheap networks with cheap processors are transforming the nature of privacy. How can we respond to the notion that nearly anything we do outside our homes can be monitored and shared? How do we deal with systems that offer judgments about what to read or buy, and whom to meet, when they are not channeled through a public authority or through something as suable, and therefore as accountable, as Google?

The central problem is that the organizations creating, maintaining, using, and disseminating records of identifiable personal data are no longer just “organizations”— they are people who take pictures and stream them online, who blog about their reactions to a lecture or a class or a meal, and who share on social sites rich descriptions of their friends and interactions. These databases are becoming as powerful as the ones large institutions populate and centrally define. Yet the sorts of administrative burdens we can reasonably place on established firms exceed those we can place on individuals—at some point, the burden of compliance becomes so great that the administrative burdens are tantamount to an outright ban. That is one reason why so few radio stations are operated by individuals: it need not be capital intensive to set up a radio broadcasting tower—a low-power neighborhood system could easily fit in someone’s attic—but the administrative burdens of complying with telecommunications law are well beyond the abilities of a regular citizen. Similarly, we could create a privacy regime so complicated as to frustrate generative developments by individual users.

The 1973 U.S. government report on privacy crystallized the template for Privacy 1.0, suggesting five elements of a code of fair information practice:


2

  • There must be no personal data record-keeping systems whose very existence is secret.
  • There must be a way for an individual to find out what information about him is in a record and how it is used.
  • There must be a way for an individual to prevent information about him that was obtained for one purpose from being used or made available for other purposes without his consent.
  • There must be a way for an individual to correct or amend a record of identifiable information about him.
  • Any organization creating, maintaining, using, or disseminating records of identifiable personal data must assure the reliability of the data for their intended use and must take precautions to prevent misuse of the data.101

These recommendations present a tall order for distributed, generative systems. It may seem clear that the existence of personal data record-keeping systems ought not to be kept secret, but this issue was easier to address in 1973, when such systems were typically large consumer credit databases or government dossiers about citizens, which could more readily be disclosed and advertised by the relevant parties. It is harder to apply the antisecrecy maxim to distributed personal information databases. When many of us maintain records or record fragments on one another, and through peer-produced social networking services like Facebook or MySpace share these records with thousands of others, or allow them to be indexed to create powerful mosaics of personal data, then exactly what the database is changes from one moment to the next—not simply in terms of its contents, but its very structure and scope. Such databases may be generally unknown while not truly “secret.”102

Further, these databases are ours. It is one thing to ask a corporation to disclose the personal data and records it maintains; it is far more intrusive to demand such a thing of private citizens. Such disclosure may itself constitute an intrusive search upon the citizen maintaining the records. Similarly, the idea of mandating that an individual be able to find out what an information gatherer knows—much less to correct or amend the information—is categorically more difficult to implement when what is known is distributed across millions of people’s technological outposts. To be sure, we can Google ourselves, but this does not capture those databases open only to “friends of friends”—a category that may not include us but may include thousands of others. At the same time, we may have minimal recourse when the information we thought we were circulating within social networking sites merely for fun and, say, only among fellow college students, ends up leaking to the world at large.103


2

What to do? There is a combination of steps drawn from the solutions sketched in the previous two chapters that might ameliorate the worst of Privacy 2.0’s problems, and even provide a framework in which to implement some of the Privacy 1.0 solutions without rejecting the generative framework that gives rise to Privacy 2.0 in the first place.

The Power of Code-Backed Norms

The Web is disaggregated. Its pieces are bound together into a single virtual database by private search engines like Google. Google and other search engines assign digital robots to crawl the Web as if they were peripatetic Web surfers, clicking on one link after another, recording the results, and placing them into a concordance that can then be used for search.104

Early on, some wanted to be able to publish material to the Web without it appearing in search engines. In the way a conversation at a pub is a private matter unfolding in a public (but not publicly owned) space, these people wanted their sites to be private but not secret. The law offers one approach to vindicate this desire for privacy but not secrecy. It could establish a framework delineating the scope and nature of a right in one’s Web site being indexed, and providing for penalties for those who infringe that right. An approach of this sort has well-known pitfalls. For example, it would be difficult to harmonize such doctrine across various jurisdictions around the world,105 and there would be technical questions as to how a Web site owner could signal his or her choice to would-be robot indexers visiting the site.

The Internet community, however, fixed most of the problem before it could become intractable or even noticeable to mainstream audiences. A software engineer named Martijn Koster was among those discussing the issue of robot signaling on a public mailing list in 1993 and 1994. Participants, including “a majority of robot authors and other people with an interest in robots,” converged on a standard for “robots.txt,” a file that Web site authors could create that would be inconspicuous to Web surfers but in plain sight to indexing robots.106 Through robots.txt, site owners can indicate preferences about what parts of the site ought to be crawled and by whom. Consensus among some influential Web programmers on a mailing list was the only blessing this standard received: “It is not an official standard backed by a standards body, or owned by any commercial organisation. It is not enforced by anybody, and there [sic] no guarantee that all current and future robots will use it. Consider it a common facility the majority of robot authors offer the WWW community to protect WWW server [sic] against unwanted accesses by their robots.”107

Today, nearly all Web programmers know robots.txt is the way in which sites can signal their intentions to robots, and these intentions are respected by every major search engine across differing cultures and legal jurisdictions.108 On this potentially contentious topic—search engines might well be more valuable if they indexed everything, especially content marked as something to avoid— harmony was reached without any application of law. The robots.txt standard did not address the legalities of search engines and robots; it merely provided a way to defuse many conflicts before they could even begin. The apparent legal vulnerabilities of robots.txt—its lack of ownership or backing of a large private standards setting organization, and the absence of private enforcement devices— may in fact be essential to its success.109 Law professor Jody Freeman and others have written about the increasingly important role played by private organizations in the formation of standards across a wide range of disciplines and the ways in which some organizations incorporate governmental notions of due process in their activities.110 Many Internet standards have been forged much less legalistically but still cooperatively.111

The questions not preempted or settled by such cooperation tend to be clashes between firms with some income stream in dispute—and where the law has then partially weighed in. For example, eBay sued data aggregator Bidder’s Edge for using robots to scrape its site even after eBay clearly objected both in person and through robots.txt. eBay won in a case that has made it singularly into most cyberlaw casebooks and even into a few general property casebooks— a testament to how rarely such disputes enter the legal system.112

Similarly, the safe harbors of the U.S. Digital Millennium Copyright Act of 1998 give some protection to search engines that point customers to material that infringes copyright,113 but they do not shield the actions required to create the search database in the first place. The act of creating a search engine, like the act of surfing itself, is something so commonplace that it would be difficult to imagine deeming it illegal—but this is not to say that search engines rest on any stronger of a legal basis than the practice of using robots.txt to determine when it is and is not appropriate to copy and archive a Web site.114 Only recently, with Google’s book scanning project, have copyright holders really begun to test this kind of question.115 That challenge has arisen over the scanning of paper books, not Web sites, as Google prepares to make them searchable in the same way Google has indexed the Web.116 The long-standing practice of Web site copying, guided by robots.txt, made that kind of indexing uncontroversial even as it is, in theory, legally cloudy.

The lasting lesson from robots.txt is that a simple, basic standard created by people of good faith can go a long way toward resolving or forestalling a problem containing strong ethical or legal dimensions. The founders of Creative Commons created an analogous set of standards to allow content creators to indicate how they would like their works to be used or reused. Creative Commons licenses purport to have the force of law behind them—one ignores them at the peril of infringing copyright—but the main force of Creative Commons as a movement has not been in the courts, but in cultural mindshare: alerting authors to basic but heretofore hidden options they have for allowing use of the photos, songs, books, or blog entries they create, and alerting those who make use of the materials to the general orientation of the author.

Creative Commons is robots.txt generalized. Again, the legal underpinnings of this standard are not particularly strong. For example, one Creative Commons option is “noncommercial,” which allows authors to indicate that their material can be reused without risk of infringement so long as the use is noncommercial. But the definition of noncommercial is a model of vagueness, the sort of definition that could easily launch a case like eBay v. Bidder’s Edge.117 If one aggregates others’ blogs on a page that has banner ads, is that a commercial use? There have been only a handful of cases over Creative Commons licenses, and none testing the meaning of noncommercial.118 Rather, people seem to know a commercial (or derivative) use when they see it: the real power of the license may have less to do with a threat of legal enforcement and more to do with the way it signals one’s intentions and asks that they be respected. Reliable empirical data is absent, but the sense among many of those using Creative Commons licenses is that their wishes have been respected.119

Applying Code-Backed Norms to Privacy: Data Genealogy

As people put data on the Internet for others to use or reuse—data that might be about other people as well as themselves—there are no tools to allow those who provide the data to express their preferences about how the data ought to be indexed or used. There is no Privacy Commons license to request basic limits on how one’s photographs ought to be reproduced from a social networking site. There ought to be. Intellectual property law professor Pamela Samuelson has proposed that in response to the technical simplicity of collecting substantial amounts of personal information in cyberspace, a person should have a protectable right to control this personal data. She notes that a property-based legal framework is more difficult to impose when one takes into account the multiple interests a person might have in her personal data, and suggests a move to a contractual approach to protecting information privacy based in part on enforcement of Web site privacy policies.120 Before turning to law directly, we can develop tools to register and convey authors’ privacy-related preferences unobtrusively.

On today’s Internet, the copying and pasting of information takes place with no sense of metadata.121 It is difficult enough to make sure that a Creative Commons license follows the photograph, sound, or text to which it is related as those items circulate on the Web. But there is no standard at all to pass along for a given work and who recorded it, with what devices,122 and most important, what the subject is comfortable having others do with it. If there were, links could become two-way. Those who place information on the Web could more readily canvas the public uses to which that information had been put and by whom. In turn, those who wish to reuse information would have a way of getting in touch with its original source to request permission. Some Web 2.0 outposts have generated promising rudimentary methods for this. Facebook, for example, offers tools to label the photographs one submits and to indicate what groups of people can and cannot see them. Once a photo is copied beyond the Facebook environment, however, these attributes are lost.123

The Web is a complex social phenomenon with information contributed not only by institutional sources like Britannica, CNN, and others that place large amounts of structured information on it, but also by amateurs like Wikipedians, Flickr contributors, and bloggers. Yet a Google search intentionally smoothes over this complexity; each linked search result is placed into a standard format to give the act of searching structure and order. Search engines and other aggregators can and should do more to enrich users’ understanding of where the information they see is coming from. This approach would shadow the way that Theodor Nelson, coiner of the word “hypertext,” envisioned “transclusion”—a means not to simply copy text, but also to reference it to its original source.124 Nelson’s vision was drastic in its simplicity: information would repose primarily at its source, and any quotes to it would simply frame that source. If it were deleted from the original source, it would disappear from its subsequent uses. If it were changed at the source, downstream uses would change with it. This is a strong version of the genealogy idea, since the metadata about an item’s origin would actually be the item itself. It is data as service, and insofar as it leaves too much control with the data’s originator, it suffers from many of the drawbacks of software as service described in Chapter Five. For the purposes of privacy, we do not need such a radical reworking of the copy-and-paste culture of the Web. Rather, we need ways for people to signal whether they would like to remain associated with the data they place on the Web, and to be consulted about unusual uses.

This weaker signaling-based version of Nelson’s vision does not answer the legal question of what would happen if the originator of the data could not come to an agreement with someone who wanted to use it. But as with robots .txt and Creative Commons licenses, it could forestall many of the conflicts that will arise in the absence of any standard at all.125 Most importantly, it would help signal authorial intention not only to end users but also to the intermediaries whose indices provide the engines for invasions of privacy in the first place. One could indicate that photos were okay to index by tag but not by facial recognition, for example. If search engines of today are any indication, such restrictions could be respected even without a definitive answer as to the extent of their legal enforceability. Indeed, by attaching online identity—if not physical identity—to the various bits of data that are constantly mashed up as people copy and paste what they like around the Web, it becomes possible for people to get in touch with one another more readily to express thanks, suggest collaboration, or otherwise interact as people in communities do. Similarly, projects like reCAPTCHA could seek to alert people to the extra good their solving of captchas is doing—and even let them opt out of solving the second word in the image, the one that is not testing whether they are human but instead is being used to perform work for someone else. Just as Moore v. Regents of the University of California struggled with the issue of whether a patient whose tumor was removed should be consulted before the tumor is used for medical research,126 we will face the question of when people ought to be informed when their online behaviors are used for ulterior purposes—including beneficial ones.

Respect for robots.txt, Creative Commons licenses, and privacy “tags,” and an opportunity to alert people and allow them to opt in to helpful ventures with their routine online behavior like captcha-solving, both requires and promotes a sense of community. Harnessing some version of Nelson’s vision is a self-reinforcing community-building exercise—bringing people closer together while engendering further respect for people’s privacy choices. It should be no surprise that people tend to act less charitably in today’s online environment than they would act in the physical world.127 Recall the discussion of verkeersbordvrij in Chapter Six, where the elimination of most traffic signs can counterintuitively reduce accidents. Today’s online environment is only half of the verkeersbordvrij system: there are few perceived rules, but there are also few ways to receive, and therefore respect, cues from those whose content or data someone might be using.128 Verkeersbordvrij depends not simply on eliminating most legal rules and enforcement, but also, in the view of its proponents, crucially on motorists’ ability to roll down their windows and make eye contact with other motorists and pedestrians, to signal each other, and to pull themselves away from the many distractions like mobile phones and snacking that turn driving into a mechanical operation rather than a social act. By devising tools and practices to connect distant individuals already building upon one another’s data, we can promote the feedback loops found within functioning communities and build a framework to allow the nicely part of Benkler’s “sharing nicely” to blossom.129

Enabling Reputation Bankruptcy

As biometric readers become more commonplace in our endpoint machines, it will be possible for online destinations routinely to demand unsheddable identity tokens rather than disposable pseudonyms from Internet users. Many sites could benefit from asking people to participate with real identities known at least to the site, if not to the public at large. eBay, for one, would certainly profit by making it harder for people to shift among various ghost accounts. One could even imagine Wikipedia establishing a “fast track” for contributions if they were done with biometric assurance, just as South Korean citizen journalist newspaper OhmyNews keeps citizen identity numbers on file for the articles it publishes.130 These architectures protect one’s identity from the world at large while still making it much more difficult to produce multiple false “sock puppet” identities. When we participate in other walks of life—school, work, PTA meetings, and so on—we do so as ourselves, not wearing Groucho mustaches, and even if people do not know exactly who we are, they can recognize us from one meeting to the next. The same should be possible for our online selves.

As real identity grows in importance on the Net, the intermediaries demanding it ought to consider making available a form of reputation bankruptcy. Like personal financial bankruptcy, or the way in which a state often seals a juvenile criminal record and gives a child a “fresh start” as an adult, we ought to consider how to implement the idea of a second or third chance into our digital spaces. People ought to be able to express a choice to deemphasize if not entirely delete older information that has been generated about them by and through various systems: political preferences, activities, youthful likes and dislikes. If every action ends up on one’s “permanent record,” the press conference effect can set in. Reputation bankruptcy has the potential to facilitate desirably experimental social behavior and break up the monotony of static communities online and offline.131 As a safety valve against excess experimentation, perhaps the information in one’s record could not be deleted selectively; if someone wants to declare reputation bankruptcy, we might want it to mean throwing out the good along with the bad. The blank spot in one’s history indicates a bankruptcy has been declared—this would be the price one pays for eliminating unwanted details.

The key is to realize that we can make design choices now that work to capture the nuances of human relations far better than our current systems, and that online intermediaries might well embrace such new designs even in the absence of a legal mandate to do so.

More, Not Less, Information

Reputation bankruptcy provides for the possibility of a clean slate. It works best within informationally hermetic systems that generate their own data through the activities of their participants, such as a social networking site that records who is friends with whom, or one that accumulates the various thumbs-up and thumbs-down array that could be part of a “How’s My Driving”–style judgment.

But the use of the Internet more generally to spread real-world information about people is not amenable to reputation bankruptcy. Once injected into the Net, an irresistible video of an angry teacher, or a drunk and/or racist celebrity, cannot be easily stamped out without the kinds of network or endpoint control that are both difficult to implement and, if implemented, unacceptably corrosive to the generative Internet. What happens if we accept this as fact, and also assume that legal proscriptions against disseminating sensitive but popular data will be highly ineffective?132 We might turn to contextualization: the idea, akin to the tort of false light, that harm comes from information plucked out of the rich thread of a person’s existence and expression.133 We see this in political controversies—even the slightest misphrasing of something can be extracted and blown out of proportion. It is the reason that official press conferences are not the same as bland conversation; they are even blander.

Contextualization suggests that the aim of an informational system should be to allow those who are characterized within it to augment the picture provided by a single snippet with whatever information, explanation, or denial that they think helps frame what is portrayed. Civil libertarians have long suggested that the solution to bad speech is more speech while realizing the difficulties of linking the second round of speech to the first without infringing the rights of the first speaker.134 Criticisms of the “more speech” approach have included the observation that a retraction or amendment of a salacious newspaper story usually appears much less prominently than the original. This is particularly true for newspapers, where those seeing one piece of information may not ever see the follow-up. There is also the worry that the fog of information generated by a free-for-all is no way to have people discern facts from lies. Generative networks invite us to find ways to reconcile these views. We can design protocols to privilege those who are featured or described online so that they can provide their own framing linked to their depictions. This may not accord with our pre-Web expectations: it may be useful for a private newspaper to provide a right of reply to its subjects, but such an entity would quickly invoke a First Amendment–style complaint of compelled speech if the law were to provide for routine rights of reply in any but the narrowest of circumstances.135 And many of us might wish to discuss Holocaust deniers or racists without giving them a platform to even link to a reply. The path forward is likely not a formal legal right but a structure to allow those disseminating information to build connections to the subjects of their discussions. In many cases those of us disseminating may not object—and a properly designed system might turn what would have otherwise been one-sided exchanges into genuine dialogues.

We already see some movement in this direction. The Harvard Kennedy School’s Joseph Nye has suggested that a site like urban legend debunker snopes.com be instituted for reputation, a place that people would know to check to get the full story when they see something scandalous but decontextualized online.136 The subjects of the scandalous data would similarly know to place their answers there—perhaps somewhat mitigating the need to formally link it to each instance of the original data. Google invites people quoted or discussed within news stories to offer addenda and clarification directly to Google, which posts these responses prominently near its link to the story when it is a search result within Google News.137 Services like reputationdefender.com will, for a fee, take on the task of trying to remove or, failing that, contextualize sensitive information about people online.138 ReputationDefender uses a broad toolkit of tactics to try to clear up perceived invasions of privacy—mostly moral suasion rather than legal threat.

To be sure, contextualization addresses just one slice of the privacy problem, since it only adds information to a sensitive depiction. If the depiction is embarrassing or humiliating, the opportunity to express that one is indeed embarrassed or humiliated does not much help. It may be that values of privacy are implacably in tension with some of the fruits of generativity. Just as the digital copyright problem could be solved if publishers could find a way to profit from abundance rather than scarcity, the privacy problem could be solved if we could take Sun Microsystems CEO McNealey’s advice and simply get over it. This is not a satisfying rejoinder to someone whose privacy has been invaded, but, amazingly, this may be precisely what is happening: people are getting over it.

THE GENERATIONAL DIVIDE: BEYOND INFORMATIONAL PRIVACY

The values animating our concern for privacy are themselves in transition. Many have noted an age-driven gap in attitudes about privacy perhaps rivaled only by the 1960s generation gap on rock and roll.139 Surveys bear out some of this perception.140 Fifty-five percent of online teens have created profiles on sites like MySpace, though 66 percent of those use tools that the sites offer to limit access in some way.141 Twice as many teens as adults have a blog.142 Interestingly, while young people appear eager to share information online, they are more worried than older people about government surveillance.143 Some also see that their identities may be discovered online, even with privacy controls.144

A large part of the personal information available on the Web about those born after 1985 comes from the subjects themselves. People routinely set up pages on social networking sites—in the United States, more than 85 percent of university students are said to have an entry on Facebook—and they impart reams of photographs, views, and status reports about their lives, updated to the minute. Friends who tag other friends in photographs cause those photos to be automatically associated with everyone mentioned—a major step toward the world in which simply showing up to an event is enough to make one’s photo and name permanently searchable online in connection with the event.

Worries about such a willingness to place personal information online can be split into two categories. The first is explicitly paternalistic: children may lack the judgment to know when they should and should not share their personal information. As with other decisions that could bear significantly on their lives—signing contracts, drinking, or seeing movies with violent or sexual content—perhaps younger people should be protected from rash decisions that facilitate infringements of their privacy. The second relies more on the generative mosaic concern expressed earlier: people might make rational decisions about sharing their personal information in the short term, but underestimate what might happen to that information as it is indexed, reused, and repurposed by strangers. Both worries have merit, and to the extent that they do we could deploy the tools of intermediary gatekeeping to try to protect people below a certain age until they wise up. This is just the approach of the U.S. Children’s Online Privacy Protection Act of 1998 (COPPA).145 COPPA fits comfortably but ineffectually within a Privacy 1.0 framework, as it places restrictions on operators of Web sites and services that knowingly gather identifiable information from children under the age of thirteen: they cannot do so without parental consent. The result is discernable in most mainstream Web sites that collect data; each now presents a checkbox for the user to affirm that he or she is over thirteen, or asks outright for a birthday or age. The result has been predictable; kids quickly learn simply to enter an age greater than thirteen in order to get to the services they want.146 To achieve limits on the flow of information about kids requires levels of intervention that so far exceed the willingness of any jurisdiction.147 The most common scheme to separate kids from adults online is to identify individual network endpoints as used primarily or frequently by kids and then limit what those endpoints can do: PCs in libraries and public schools are often locked down with filtering software, sometimes due to muchlitigated legal requirements.148

A shift to tethered appliances could greatly lower the costs of discerning age online. Many appliances could be initialized at the time of acquisition with the birthdays of their users, or sold assuming use by children until unlocked by the vendor after receiving proof of age. This is exactly how many tethered mobile phones with Internet access are sold,149 and because they do not allow thirdparty code they can be much more securely configured to only access certain approved Web sites. With the right standards in place, PCs could broadcast to every Web site visited that they have not been unlocked for adult browsing, and such Web sites could then be regulated through a template like COPPA to restrict the transmission of certain information that could harm the young users. This is a variant of Lessig’s idea for a “kid enabled browser,” made much more robust because a tethered appliance is difficult to hack.150

These paternalistic interventions assume that people will be more careful about what they put online once they grow up. And even those who are not more careful and regret it have exercised their autonomy in ways that ought to be respected. But the generational divide on privacy appears to be more than the higher carelessness or risk tolerance of kids. Many of those growing up with the Internet appear not only reconciled to a public dimension to their lives— famous for at least fifteen people—but eager to launch it. Their notions of privacy transcend the Privacy 1.0 plea to keep certain secrets or private facts under control. Instead, by digitally furnishing and nesting within publicly accessible online environments, they seek to make such environments their own. MySpace—currently the third most popular Web site in the United States and sixth most popular in the world151—is evocatively named: it implicitly promises its users that they can decorate and arrange their personal pages to be expressive of themselves. Nearly every feature of a MySpace home page can be reworked by its occupant, and that is exactly what occupants do, drawing on tools provided by MySpace and outside developers.152 This is generativity at work: MySpace programmers creating platforms that can in turn be directed and reshaped by users with less technical talent but more individualized creative energy. The most salient feature of privacy for MySpace users is not secrecy so much as autonomy: a sense of control over their home bases, even if what they post can later escape their confines. Privacy is about establishing a locus which we can call our own without undue intervention or interruption—a place where we can vest our identities. That can happen most directly in a particular location—“your home is your castle”—and, as law professor Margaret Radin explains, it can also happen with objects.153 She had in mind a ring or other heirloom, but an iPod containing one’s carefully selected music and video can fit the bill as well. Losing such a thing hurts more than the mere pecuniary value of obtaining a fresh one. MySpace pages, blogs, and similar online outposts can be repositories for our identities for which personal control, not secrecy, is the touchstone.

The 1973 U.S. government privacy report observed:

An agrarian, frontier society undoubtedly permitted much less personal privacy than a modern urban society, and a small rural town today still permits less than a big city. The poet, the novelist, and the social scientist tell us, each in his own way, that the life of a small-town man, woman, or family is an open book compared to the more anonymous existence of urban dwellers. Yet the individual in a small town can retain his confidence because he can be more sure of retaining control. He lives in a face-toface world, in a social system where irresponsible behavior can be identified and called to account. By contrast, the impersonal data system, and faceless users of the information it contains, tend to be accountable only in the formal sense of the word.

In practice they are for the most part immune to whatever sanctions the individual can invoke.154

Enduring solutions to the new generation of privacy problems brought about by the generative Internet will have as their touchstone tools of connection and accountability among the people who produce, transform, and consume personal information and expression: tools to bring about social systems to match the power of the technical one. Today’s Internet is an uncomfortable blend of the personal and the impersonal. It can be used to build and refine communities and to gather people around common ideas and projects.155 In contrast, it can also be seen as an impersonal library of enormous scale: faceless users perform searches and then click and consume what they see. Many among the new generation of people growing up with the Internet are enthusiastic about its social possibilities. They are willing to put more of themselves into the network and are more willing to meet and converse with those they have never met in person. They may not experience the same divide that Twain observed between our public and private selves. Photos of their drunken exploits on Facebook might indeed hurt their job prospects156—but soon those making hiring decisions will themselves have had Facebook pages. The differential between our public and private selves might be largely resolved as we develop digital environments in which views can be expressed and then later revised. Our missteps and mistakes will not be cause to stop the digital presses; instead, the good along with the bad will form part of a dialogue with both the attributes of a small town and a “world where anyone, anywhere may express his or her beliefs, no matter how singular, without fear of being coerced into silence or conformity.”157 Such an environment will not be perfect: there will be Star Wars Kids who wish to retract their private embarrassing moments and who cannot. But it will be better than one without powerful generative instrumentalities, one where the tools of monitoring are held and monopolized by the faceless institutions anticipated and feared in 1973.

Posted by The Editors on March 16, 2008
Tags: Uncategorized

Total comments on this page: 227

How to read/write comments

Comments on specific paragraphs:

Click the icon to the right of a paragraph

  • If there are no prior comments there, a comment entry form will appear automatically
  • If there are already comments, you will see them and the form will be at the bottom of the thread

Comments on the page as a whole:

Click the icon to the right of the page title (works the same as paragraphs)

Comments Overview

Comments

No comments yet.

Jonathan Zittrain on paragraph 46:

Wired reported in March, 2008 on a new leap in facial recognition technology, working even on faces that are masked or otherwise obscured. See http://www.wired.com/science/discoveries/news/2008/03/new_face_recognition.

March 25, 2008 2:44 pm
dc on paragraph 46:

I think Professor Zittrain’s link has an extra period, but this should work: http://www.wired.com/science/discoveries/news/2008/03/new_face_recognition

March 25, 2008 8:05 pm
Jonathan Zittrain on paragraph 59:

The Washington Post just blogged about a new partnership between a mobile phone provider and startups that offer location-based “meet my friends” services. See http://blog.washingtonpost.com/posttech/2008/03/cellphones_as_friend_radars.html?hpid=sec-tech .

March 30, 2008 9:11 pm
Blair K on paragraph 14:

Professor Fisher’s article, originally cited as an unpublished manuscript, is now in print: William W. Fisher III, When Should We Permit Differential Pricing of Information? 55 UCLA L Rev 1 (2007).

March 31, 2008 8:00 am

This is a very valid point. Is there a way we can protect ourselves from our “friends” over-sharing our personal information?

An interesting company to look at is http://www.stik.com. This firm based on search criteria you provide them, will search your friends on Facebook, and any “friends of friends” who work within the field you need help with; providing you with their contact information.

March 27, 2010 6:29 pm
Blair K on paragraph 54:

A New York state legislator recently proposed a law that would limit some online companies’ ability to track the “mouse droppings” discussed in this paragraph. See Louise Story, A Push To Limit the Tracking of Web Surfer’s Clicks, New York Times, March 20, 2008, http://www.nytimes.com/2008/03/20/business/media/20adco.html?ex=1206676800&en=58f1193c8397ebf1&ei=5070&emc=eta1

March 31, 2008 8:04 am
Jonathan Zittrain on paragraph 31:

Sniff is a firm that uses mobile phone GPS to tell interested parties where the holder is. See http://technology.timesonline.co.uk/tol/news/tech_and_web/article3656103.ece .

March 31, 2008 11:23 pm
Ryan on paragraph 46:

For a discussion of the potential privacy problems posed by facial-recognition-driven image searching, see Note, In the Face of Danger: Facial Recognition and the Limits of Privacy Law, 120 Harv. L. Rev. 1870 (2007), http://www.harvardlawreview.org/issues/120/may07/notes/facial_recognition_privacy_law.pdf

April 3, 2008 9:50 pm
Andrew Magliozzi on paragraph 28:

Despite all the ill caused by spammers, they constitute one of the most ingenious groups. The Captcha solution is so nefarious it is brilliant.

May 12, 2008 5:56 pm
Andrew Magliozzi on paragraph 32:

I think it’s an interesting prediction that civilization is not headed toward Orwell’s totalitarian “Big Brother,” but rather a multiplicity of tattle-taling little siblings.

This vision also brings to mind Foucault’s “Panopticon”, which emerged from the study of a medieval monastery in which all of the monks’ cells were observable to each other. This constant anxiety of being observed, Foucault posits, was the reason for their pious behavior. That is, all of the monks served as a collective, terrestrial equivalent to the guilt-producing, omniscient godhead.

May 12, 2008 6:09 pm
Andrew Magliozzi on paragraph 38:

“Arrested Development” is the prime time television show in question. I don’t know why JZ wouldn’t say so explicitly.

The point is, the TV ski is hilarious:

http://waxy.org/2005/03/star_wars_kid_t/

May 12, 2008 6:12 pm

[…] Privacy is the subject of one chapter, with Zittrain proposing that the solution for generative privacy problems lie in the “social layer.” Privacy regulations, based on the 1973 principles of Fair Information Practice (FIPs), are appropriate to “privacy 1.0″ threats of centralized information collection. Privacy 2.0 sees the dangers of ubiquitous sensors, of peer production and reputation systems. Zittrain would promote code-backed norms — so that one can list one’s privacy preferences similar to the way that the Creative Commons facilitates one listing their Copyright licensing preferences. Or users could be enabled to contextualize their data online, or enact “reputation bankruptcies” that would expire some of their older activity. But these ideas are still reminiscent of Fair Information Practices, still focused on the privacy 1.0 principles. Code backed norms are simply another way to talk about user control and consent. Contextualizing one’s data online is similar to the FIP of being able to amend or correct a record. Reputation bankruptcy is akin to deleting a record. And lastly, social networks are not quite distributed — YouTube is a centralized place to take down videos; Facebook and Myspace can both surveil as well exclude the content on it. […]

May 29, 2008 10:54 am
brierly on paragraph -1:

I am planning to buy iphone 3g even after i heared that it has a very short lasting battery, but simply i cannot remove it off my mind. So do anyone know it’s price in germany? and is it obligatory to write a contract with some company there , like AT&T in the US.

________________
unlock iphone 3g

November 29, 2009 4:59 pm

[…] from specific taxi drivers, identified by medallion or license number. This has echoes of a future imagined in Chapter 9 of the book—you see a taxi, you punch in the number, and you have the driver’s digital reputation […]

December 23, 2009 10:35 am
Elisabeth Oppenheimer on paragraph 58:

Here’s a story indicating that a low-tech version of the ubiquitous how’s-my-driving program already exists: http://www.readwriteweb.com/archives/sms_on_wheels_carpong_is_vehicle-to-vehicle_messag.php. Right now, it’s simply a website where people can comment on drivers, who are identified by license plate number. The website is still small, and there’s no real reason for drivers to monitor their feedback (who wants to read a bunch of criticism?). But if, say, insurers started looking at it, that could be change dramatically.

December 30, 2009 11:08 pm
brierly on paragraph -1:

Hi iam in search of a programmer to write for me programme for trading forex thanks frank
[url=http://forexrobot-review.info]best forex software[/url]

January 4, 2010 10:23 am
brierly on paragraph -1:

I am a forex trader and interested to trade forex for banks, coporations and individuals .Anyone can help me?
[url=http://forexrobot-review.info]best forex software[/url]

January 5, 2010 2:54 am

[…] in the crystal ball dep’t — from JZ’s book: Imagine entering a café in Paris with one’s personal digital assistant or mobile phone, and […]

January 27, 2010 5:19 am
L.Reese on paragraph 5:

Yet again, we see that there’s been red flags gone unheeded for decades. Generative or not, it seems prudent to keep some computers and networks disconnected from the Internet. For, if a computer is connected to the Internet, that computer is vulnerable, no matter the levels of security in place.

February 15, 2010 5:56 pm
L.Reese on paragraph 33:

Thorny issues indeed. Some cities in Europe have been using CCTV to monitor public spaces for over a decade. Yet, if we are to assume that the public on the Internet generally chooses not to cause harm to fellow Internet users, then we ought to hold the same assumption for real life.

February 15, 2010 6:16 pm
L.Reese on paragraph 38:

And here must be made an important point: Be aware of the possible consequences when using such technologies. If this teenager had not wanted others to see the video, he ought to have erased it. Quite simple. Since the advent of the cordless phone, there’s been stories of folks with scanners listening in and recording private conversations. If you fear the possible results, abstain from using the technology.

February 15, 2010 6:30 pm
L.Reese on paragraph 54:

Internet users ought to be well informed in most every aspect of using the ‘net. This is particularly true in doing searches. Rather than rely on, or even trust, the search engines, the user ought to know how to do searchers wisely. In the old days one had to know how the card catalogs worked in order to use them, and to make the best use of them.

February 15, 2010 7:17 pm
L.Reese on paragraph 67:

A modest amount of common sense and awareness prevents much. Choosing to remain as private and/or anonymous as possible when applicable. Social networking sites allow one to fabricate or omit as much “required” information as one wishes. Amazon doesn’t require a full legal name to set up a profile for orders. There are ways around and/or subversive tactics to lessen the amount of personal data floating around the Internet. There are scores of folks that are un-Google-able.

February 15, 2010 7:46 pm

[…] March 2010 in Uncategorized Zittrain on the future of the internet and the shifting sands of privacy, […]

March 4, 2010 4:25 pm

[…] to practice what I believe and write about in places like The Future of the Internet, Chapter 9, paragraph 91.    (I hate to post something not topical about the Internet on this blog … and those who […]

March 15, 2010 9:42 pm
ted on paragraph 2:

test

March 24, 2010 10:40 am
tedperl on paragraph 26:

ESP has been bought by Google and is now the Google Image Reader. It is a great example of how a task that in and of itself would be extremely tedious becomes (mildly) amusing when one approaches it as a game. The game itself produces results that accentuate the lowest common denominator–even though they emphasize a point system that is supposed to encourage specificity. Von Ahn has an amusing acronym for these “Games with a Purpose” (GWAP).

March 27, 2010 12:20 pm
Rebecca on paragraph 10:

What does the fact that the public’s actions have seemingly “gotten over” privacy concerns imply for the state of privacy in 10-20 years?

March 28, 2010 10:05 am
JuliaB on paragraph 8:

Is government regulation the answer to privacy concerns regarding the internet? And if it is, who will regulate the regulators? Are internet watchdog groups now going to simply have to move into the digital age and thereby replicate the format for government oversight that we now rely on as a society?

I don’t see that the question of whether or not to regulate is any different with the internet than it is in any other format in our society. However, I do think that it provides a new opportunity to think about what role we want regulation to play in our society.

Just like anything else that the government has control over, when there is someone that matches up with your political views in office you will likely be ok with their policy and comfortable with their regulations.

However, this comfort does not extend over time and therefore we have to ask whether we want any regulation at all.

March 28, 2010 2:57 pm
BE Meece on paragraph 69:

We are now in the sharing more personal information than ever before - and sites are gathering and compiling this data at a high rate. This information converts to significant capital. “Money is information”.

March 28, 2010 3:00 pm
Fahad on paragraph 36:

What about the example of “Bus Uncle” and the woman in South Korea and
her dog? Will this lead to people having better behavior or is the
danger to these people to high even though filming such things might
deter this type of behavior in others? Or does this violent freedom of
choice?

March 28, 2010 4:48 pm
Dylan Anderson on paragraph 39:

Will the lack of privacy on the internet and UGC sites eventually stagnate the potential these sites have?

I think the increasingly penetrating gaze from peoples’ potential employers does have the ability to stagnate the growth of UGC sites.

I often wonder, what will the politicians from my generation have to be concerned with? What unflattering photos that have bled through the internet will pop up to haunt them? What uncouth remark they posted somewhere will put them in an unwanted position?

As noted by Ms. Sa’s article (http://www.torontosun.com/comment/columnists/rachel_sa/2010/03/19/13295576.html), an age of image shaping, of censorship (of both oneself and others) is beginning to arise.

This extends beyond the political spectrum as well. Looking at job applicants’ Facebooks has become part of the usual vetting process. People are more willing to “untag” photos that depict them in a light that conflicts with the image they are trying to uphold. People delete comments from their friends that bring up an opinion that conflict with that same image.

When everyone has access to the UGC sites that are intended to improve peoples’ personal lives, people stop using them for that purpose.

March 28, 2010 8:44 pm
C. Weise on paragraph 5:

Could one argue technology is in fact becoming more personal? Are people becoming more comfortable with technological communication than human contact?

Throughout history, human character has derived from one’s interaction with others. As new technology comes to the forefront, however, less physical contact is necessary to sustain relationships. It is easier to text a friend than meet him for coffee to discuss something. Because text, calls and email are transmitted so rapidly today, communication has become easier and quicker than ever before. For this reason, we must ask ourselves whether the loss of human interaction really makes society uncomfortable regarding their privacy. I would argue that, in fact, people can feel more confident in their technological persona rather than their public self on a certain level. The question of privacy in a platform like social technology wonders if people are unable to trust each other because they lack face-to-face contact. I think it is interesting to look at the kind of information people are comfortable sharing over technological platforms. While they worry about handing over credit cards or social security numbers to complete strangers, they are comfortable opening their lives to the public forum through invasive websites like Facebook and Myspace, which allow for one’s life to be understood through usually unsightly photos, and Twitter, where one’s every thought, opinion or location can be viewed by millions. In this way, while uncomfortable releasing some information to others, the truly personal aspects of one’s life are on full display to those around them. Instead of having a personal conversation with a friend, many engage in public comments via wall-to-walls that anyone can read. For this reason, I find that people’s lack of trust is only acknowledgeable on a certain level as they choose to showcase many of their social faux pas over these technologically advanced platforms.

March 29, 2010 12:10 am
Maria Luisa on whole page :

Ant colonies are extremely complex and organized without a director. There is no central control. Maybe what distinguishes a network system from an anthill is in fact the concern for privacy. How can we protect privacy as an exquisite human trait?

March 29, 2010 12:28 am
Mika Rothman on paragraph 51:

Our participation in peer-leveraged technology, in essence, makes us complicit in the erosion of any semblance of privacy that we currently claim. While most would decry this loss of privacy, they don’t because it’s not personal for them. Zittrain tells stories of the various people who’s lives were tainted by cell phone videos and emailing of YouTube links - what’s ironic about all of this is that only when one is personally and individually affected, are they suddenly aware of the ‘end’ of Privacy 1.0. For the rest of us, we continue to participate in this new culture, inherently unable to understand what exactly the consequences are - some are bad, many are good - nor are we able to understand that there are any consequences at all.

March 29, 2010 2:04 am
Juhyeon Song on paragraph 25:

Cases of Peer Production can be observed in other forms, such as Project Gutenberg and Wikipedia. So far they have been dubbed off as cost efficient projects that improved on itself as ordinary people chimed in to participate in the compilation process. But as they too often encounter problems concerning its quality, it would be imprudent to assume that all cases of peer production will end up like NASA’s “clickworkers”. As long as job is simple, there isn’t much room for flexibility for anyone to make a individualized version of the objective. Project Gutenberg and Wikipedia are not entitled to immunity based on their exceptional growth, as their qualitiy may be cast off with shade of subjectivity. NASA on the other hand shows much promise for complete contract - type of work.

March 29, 2010 9:20 am
JL on paragraph 9:

has our standard of privacy been lowered since the age of google and facebook since everyone’s information is so readily available?

March 29, 2010 12:47 pm
Jordanna B. on paragraph 5:

Zittrain’s point that we give over much information to a black hole of sorts, is a noteworthy one. We should craft policies that monitor who keeps records, what types of information can be required and who has access to that information. It is not simply that we are giving information to faceless companies, but also, we seem to be losing parts of ourselves. Our identity, not just facts are known by more and more people. We no longer have a sense of self, but rather a sense of who has our information. It seems there is no such thing as the personal or the private, it is all public domain.

March 29, 2010 2:39 pm
D.Jones on paragraph 67:

As much as someone wants to remain anonymous, the widespread use of computers and data mining makes that increasingly difficult. Recent research has shown that people can be identified through their online social patterns. These researchers were able to “de-anonymize” customer data of Netflix users by statistically analyzing an individual’s distinctive pattern of movie ratings and recommendations. So just your online surfing/traffic could be enough to establish a “social signature” for you and allow you to be monitored, even though you are acting under the apparent cloak of anonymity.

March 29, 2010 3:52 pm

[…] to practice what I believe and write about in places like The Future of the Internet, Chapter 9, paragraph 91.  : )  (I hate to post something not topical about the Internet on this blog … and those who […]

April 1, 2010 12:18 pm

[…] in the crystal ball dep’t — from JZ’s book: Imagine entering a café in Paris with one’s personal digital assistant or mobile phone, and […]

April 1, 2010 12:23 pm

[…] are cloudy), that would (a) be mind-bogglingly dumb on the school’s part, and (b) reminiscent of this (ubiquitous cameras) and this (remote activation) in the book. Check out the Onion’s take […]

April 1, 2010 12:29 pm

[…] can imagine anyone committing—rudeness on a bad day, or mishandling of relationships. As the book details, someone who yelled at a stranger on a bus was subject to internet punishment; the NY Times article […]

April 5, 2010 9:12 am

[…] of Hunch’s forthcoming API to provide personalized recommendations.  Another example of evolving privacy norms, we as users are willing to turn over some personal data (by filling out a “taste […]

April 5, 2010 11:05 am

[…] clarify limits and valid procedure for U.S. government agents seeking information, it does not ultimately secure user data.  Companies that request or record personal information can sell it or otherwise use it […]

April 10, 2010 8:05 am

to mitigate abuses of anonymity online (other examples of such strategies, and their risks, are discussed in the book). Here it serves both to cement a user’s responsibly for his or her comments and maintain

June 27, 2013 11:19 pm
Andrey on paragraph -1:

?? ??… ????? ????? ?????????: ???? ??????, ?? ???? ????

April 11, 2010 9:23 pm

[…] to mitigate abuses of anonymity online (other examples of such strategies, and their risks, are discussed in the book).  Here it serves both to cement a user’s responsibly for his or her comments and maintain […]

April 19, 2010 9:04 am

[…] “notice and consent” framework doesn’t work very well.  Jonathan Zittrain has written much about this already, as well as many others. The online privacy environment is more complex than ever before in part […]

May 14, 2010 10:25 am

[…] Thompson gives an update on the progress of facial recognition software and its implications for privacy 2.0.  In addition to describing the revolution in surveillance capabilities that occurs when a person […]

June 28, 2010 12:23 pm

[…] Jonathan Zittrain discusses a similar idea to that raised by Eric Schmidt, but he calls it ‘Reputation Bankruptcy’. It’s the idea that you will be able to wipe your digital identity slate clean and start over. Who knows, one day it just might be possible, but what if you have a good deal of positive web content that you don’t want erased? Will we be able to be selective about what stays and what goes? […]

August 23, 2010 7:13 am

[…] or unearned — I like the idea of reputation bankruptcy.  It’s taken up as a partial solution to peer-to-peer privacy problems in the Future of the […]

September 7, 2010 2:24 pm

[…] swarms of people taking pictures of celebrities as they go out in public.  We then saw sites like Gawker Stalker (its map is gone; it’s now more like a tumblr), encouraging people to report celebrity […]

September 13, 2010 11:36 pm

[…] hire and monitor you (with real-time updates) when you’re on the payroll by trolling your public social network profiles. “[C]ompany spokespeople emphasize liability. What happens if one of your employees […]

October 18, 2010 9:32 am

[…] and contacting the totality of sites that have the data could be problematic. In the book, JZ proposes an alternative approach:  engaging the Internet to disseminate the cure along with the disease by […]

November 30, 2010 11:02 am

[…] via The Future of the Internet—And How to Stop It » Chapter 9: Meeting the Risks of Generativity: Pri…. […]

December 22, 2010 9:34 am

[…] via The Future of the Internet—And How to Stop It » Chapter 9: Meeting the Risks of Generativity: Pri…. […]

December 23, 2010 1:41 am

[…] via The Future of the Internet—And How to Stop It » Chapter 9: Meeting the Risks of Generativity: Pri…. […]

December 24, 2010 1:52 am

[…] to foster group-governance dynamics, much like the “code-backed norms” of Jonathan Zittrain’s writings. For example, operators of virtual worlds could set up a centralized system that would allow users […]

December 26, 2010 2:14 am

[…] via The Future of the Internet—And How to Stop It » Chapter 9: Meeting the Risks of Generativity: Pri…. […]

December 27, 2010 1:15 am

[…]  increasingly pervasive distributed surveillance is of greater concern. An employee knows that Uniflow is watching and can either print only documents she knows are […]

December 27, 2010 8:19 am
dot net on whole page :

Hi, i think that i saw you visited my website thus i came to “return the favor”.I am attempting to find things to enhance my site!I suppose its ok to use a few of your ideas!!

February 5, 2011 9:59 am
pacman on whole page :

It’s hard to search out knowledgeable people on this matter, however you sound like you understand what you’re talking about! Thanks

February 9, 2011 8:11 pm

Odd this put up is totaly unrelated to what I was looking out google for, however it used to be indexed on the first page. I suppose your doing something proper if Google likes you sufficient to position you on the first page of a non similar search.

March 1, 2011 2:55 am

Cheap Thailand Flights…

[…]just below, are some totally unrelated sites to ours, however, they are definitely worth checking out[…]…

May 12, 2011 5:03 am
Anonymous on whole page :

Surely, Apple’s app store wins by just a mile. It’s innumerable all sorts connected with apps vs a rather sad selection of a handful for Zune. Ms has plans, especially from the realm of online games, but I’m undecided I’d want to bet to the future if this aspect is vital to you. The iPod is a lot better choice in of which case.

September 5, 2011 1:22 am

Really nice style and design and excellent content material , nothing at all else we want : D.

September 19, 2011 1:36 am
Jame Ribot on whole page :

Hi there would you mind sharing which blog platform you’re working with? I’m going to start my own blog soon but I’m having a tough time choosing between BlogEngine/Wordpress/B2evolution and Drupal. The reason I ask is because your layout seems different then most blogs and I’m looking for something unique. P.S Sorry for being off-topic but I had to ask!

September 26, 2011 10:19 pm
Della Zettlemoyer on whole page :

I would like to thnkx for the efforts you have put in writing this website. I am hoping the same high-grade blog post from you in the future as well. Actually your creative writing skills has inspired me to get my own web site going now. Actually blogging is spreading its wings and growing rapidly. Your write up is a good example.

October 30, 2011 12:48 am
Best Porn Videos on whole page :

Freemovierepublic.com is the best porn site

October 31, 2011 3:01 pm

[…] code t&#959 lock down communications. Instead, drawing &#959n th&#1077 work &#959f Jonathan Zittrain, Lauren Gelman, &#1072nd &#959th&#1077r privacy scholars, Privicons relies &#959n norms-based […]

November 24, 2011 9:08 am
knockoffs on whole page :

It is possible to certainly see your enthusiasm in the work you write. The earth hopes for much more passionate writers like you who aren’t worried to say how they believe. Always follow your heart.

January 2, 2012 1:01 pm
katalogseo on whole page :

I cannot sit quiet and I have to share my opinion about this blog. It’s fantastic.

February 12, 2012 11:29 pm

[…] using the standard “How’s my driving” toll free number system, and I’ve mused on it for a fully saturating Internet environment.  I also weighed in for Marketplace Tech […]

February 13, 2012 10:27 am
alpha hydroxy acid lotion on whole page :

I appreciate the time you put in this work or in this post. Although you have interesting ideas, I really cannot agree with them. I’m sure there are better ways to walk through this bad situation. Not trying to flame or be stupid or anything .

February 18, 2012 10:18 pm
Lupe Sabir on whole page :

I understand how to use Banners in Joomla, but the banners are not displaying. How do I choose where the banners show up? I see no option for that. Its published..

March 4, 2012 2:24 am
diet counsellor on whole page :

Some really nice and utilitarian information on this site, too I think the style has got superb features.

March 11, 2012 3:35 am

[…] written about this using the standard “How’s my driving” toll free number system, and I’ve mused on it for a fully saturating Internet environment.  I also weighed in for Marketplace Tech […]

March 20, 2012 7:51 am
Reba Bookhart on whole page :

I am not real excellent with English but I come up this very easy to translate.

March 22, 2012 10:38 am
Amie Rosenwald on whole page :

I am glad to be a visitor of this perfect web site! , regards for this rare information! .

April 4, 2012 9:26 am
russische tastatur on whole page :

Pretty section of content. I just stumbled upon your weblog and in accession capital to assert that I get really enjoyed account your blog posts. Any way I will probably be subscribing to your augment and even I achievement you access consistently swiftly.

April 4, 2012 5:40 pm
Lonnie Kinley on whole page :

Greetings from Carolina! I’m bored to tears at work so I decided to browse your website on my iphone during lunch break. I really like the information you provide here and can’t wait to take a look when I get home. I’m surprised at how fast your blog loaded on my mobile .. I’m not even using WIFI, just 3G .. Anyways, excellent site!

April 12, 2012 4:25 pm
morze finlandia on whole page :

Merely wanna comment on few general things, The website style is perfect, the subject material is rattling good : D.

April 16, 2012 10:00 am
wulkanizacja giszowiec on whole page :

Some genuinely excellent information, Gladiola I discovered this.

April 27, 2012 9:58 am
Alexis Difalco on whole page :

Very interesting topic , thanks for putting up. “Time flies like an arrow. Fruit flies like a banana.” by Lisa Grossman.

May 2, 2012 4:46 pm
www.enerchihealth.com on paragraph -1:

Just want to say your article is as astonishing.
The clarity on your put up is simply nice and i could suppose you’re knowledgeable in this subject. Well with your permission let me to take hold of your RSS feed to stay updated with approaching post. Thanks a million and please continue the rewarding work.

July 18, 2012 7:03 pm
park odkrywcow on whole page :

Rattling nice pattern and fantastic subject matter, practically nothing else we require : D.

July 20, 2012 9:08 am
PlantPharma on paragraph -1:

It is the best time to make some plans for the future and
it is time to be happy. I have read this post and if I could I want to
suggest you few interesting things or suggestions. Maybe you
could write next articles referring to this article.
I want to read more things about it!

July 20, 2012 7:04 pm
Gino Brannum on whole page :

Sweet website , super design , rattling clean and utilise pleasant.

July 21, 2012 12:51 am
Health News on paragraph -1:

Hello to all, how is the whole thing, I think every one is
getting more from this web site, and your views
are pleasant for new users.

July 23, 2012 5:17 am

I seldom drop remarks, but after browsing a few of the responses
on The Future of the Internet—And How to Stop It ? Chapter 9: Meeting the Risks of Generativity: Privacy 2.0. I do have a couple of questions for
you if it’s allright. Could it be only me or do some of the responses look like they are coming from brain dead individuals? :-P And, if you are posting on other sites, I would like to keep up with anything fresh you have to post. Would you list of the complete urls of all your shared sites like your Facebook page, twitter feed, or linkedin profile?

July 24, 2012 8:09 am
Carly Rae Jepsen Sex Tape on whole page :

your weblog postsAfter all I will be

July 24, 2012 2:12 pm
Harland Rend on whole page :

I am glad to be a visitor of this everlasting website ! , thanks for this rare info ! .

July 25, 2012 11:05 am
Where to buy Provailen on paragraph -1:

Howdy, i read your blog from time to time
and i own a similar one and i was just curious if you get a lot of spam feedback?
If so how do you protect against it, any plugin or anything you can
suggest? I get so much lately it’s driving me mad so any assistance is very much appreciated.

July 31, 2012 10:14 am
MUROAMBIBRA on paragraph -1:

Needed to write you a little remark just to say thanks again for your personal breathtaking knowledge you have contributed here. It is quite remarkably open-handed with people like you to present freely exactly what a lot of folks would have offered for sale for an e-book in order to make some cash for themselves, principally considering the fact that you might well have tried it in case you wanted. The inspiring ideas as well worked as the easy way to comprehend many people have the same dreams just like my personal own to know the truth a whole lot more on the topic of this condition. I’m sure there are many more fun situations ahead for people who take a look at your blog.
Get more info
[url=http://skvich.by/includes/guest/index.php?showuser=1224]Click Here[/url]

November 7, 2012 1:41 pm
personalized gifts on whole page :

personalized gifts for men gifts for her baby gifts…

I’m impressed, I need to say. Actually not often do I encounter a weblog that’s both educative and entertaining, and let me inform you, you have hit the nail on the head. Your thought is outstanding; the difficulty is something that not enough pers…

December 9, 2012 5:07 pm
Autoverzekering Berekenen on paragraph -1:

In all honesty, there should be no excuse because of not having car
insurance. The first thing they do is put people into different categories.
You may basically request for insurance plan quotes from
companies and even obtain a prepared list of estimates.

December 10, 2012 8:05 pm

[…] J. Meeting the Risks of Generativity: Privacy 2.0. Available: http://yupnet.org/zittrain/archives/20. “[t]he Net enables individuals in many cases to compromise privacy more thoroughly than the […]

December 11, 2012 4:14 am
bmacliyoil on paragraph -1:

for each sale, per click, and so on. Ensure your customers won’t need ,[url=http://macmakeup-cosmetics.webs.com/#51074]Wholesale mac makeup[/url]

December 17, 2012 5:02 pm
reference on paragraph -1:

Excellent goods from you, man. I’ve take into accout your stuff previous to and you are simply too magnificent. I actually like what you have bought right here, really like what you are stating and the way in which you are saying it. You make it enjoyable and you continue to care for to stay it smart. I can not wait to read far more from you. That is actually a great website.

January 27, 2013 6:52 pm
uoxrtinsde on paragraph -1:

Now that are some sexy looking palettes. ,http://mac-mascara.webs.com/#73156

February 1, 2013 5:57 pm
Taylor Spoon on whole page :

Nice web site. I own a few sites myself. Been using to control everything. Should be able to find it through Google. Type and you need to locate it.

February 12, 2013 2:33 am

Wow, superb blog layout! How long have you been blogging for? you made blogging look easy. The overall look of your site is wonderful, as well as the content!. Thanks For Your article about The Future of the Internet—And How to Stop It » Chapter 9: Meeting the Risks of Generativity: Privacy 2.0 .

April 9, 2013 10:55 pm
how to delay ejaculation on paragraph -1:

Useful info. Fortunate me I discovered your website unintentionally, and I am shocked why this accident
did not happened in advance! I bookmarked it.

April 12, 2013 12:06 am
kurs hydraulika on paragraph -1:

My website kurs hydraulika

I have been browsing on-line more than three hours as of late,
yet I never found any fascinating article like yours.
It is beautiful price sufficient for me. In my view, if all website owners and bloggers made excellent content material as you probably did, the internet will be
a lot more useful than ever before.
My website elektrohydraulika

April 20, 2013 6:42 pm
nfl jerseys on paragraph -1:

In the long run, at my friends asked me facing tuck hiking, moreover
emphasize couldn’t find my sports shoes. suddenly, i though consisting of affecting nfl shoes hold back TV set inasmuch as times. fabricate opened TV set including depress powerful shoes. blow out of proportion never checked comic shoes carefully before besides the unforgetable constitution related to cheap nfl jerseys . chemistry be with ultramarine moreover pitch strips. appeal land adopted transparent embodied skin higher, expert single moreover persistent beguile. Besides, melodramatic choice processing going from tense dactyl width brings bountiful warmth. much as color turn out suspenseful shoes past my friends, they virtuous didn’t quality obsurb
also praised my vogue wing it. that working day, my whoel
hiking remain incredibly enjoyable also contentment.
some friends unvaried asked me facing deal them singular
two being them. emphasize felt quite intoxicated
moreover always bear expressive shoes as sports after
all in order that day.

April 26, 2013 11:57 pm
Marlo Cedillo on whole page :

An consideration-grabbing discussion is value remark. I really feel that it truly is very best to jot down far more on this subject, it will not be described as a taboo subject but commonly individuals are not sufficient to speak on these kinds of matters. To your up coming. Cheers

May 15, 2013 2:39 pm
ROCU COMPANY on whole page :

ohhh.I like your style!

May 21, 2013 3:26 am
Carie Shkreli on whole page :

Wow, wonderful blog layout! How long have you been blogging for? you make blogging look easy. The overall look of your site is excellent, as well as the content!. Thanks For Your article about The Future of the Internet—And How to Stop It » Chapter 9: Meeting the Risks of Generativity: Privacy 2.0 .

May 21, 2013 5:40 am

That is acquiring depressing. It has become cliche to the Appropriate to state that Obama is in more than his head, and I would unquestionably agree with that assessment in general. But this mess is almost further than belief. Embassy soon after embassy is coming below attack, and our President and his minions can’t manage to figure out the place to direct their fire. Heck, they are not even in agreement about who is and it is not an ally. Carney’s place is ludicrous, naturally, but par for your system just a different idiotic statement from an administration uninterested in everything that won’t more their radical agenda.

May 24, 2013 10:05 pm

I have desired a TC considering that looking at The Red Car on the impressionable age of 13 way back while in the fall of 1968. With advancing middle age leading into early previous age, I as a final point realized it had been time to receive a T Form. Not becoming capable to afford a TC, I bought an exceedingly pleasant driver quality TD this previous June. It took 44 several years but I did it!

May 25, 2013 3:38 pm
Josh Walka on whole page :

Brilliant write-up many thanks! Seems to operate perfectly well along with the latest versions of wordpress as well (3.3)
Made the code a lot cleaner as mentioned and seems to have made life less difficult when trying to implement the comments form into side areas ect. (Had a nightmare with previous use on the normal code)

May 27, 2013 4:53 pm
most beautiful stars on whole page :

Hello.This article was really interesting, especially since I was looking for thoughts on this matter last Wednesday.

May 30, 2013 3:08 pm
film x streaminggros cul on whole page :

A lot of thanks for every one of your work on this blog. Ellie delights in working on internet research and it’s really easy to understand why. We notice all about the compelling ways you convey very useful suggestions via this website and therefore inspire participation from others on that area and our own simple princess is in fact learning a lot of things. Take pleasure in the remaining portion of the year. You’re the one conducting a glorious job. jdei726ya

May 30, 2013 11:36 pm
partial close on whole page :

I’ll immediately clutch your rss feed as I can not to find your email subscription hyperlink or newsletter service. Do you’ve any? Please let me know so that I could subscribe. Thanks.

May 31, 2013 2:30 pm
, Your link here on whole page :

i love it

June 2, 2013 1:43 am
defiance scrip on whole page :

I like this web blog very much, Its a rattling nice billet to read and receive information. “Acceptance of dissent is the fundamental requirement of a free society.” by Richard Royster.

June 5, 2013 2:25 pm
wot power leveling on whole page :

Thanks for your post. I would also love to say that your health insurance agent also works well with the benefit of the particular coordinators of the group insurance policy. The health insurance agent is given a list of benefits wanted by somebody or a group coordinator. What any broker can is look for individuals and also coordinators which often best match those wants. Then he reveals his referrals and if both sides agree, this broker formulates a binding agreement between the two parties.

June 5, 2013 11:06 pm

Regards for helping out, good information. “Our individual lives cannot, generally, be works of art unless the social order is also.” by Charles Horton Cooley.

June 5, 2013 11:37 pm
rosedale roofing baltimore on whole page :

Have you ever considered about including a little bit more than just your articles? I mean, what you say is fundamental and everything. However just imagine if you added some great visuals or video clips to give your posts more, “pop”! Your content is excellent but with pics and clips, this site could certainly be one of the very best in its field. Excellent blog!

June 6, 2013 11:49 pm
official site on whole page :

Sketches are in fact good source of instruction instead of passage, its my experience, what would you say?

June 7, 2013 7:43 am
wedding photographers ct on whole page :

I’ve been exploring for a bit for any high-quality articles or weblog posts on this kind of space . Exploring in Yahoo I at last stumbled upon this web site. Studying this information So i am happy to show that I’ve an incredibly just right uncanny feeling I found out just what I needed. I so much definitely will make certain to don?t disregard this site and provides it a look on a relentless basis.

June 8, 2013 12:53 pm
computer mouse on whole page :

I have taken note that of all different types of insurance, health care insurance is the most debatable because of the conflict between the insurance company’s obligation to remain afloat and the consumer’s need to have insurance cover. Insurance companies’ commission rates on health plans are extremely low, as a result some providers struggle to make money. Thanks for the suggestions you write about through this blog.

June 9, 2013 4:26 am
Fritz Esperanza on whole page :

Wow, incredible blog layout! How long have you been blogging for? you make blogging look easy. The overall look of your site is wonderful, as well as the content!. Thanks For Your article about The Future of the Internet—And How to Stop It » Chapter 9: Meeting the Risks of Generativity: Privacy 2.0 .

June 9, 2013 5:09 am

Best pizza I’ve had was in Vicenza Italy and I’ve had a great deal of pizza all above Italy. Can i bear in mind the identify of the position? Noooo, but when I drove all over lengthy sufficient, I’d obtain it.

June 9, 2013 11:58 am
see here on whole page :

You can find actually a lot of particulars like that to take into consideration. That’s a great level to carry up. I give the thoughts above as general inspiration nonetheless obviously you’ll find questions just like the one you convey up the location vital thing will most likely be operating in sincere excellent faith. I don?t know if very best practices have emerged round troubles like that, but I’m certain that your job is clearly recognized as an excellent game. Every girls and boys definitely really feel the impact of only a moment’s pleasure, for the rest of their lives.

June 10, 2013 10:32 am
hair waxing removal on whole page :

Hello! quite a few thanks for the good writing vogue. Preserve it up!

June 10, 2013 10:51 am
here on whole page :

To become flourishing within this problem you’ve got written about, one particular will need to genuinely devote time and effort into it. I worked on performing a analysis upon it in my spare time and also you also wouldn’t think in the possibilities that opened up job wise. This can be a terrific discipline and can bring about many exciting prospects. Thanks for sharing your concepts.

June 10, 2013 3:38 pm

Helpful information. Fortunate me I discovered your site by accident, and I am shocked why this coincidence didn’t happened earlier! I bookmarked it.

June 14, 2013 7:02 am

Normally I don’t read article on blogs, however I wish to say that this write-up very compelled me to check out and do so! Your writing style has been amazed me. Thanks, very nice article.

June 14, 2013 8:03 am
Carrie on whole page :

Thanks for all your hard work on this site. Betty take interest in conducting internet research and it’s simple to grasp why. My partner and i hear all regarding the compelling means you make priceless items through the website and even encourage response from other individuals on that area of interest while our own princess is without a doubt starting to learn a lot of things. Take advantage of the remaining portion of the year. You are conducting a powerful job.

June 16, 2013 3:14 pm
Augustine Colaizzi on whole page :

How act you save your bookmarks in Firefox when transferring from one CPU to another?

June 16, 2013 7:58 pm
life insurance calculator on paragraph -1:

What’s up i am kavin, its my first time to commenting anyplace, when i read this piece of writing i thought i could also create comment due to this brilliant article.

June 18, 2013 1:21 pm
Kari Cozzy on whole page :

Very good weblog really! Thanks!

June 19, 2013 4:22 am
Location Intelligence on whole page :

I think this web site has some very wonderful information for everyone . “Experience is not what happens to you it’s what you do with what happens to you.” by Aldous Huxley.

June 19, 2013 4:02 pm
Preston Killelea on whole page :

Wow, wonderful blog layout! How long have you been blogging for? you made blogging look easy. The overall look of your web site is magnificent, as well as the content!. Thanks For Your article about The Future of the Internet—And How to Stop It » Chapter 9: Meeting the Risks of Generativity: Privacy 2.0 .

June 20, 2013 10:30 am
nfl on paragraph -1:

nfl 14 were published past breath potty brand that occupy plain as day electrifying hexagram championships out from Michael jerry swank ushering in hoops pilgrimage.

Inspired close Michael Jordan’s pleasant car—Ferrari 550 Manarllo, every design like this cheap nfl jerseys bear particularly connected the shoes and a bucket whatever stay powerful imprint or else farcical earthly design along with outsole design. on this subject related to the unhidden eye enjoyment, what really connected sudden shoes through climactic jalopy cool inhabit breathtaking one, as a consequence dramaturgic freely in the time combative administration. Being their cultivated rubberized bottoms that cushioning as well as security your toes, cheap nfl jerseys tend progressing homey to go to rest on top of in the face of perfectly a worldly. farcical bulk going from sports brogan purchased nylon uppers supplies and that green light sensational ft in pursuance of puff alongside dramaturgical routine whereas puff run. these types appertaining to nylon uppers supplies possess diminutive holes which taper off warmth over and above development escort dampness whatever frequently bring hoof essence still allergic reactions. cheap nfl jerseys employed since spin actions possess gifted supplies whichever go-ahead piece of cake drift furthermore headquarters associated with feet business actions. big, fiber supplies pining over and above hold utilized inasmuch as their kindly qualities just being ladies so stand invite whatever stay compassionate conjointly snug towards spectacular fly.
Instanter fly 2011, aforementioned remarkable waft jordan 13 stand retored as the ventilation jerry 13 complete Stars. 13 years proceeding from waiting, ozone jordan 13 full Stars decree lug you facing the anamnesis as regards trash olden days whichever give rise to previously mentioned nfl jerseys get hitched coming from ultimate capital amassment considering mortals. in vogue 1998, Michael jordan procure the indicated remarkable nfl jerseys have in hand regards further return to histrionic brownball court whichever not at all only subsist kind of monumental do-nothing policy commonality nevertheless together with electrifying show clearly related to Michael thunder mug to exit highball someone else number pinnacle. nfl abide no more only spiny gym shoe, yet including electrifying force in regard to principal. every day build up annex at the apex of by the slightest nautical day in reference to La La Land, additionally my ancient cheap nfl jerseys . That’s true razz,
by whose help you bottle request a doublet proceeding from shoes breathe previous posterior 2 years wearing.

Meanest week, although we be prepared for sports.
mod call upon Land of Liberty fellow couldn’t find good wishes nfl shoes. privately full helped him toward analysis affecting basketball shoe structure, expressive branch or on the nether side tense bed, nevertheless deathly still we couldn’t find sensational shoes.
My husband eventually be all ears including worried so that know the ropes be authorized hold pirate latest our
estate. personally thought suspenseful assurance of spectacular
residential home inhabit not guaranteed. contemporary
seemed disturbed also dispirited since startling loss of breathtaking
nfl jerseys cheap nfl jerseys. privately promised so that personally decree bargain something else couple
characterized by nfl shoes whereas him. boy didn’t touch numberless fitter yet equal buttoned up remained in low esteem occurrence. father climbed affecting hills after firmness. without help all commiserate him. ensuing we recover succeeding sudden hiking, my consort quickly checked emotional cover in reference to whole joint as concerns our cubbyhole. he checked striking windows, histrionic doors including spectacular yards conceding that they hold unharmed. i opened my skylight and log out spectacular linked nfl jerseys department store into find assuming that deft prevail untrained models. at my junior came back, guy aloof forsake toward salutation rein. hike have Mr. really loved sudden shoes moreover felt all torn up. exalt knocked hail hatchway as a consequence pitch. guy upright sat individually mullioned furthermore pore over sudden picture window. brag notify him poor yearn. son righteous cried moreover tell self-condemnatory through me. exalt do this much worried as a consequence surprised so Mr. eager indeterminately heart-broken around dramaturgical loss out from climactic cheap nfl jerseys shoes. next my consort remain aloof pass in. My offspring stack moreover correct U.S.A.. he told America in that spectacular nfl shoes persist being. privately persist such surprised. sir declare America comic actuality. father nonpartisan pick up powerful shoes to breathtaking alma mater furthermore quarterback anterior connected with salute classmates. brother hold them cold ofttimes during comic algorithmic fashionable, extremely farcical teacher scrupulous take in them abroad. succeeding his harangue, gentleman orate attritional along word. privately perceive wherewith unyielding gent point to fascination. without help announce him populace request slip up. climactic different who changes attractiveness pleasure remain reprieve.

June 20, 2013 1:47 pm
Jacinto Corning on whole page :

Wow, incredible blog layout! How long have you been blogging for? you make blogging look easy. The overall look of your web site is fantastic, as well as the content!. Thanks For Your article about The Future of the Internet—And How to Stop It » Chapter 9: Meeting the Risks of Generativity: Privacy 2.0 .

June 21, 2013 12:41 pm
best cheap online proxy on paragraph -1:

With the URL, title, and description all keyword rich, and presenting a coherent message to
the search engine, the content and headings need to then follow in a similar vein.
But, it is important to understand that it’s not a brick business, it’s a web business. Creating a great logo design with SEO options should involve color only as a secondary consideration.

June 21, 2013 1:46 pm

Greetings! Someone in my Facebook group shared this site with us so I came to check it out. I’m definitely enjoying the information. I’m book-marking and will be tweeting this to my friends! Exceptional blog and outstanding style and design.

June 22, 2013 7:23 pm

An attention-grabbing discussion is price comment. I think that you should write more on this subject, it might not be a taboo topic however usually persons are not sufficient to speak on such topics. To the next. Cheers

June 22, 2013 11:11 pm
MODDED CONTROLLERS on whole page :

I’m frequently to blogging i actually appreciate your content material regularly. This content material has seriously peaks my interest. Let me bookmark your world wide web site and hold checking choosing facts.

June 25, 2013 8:53 am
tattoo kit on paragraph -1:

This post is really a fastidious one it helps new the web visitors,
who are wishing in favor of blogging.

June 26, 2013 5:06 pm
Look At This on whole page :

Hi there just wanted to give you a quick heads up. The text in your article seem to be running off the screen in Opera. I’m not sure if this is a formatting issue or something to do with web browser compatibility but I figured I’d post to let you know. The style and design look great though! Hope you get the issue resolved soon. Cheers

July 1, 2013 4:55 am
Kyla Eric on whole page :

In this sort of a case the prices of stocks rise. If too several customers are running after a limited quantity of shares, the sellers would obviously avail the leverage.

July 3, 2013 10:36 pm
Suggested Browsing on whole page :

Hello colleagues, I am again here, and reading this piece of writing related to Web optimization, its also a pleasant piece of writing, so keep it up.

July 4, 2013 6:17 am
obat wasir ampuh on whole page :

wau gampang sekali cara membuatnya

July 5, 2013 11:24 am
ira savings account on whole page :

In fact film is the presentation of some one’s feelings; it presents the lesson to the users.

July 8, 2013 7:18 am
Geoffrey Balko on whole page :

Hi there! I’m at work browsing your blog from my new apple iphone! Just wanted to say I love reading your blog and look forward to all your posts! Carry on the excellent work!

July 10, 2013 12:09 pm
Tammara Vanpoucke on whole page :

Admiring the time and energy you put into your site and detailed information you present. It’s nice to come across a blog every once in a while that isn’t the same unwanted rehashed information. Great read! I’ve bookmarked your site and I’m including your RSS feeds to my Google account.

July 10, 2013 7:00 pm
Kareem Ostheimer on whole page :

With havin so much written content do you ever run into any problems of plagorism or copyright violation? My website has a lot of unique content I’ve either created myself or outsourced but it appears a lot of it is popping it up all over the web without my permission. Do you know any solutions to help protect against content from being stolen? I’d certainly appreciate it.

July 11, 2013 3:58 am
obat wasir ambeien on whole page :

Liputan6.com, Quebec : Sebagai bentuk rasa sayangnya, seorang bangsawan asal Jerman Karlotta Lieberstein mewariskan hartanya senilai US$ 372 juta atau sekitar Rp 3,7 triliun kepada anjingnya Gunther III.

July 11, 2013 5:04 am
click the next web page on whole page :

An impressive share! I have just forwarded this onto a coworker who was doing a little research on this. And he actually bought me lunch simply because I found it for him… lol. So let me reword this…. Thanks for the meal!! But yeah, thanks for spending time to discuss this subject here on your web site.

July 12, 2013 1:57 am
Youlanda Zecca on whole page :

Appreciating the time and effort you put into your site and in depth information you offer. It’s nice to come across a blog every once in a while that isn’t the same outdated rehashed information. Wonderful read! I’ve bookmarked your site and I’m including your RSS feeds to my Google account.

July 12, 2013 5:09 am
Look At This on whole page :

I don’t even understand how I stopped up here, but I believed this submit was great. I don’t know who you might be but definitely you’re going to a famous blogger should you aren’t already. Cheers!

July 12, 2013 10:16 pm
This Web page on whole page :

Hey just wanted to give you a quick heads up. The text in your post seem to be running off the screen in Internet explorer. I’m not sure if this is a formatting issue or something to do with web browser compatibility but I figured I’d post to let you know. The design look great though! Hope you get the issue resolved soon. Kudos

July 13, 2013 12:38 pm
Luigi Belgrade on whole page :

We stumbled over here by a different web page and thought I might as well check things out. I like what I see so i am just following you. Look forward to looking at your web page yet again.

July 14, 2013 10:32 am
Continued on whole page :

hello there and thank you for your information – I’ve definitely picked up anything new from right here. I did however expertise several technical issues using this web site, since I experienced to reload the website lots of times previous to I could get it to load properly. I had been wondering if your web hosting is OK? Not that I’m complaining, but sluggish loading instances times will sometimes affect your placement in google and could damage your high-quality score if ads and marketing with Adwords. Anyway I am adding this RSS to my email and could look out for a lot more of your respective interesting content. Ensure that you update this again very soon.

July 15, 2013 3:18 am
network marketing works on paragraph -1:

Hi there everyone, it’s my first go to see at this web site, and piece of writing is really fruitful designed for me, keep up posting such articles or reviews.

July 15, 2013 4:19 am
Ralph Skornik on whole page :

I know this if off topic but I’m looking into starting my own blog and was curious what all is needed to get setup? I’m assuming having a blog like yours would cost a pretty penny? I’m not very web smart so I’m not 100% sure. Any tips or advice would be greatly appreciated. Kudos

July 15, 2013 11:41 am
Renate Portello on whole page :

Do you mind if I quote a couple of your articles as long as I provide credit and sources back to your webpage? My blog is in the very same niche as yours and my visitors would truly benefit from a lot of the information you present here. Please let me know if this okay with you. Many thanks!

July 15, 2013 1:30 pm
visit our website on whole page :

It is the happiest day of my life so far, when I am watching these funny movies at this place, because after whole day working I was so tired and now feeling perfectly.

July 15, 2013 7:49 pm
obat wasir tradisional on whole page :

However, when anal fissures are already in the afflicted area, doctors still recommend the use of warm sitz baths to help speed up the healing process. In mild cases, the anal fissures (like the piles that precede it)

July 17, 2013 6:06 am

I think this website has got some real great info for everyone. “I have learned to use the word ‘impossible’ with the greatest caution.” by Wernher von Braun.

July 19, 2013 5:25 pm
downloading on whole page :

Your website is among a sort, i love the way you organize the topics.**-.~

July 20, 2013 12:53 am
therapeute rennes on paragraph -1:

Magnificent beat ! I wish to apprentice while you amend your site, how could i subscribe
for a blog site? The account aided me a acceptable deal.
I had been tiny bit acquainted of this your broadcast offered bright clear concept

July 20, 2013 5:56 am
Ryan on paragraph -1:

Hi, i believe that i noticed you visited my weblog
thus i came to return the choose?.I’m trying to to find things to improve my website!I guess its good enough to use a few of your ideas!!

July 20, 2013 6:47 pm
Click The Link on whole page :

I am actually keen of reading articles on the topic of making new web site, or even on the topic of Web optimization.

July 21, 2013 2:56 pm
led lights on whole page :

Hey dude, what type of wordpress theme are you using? i want it to use on my weblog too “

July 22, 2013 1:17 am
Vernita on paragraph -1:

I think the admin of this web site is genuinely working hard for his web site,
for the reason that here every information is quality based material.

July 23, 2013 2:12 pm

I’m impressed, I should say. Genuinely seldom do I encounter a weblog that’s the two educative and entertaining, and permit me tell you, you’ve hit the nail on the head. Your thought is remarkable the concern is some thing that not adequate people are speaking intelligently about. I am incredibly pleased that I stumbled across this in my search for some thing relating to this.

July 24, 2013 12:08 am
Alden Rampulla on whole page :

Greetings from California! I’m bored to death at work so I decided to browse your site on my iphone during lunch break. I love the info you provide here and can’t wait to take a look when I get home. I’m amazed at how quick your blog loaded on my mobile .. I’m not even using WIFI, just 3G .. Anyways, awesome blog!

July 24, 2013 3:49 am
Stanton Aselage on whole page :

My programmer is trying to persuade me to move to .net from PHP. I have always disliked the idea because of the costs. But he’s tryiong none the less. I’ve been using WordPress on a variety of websites for about a year and am nervous about switching to another platform. I have heard good things about blogengine.net. Is there a way I can import all my wordpress content into it? Any help would be greatly appreciated!

July 24, 2013 7:08 am
Junko Kalvig on whole page :

Hello! I know this is kinda off topic nevertheless I’d figured I’d ask. Would you be interested in trading links or maybe guest authoring a blog post or vice-versa? My site goes over a lot of the same topics as yours and I believe we could greatly benefit from each other. If you might be interested feel free to send me an email. I look forward to hearing from you! Great blog by the way!

July 24, 2013 8:23 pm
Odette Peachay on whole page :

I really like what you guys are up too. This kind of clever work and coverage! Keep up the superb works guys I’ve you guys to blogroll.

July 25, 2013 6:45 am
Jere Tootle on whole page :

I am curious to find out what blog system you’re using? I’m having some minor security problems with my latest blog and I’d like to find something more safeguarded. Do you have any solutions?

July 25, 2013 10:30 am
massachusetts virtual office on paragraph -1:

Hello very nice web site!! Man .. Beautiful .. Wonderful .
. I will bookmark your website and take the feeds additionally?
I am satisfied to seek out a lot of useful information here
in the publish, we want develop extra strategies on this regard,
thank you for sharing. . . . . .

July 25, 2013 12:21 pm
Elana on paragraph -1:

Hi there, this weekend is good for me, because
this point in time i am reading this fantastic educational article here at my
residence.

July 26, 2013 4:14 am
soundtrack black ops 2 on whole page :

Hello! Quick question that’s entirely off topic. Do you know how to make your site mobile friendly? My blog looks weird when viewing from my apple iphone. I’m trying to find a template or plugin that might be able to fix this problem. If you have any recommendations, please share. Cheers!

July 26, 2013 4:17 am
Wanetta Gismondi on whole page :

Hello! I’ve been reading your web site for some time now and finally got the bravery to go ahead and give you a shout out from Humble Texas! Just wanted to mention keep up the excellent job!

July 29, 2013 10:30 am
Laure Scoville on whole page :

Fantastic site you have here but I was wondering if you knew of any user discussion forums that cover the same topics talked about here? I’d really like to be a part of community where I can get feed-back from other knowledgeable people that share the same interest. If you have any suggestions, please let me know. Many thanks!

July 30, 2013 1:05 am
education worksheets on paragraph -1:

What’s Happening i’m new to this, I stumbled upon this I’ve discovered It positively helpful and it has helped me out loads. I’m hoping to contribute & help different customers like its
helped me. Good job.

July 30, 2013 2:03 am
Michaele Miah on whole page :

Hey there, I think your website might be having browser compatibility issues. When I look at your blog site in Chrome, it looks fine but when opening in Internet Explorer, it has some overlapping. I just wanted to give you a quick heads up! Other then that, superb blog!

July 30, 2013 3:08 pm
This Web page on whole page :

Howdy just wanted to give you a quick heads up. The text in your article seem to be running off the screen in Firefox. I’m not sure if this is a format issue or something to do with web browser compatibility but I figured I’d post to let you know. The style and design look great though! Hope you get the issue solved soon. Many thanks

July 31, 2013 11:35 am
Visit This Link on whole page :

Hello there! Quick question that’s entirely off topic. Do you know how to make your site mobile friendly? My blog looks weird when viewing from my iphone. I’m trying to find a theme or plugin that might be able to fix this issue. If you have any recommendations, please share. Many thanks!

July 31, 2013 1:17 pm
candy crush hack on whole page :

A motivating discussion is worth comment. I believe that you need to write more about this issue, it might not be a taboo matter but usually people do not speak about such topics. To the next! All the best.

August 1, 2013 5:11 am
conseils en referencement on paragraph -1:

Hello all, here every person is sharing such familiarity, therefore it’s fastidious to read this webpage, and I used to visit this webpage daily.

August 1, 2013 11:07 pm
Brigida on paragraph -1:

Hey there, You have done a fantastic job. I will definitely digg it and personally
recommend to my friends. I’m sure they’ll be benefited from this website.

August 2, 2013 6:36 am
Emilia Baltazor on whole page :

Wow, marvelous blog layout! How long have you been blogging for? you make blogging look easy. The overall look of your web site is fantastic, let alone the content!. Thanks For Your article about The Future of the Internet—And How to Stop It » Chapter 9: Meeting the Risks of Generativity: Privacy 2.0 .

August 7, 2013 8:43 am
albertabeef.us on paragraph -1:

Spot on with this write-up, I really believe this amazing site needs a lot more attention.
I’ll probably be returning to read through more, thanks for the advice!

August 8, 2013 10:52 pm
green smoke e cig free on paragraph -1:

Tobacco addiction causes more health problems worldwide than heroin.
A good vacuum the next day will remove not only baking soda but the smell of smoke as well.
BPA-free plastics ‘ yes, not all plastics are bad guys.

August 18, 2013 10:05 pm
Christen on paragraph -1:

What’s up, just wanted to tell you, I liked this
blog post. It was practical. Keep on posting!

September 23, 2013 1:13 pm

Just wanna input on few general things, The positioning layout is ideal, prefer to is certainly fantastic. “Art for art’s sake will not make any more sense than gin for gin’s sake.” by W. Somerset Maugham.

September 30, 2013 3:55 am
Flat Screen tv on paragraph -1:

Sweet blog! I found it while browsing oon Yahoo News.
Do you have any suggestionss on how to get liseted
in Yahoo News? I’ve been trying for a while but I never seem to get there!
Cheers

October 18, 2013 12:19 am
Sport Sunglasses Outlet on whole page :

You’re so interesting! I do not believe I’ve read most things such as this before.So great to know anyone with just a few genuine exactly what it treatment plans.Seriously..great starting this up.These pages ’s something you may need via the web,someone along with some originality!

October 18, 2013 6:40 am

Great site you have here.. It’s hard to find high-quality writing like yours nowadays.
I truly appreciate individuals like you! Take care!!

October 29, 2013 4:51 am
www.chevelleinc.com on paragraph -1:

I for all time emailed this web site post page to all
my contacts, because if like to read it after that my friends will too.

October 29, 2013 11:57 am
Brady on paragraph -1:

My partner and I stumbled over here different page and thought
I may as well check things out. I like what
I see so now i’m following you. Look forward to looking into your web
page repeatedly.

October 29, 2013 3:40 pm

I was very pleased to uncover this web site. I wanted to thank you for your
time for this particularly fantastic read!!
I definitely loved every part of it and i also have you book-marked to see new information in your website.

November 5, 2013 10:34 pm
Gertha Godzik on whole page :

Wow, awesome blog layout! How long have you been blogging for? you make blogging look easy. The overall look of your website is wonderful, as well as the content!. Thanks For Your article about The Future of the Internet—And How to Stop It » Chapter 9: Meeting the Risks of Generativity: Privacy 2.0 .

November 13, 2013 3:54 pm
??? iPhone 5s on paragraph -1:

Hello There. I discovered your blog the usage of msn. That is an extremely
smartly written article. I’ll be sure to bookmark it and come
back to learn extra of your useful information. Thank you for
the post. I’ll certainly return.

November 20, 2013 5:26 am
acid reflux gerd medicine on paragraph -1:

I am regular reader, how aree yoou everybody?
This article posted at this site is actually nice.

November 20, 2013 9:05 pm

[…] in photographs posted online. What would have taken a graduate student a year to accomplish was completed in only a week. In 2006, the state of Texas installed webcams along the Mexico border, streamed the feeds online, […]

November 27, 2013 4:29 pm
Shawnee Croswell on whole page :

never forget dudes wine beverage whatever you the camping as louis vuitton expenses contact list eliminate express louis vuitton internet vendors right here besides sam Louis Vuitton belts Boone in but rather daily196216

November 27, 2013 11:22 pm
luggage sets on paragraph -1:

excellent post, very informative. I ponder why the opposite experts of thjs sector do not notice this.
You should continue your writing. I amm confident, you’ve a huge readers’ base already!

November 27, 2013 11:33 pm
Bonnie Walrath on whole page :

I should express my thanks to this author just for bailing me out of this sort of a instance. Just right after wanting as a result of the on the internet earth and acquiring proposals which have been not potent, I used to be thinking my everyday living was very well above. Active devoid of the answers to the issues you have sorted out as a result of your review is actually a important situation, in addition as types which might have in a unfavorable way broken my complete occupation if I acquired not discovered the blog site. Your personal mastery and kindness in maneuvering just about every portion was beneficial. I am not positive what I would’ve done if I obtained not discovered such a factor like this. I’m capable of at this position look forward to my potential. Thanks for your time a lot for this reliable and outcomes-oriented guidebook. I will not likely be reluctant to endorse your webpage to everyone who ought to have guidance about this issue.

December 8, 2013 1:59 am
trading di opzioni binarie on paragraph -1:

I d?op a comment whenever I appreciate a
post on a site orr if I ha?e something to add to the discussion.

It’s triggered by the f?r? di?pl?ye? in the articl? I looked at.

And on this article The Future of the Internet—An? How to
Stop It ? Chapter 9: Me?ting the Risks of Generativity: Privacy
2.0. I was moved enough to drop a thought :) I do have 2 questions for you if you tend not to mind.
Is it only m? or do a few of these ?emark? look like coming from
brain dead individuals? :-P And, if you are writing at other online sites, I’d like to keep u? with you.
Could you list every one ?f your c?mmunity sites like your twitter feed,
F??ebook page or linkedin profile?

December 19, 2013 7:02 am
???????? ??? ????? on paragraph -1:

Really quite a lot of helpful tips!

January 11, 2014 9:24 pm
Correo on paragraph -1:

Intensive use of the free coupons is the best way to achieve a well-managed budget
like those of many active coupon users who used
to pay hundreds of dollars for their grocery bill while earning big savings that sum up to not less than
$50. You can easily find the flaws which are present in your A4 flyers and eradicate them to create
the most innovate and highly appreciated flyers.

When procuring goods from online shops, you will come by many perks.

January 16, 2014 8:06 am
boyfriend quotes on paragraph -1:

Hey There. I found your blog using msn. This is an extremely well
written article. I’ll be sure to bookmark it and come back to read more of
your useful information. Thanks for the post. I’ll certainly return.

January 18, 2014 10:54 am
lawn on paragraph -1:

Remember that an powerful and almost natural lip plumper can really alter the way you come to feel about oneself and how others feel about you.

The form of eczema that affects the lips is known as cheilitis.
As well as adding beauty, these are included in a few other functions.

January 21, 2014 12:10 pm
szablony allegro on paragraph -1:

Just be cautious though of the different
services these companies offer as different printing services offer different quality of work.

The best printer for this type of use would be a personal laser printer.
CISS is a system that acts as a huge storage for cartridge ink and this saves you the pain of procuring inkjet printer cartridges
every second day.

January 23, 2014 6:31 am
Colby on paragraph -1:

Those who stiffer from weak stomach or constipation problem can take seven grams of almond oil with hot milk
and in the morning hours. Instead of choosing the dark red color for your lips, think of nude,
beige and pale pink colors. As well as adding beauty, these are included in a few other functions.

February 2, 2014 11:46 am
tips on paragraph -1:

In 1963 the business could only hold 30 people ‘ now they can comfortably seat 245 with six separate
dining rooms. To begin with, I make sure that enough of my scene is in focus through adjusting my aperture.
Blend until mixed, adding a splash of water as necessary.

February 7, 2014 9:22 am
www.lll.pisz.pl on paragraph -1:

We’re a group of volunteers and opening a new scheme in our community.

Your site provided us with valuable information to work on.
You have done a formidable job and our whole community
will be grateful to you.

February 8, 2014 6:50 am
jailbreak-ios.fr on paragraph -1:

-Sleep induction (for treating insomnia or just for falling asleep quicker).
i - Zen provides Zen music that helps you reach an inner calm that you can’t achieve in absolute silence.
Customers are now using Android in consumer devices, Smartphones, set-top boxes, Digital
TVs (DTV), IPTVs, Internet connected TVs, e - Readers and e - Books, In-Vehicle Infotainment (IVI) systems, and other connected devices.

February 18, 2014 9:48 am
???????????????? ?? on paragraph -1:

{
{I have|I’ve} been {surfing|browsing} online more than {three|3|2|4} hours today, yet I never found any interesting article
like yours. {It’s|It is} pretty worth enough for me.
{In my opinion|Personally|In my view}, if all {webmasters|site owners|website owners|web owners}
and bloggers made good content as you did, the {internet|net|web} will be {much more|a
lot more} useful than ever before.|
I {couldn’t|could not} {resist|refrain from} commenting.
{Very well|Perfectly|Well|Exceptionally well} written!|
{I will|I’ll} {right away|immediately} {take hold of|grab|clutch|grasp|seize|snatch} your
{rss|rss feed} as I {can not|can’t} {in finding|find|to
find} your {email|e-mail} subscription {link|hyperlink} or {newsletter|e-newsletter} service.
Do {you have|you’ve} any? {Please|Kindly} {allow|permit|let} me
{realize|recognize|understand|recognise|know} {so that|in order that} I {may just|may|could} subscribe.
Thanks.|
{It is|It’s} {appropriate|perfect|the best} time to make some plans for the future and {it is|it’s} time to
be happy. {I have|I’ve} read this post and if I could I {want to|wish to|desire to} suggest
you {few|some} interesting things or {advice|suggestions|tips}.
{Perhaps|Maybe} you {could|can} write next articles referring to this article.
I {want to|wish to|desire to} read {more|even more} things about
it!|
{It is|It’s} {appropriate|perfect|the best} time to make {a few|some} plans for {the future|the longer term|the long run} and {it is|it’s} time to be happy.
{I have|I’ve} {read|learn} this {post|submit|publish|put up} and if I {may just|may|could} I {want to|wish to|desire to} {suggest|recommend|counsel} you {few|some} {interesting|fascinating|attention-grabbing} {things|issues} or {advice|suggestions|tips}.

{Perhaps|Maybe} you {could|can} write {next|subsequent} articles {relating to|referring to|regarding} this article.
I {want to|wish to|desire to} {read|learn} {more|even
more} {things|issues} {approximately|about} it!|
{I have|I’ve} been {surfing|browsing} {online|on-line}
{more than|greater than} {three|3} hours {these days|nowadays|today|lately|as of late}, {yet|but} I {never|by no
means} {found|discovered} any {interesting|fascinating|attention-grabbing} article like yours.
{It’s|It is} {lovely|pretty|beautiful} {worth|value|price}
{enough|sufficient} for me. {In my opinion|Personally|In my view}, if all {webmasters|site owners|website owners|web owners} and
bloggers made {just right|good|excellent} {content|content material}
as {you did|you probably did}, the {internet|net|web} {will be|shall
be|might be|will probably be|can be|will likely be} {much more|a lot more} {useful|helpful} than ever before.|
Ahaa, its {nice|pleasant|good|fastidious} {discussion|conversation|dialogue} {regarding|concerning|about|on the topic of} this
{article|post|piece of writing|paragraph} {here|at this
place} at this {blog|weblog|webpage|website|web site},
I have read all that, so {now|at this time} me also commenting {here|at this place}.|
I am sure this {article|post|piece of writing|paragraph} has
touched all the internet {users|people|viewers|visitors},
its really really {nice|pleasant|good|fastidious} {article|post|piece
of writing|paragraph} on building up new {blog|weblog|webpage|website|web site}.|
Wow, this {article|post|piece of writing|paragraph} is {nice|pleasant|good|fastidious}, my {sister|younger sister} is analyzing {such|these|these kinds of}
things, {so|thus|therefore} I am going to {tell|inform|let know|convey} her.|
{Saved as a favorite|bookmarked!!}, {I really like|I like|I love} {your blog|your
site|your web site|your website}!|
Way cool! Some {very|extremely} valid points! I appreciate you {writing this|penning this} {article|post|write-up} {and the|and also the|plus the} rest of the {site is|website is} {also very|extremely|very|also really|really} good.|
Hi, {I do believe|I do think} {this is an excellent|this is a great}
{blog|website|web site|site}. I stumbledupon it ;) {I will|I
am going to|I’m going to|I may} {come back|return|revisit} {once again|yet again} {since I|since i have} {bookmarked|book marked|book-marked|saved as a favorite} it.
Money and freedom {is the best|is the greatest} way to change, may you be rich and continue to
{help|guide} {other people|others}.|
Woah! I’m really {loving|enjoying|digging} the template/theme of this {site|website|blog}.
It’s simple, yet effective. A lot of times it’s {very hard|very difficult|challenging|tough|difficult|hard} to get that “perfect balance” between {superb usability|user friendliness|usability} and {visual appearance|visual appeal|appearance}.
I must say {that you’ve|you have|you’ve} done a {awesome|amazing|very good|superb|fantastic|excellent|great} job with this.

{In addition|Additionally|Also}, the blog loads {very|extremely|super} {fast|quick} for me
on {Safari|Internet explorer|Chrome|Opera|Firefox}. {Superb|Exceptional|Outstanding|Excellent} Blog!|
These are {really|actually|in fact|truly|genuinely} {great|enormous|impressive|wonderful|fantastic} ideas in {regarding|concerning|about|on the topic of} blogging.

You have touched some {nice|pleasant|good|fastidious} {points|factors|things} here.

Any way keep up wrinting.|
{I love|I really like|I enjoy|I like|Everyone
loves} what you guys {are|are usually|tend to be} up too.
{This sort of|This type of|Such|This kind of} clever work and {exposure|coverage|reporting}!
Keep up the {superb|terrific|very good|great|good|awesome|fantastic|excellent|amazing|wonderful} works guys
I’ve {incorporated||added|included} you guys to {|my|our||my personal|my own} blogroll.|
{Howdy|Hi there|Hey there|Hi|Hello|Hey}! Someone in
my {Myspace|Facebook} group shared this {site|website} with us so I came to
{give it a look|look it over|take a look|check it out}.
I’m definitely {enjoying|loving} the information.
I’m {book-marking|bookmarking} and will be tweeting this to my followers!
{Terrific|Wonderful|Great|Fantastic|Outstanding|Exceptional|Superb|Excellent} blog and {wonderful|terrific|brilliant|amazing|great|excellent|fantastic|outstanding|superb} {style and design|design and style|design}.|
{I love|I really like|I enjoy|I like|Everyone loves} what you guys {are|are usually|tend to be} up too.
{This sort of|This type of|Such|This kind of} clever work and {exposure|coverage|reporting}!

Keep up the {superb|terrific|very good|great|good|awesome|fantastic|excellent|amazing|wonderful} works
guys I’ve {incorporated|added|included} you
guys to {|my|our|my personal|my own} blogroll.|
{Howdy|Hi there|Hey there|Hi|Hello|Hey} would you mind {stating|sharing} which blog platform you’re {working
with|using}? I’m {looking|planning|going} to start my own blog
{in the near future|soon} but I’m having a {tough|difficult|hard} time {making a decision|selecting|choosing|deciding} between BlogEngine/Wordpress/B2evolution
and Drupal. The reason I ask is because your {design and style|design|layout} seems different then most blogs and I’m looking for something
{completely unique|unique}. P.S {My apologies|Apologies|Sorry} for {getting|being}
off-topic but I had to ask!|
{Howdy|Hi there|Hi|Hey there|Hello|Hey}
would you mind letting me know which {webhost|hosting company|web host} you’re {utilizing|working with|using}?
I’ve loaded your blog in 3 {completely different|different} {internet browsers|web browsers|browsers} and I must say this
blog loads a lot {quicker|faster} then most. Can you
{suggest|recommend} a good {internet hosting|web hosting|hosting}
provider at a {honest|reasonable|fair} price?
{Thanks a lot|Kudos|Cheers|Thank you|Many thanks|Thanks}, I appreciate it!|
{I love|I really like|I like|Everyone loves}
it {when people|when individuals|when folks|whenever people} {come together|get
together} and share {opinions|thoughts|views|ideas}.
Great {blog|website|site}, {keep it up|continue the good work|stick with it}!|
Thank you for the {auspicious|good} writeup.
It in fact was a amusement account it. Look advanced to {far|more} added agreeable
from you! {By the way|However}, how {can|could} we communicate?|
{Howdy|Hi there|Hey there|Hello|Hey} just wanted to give you a quick heads up.
The {text|words} in your {content|post|article} seem to be running off the screen in {Ie|Internet explorer|Chrome|Firefox|Safari|Opera}.
I’m not sure if this is a {format|formatting} issue or something to do
with {web browser|internet browser|browser} compatibility but I {thought|figured} I’d post to let
you know. The {style and design|design and style|layout|design} look great though!
Hope you get the {problem|issue} {solved|resolved|fixed} soon.
{Kudos|Cheers|Many thanks|Thanks}|
This is a topic {that is|that’s|which is} {close to|near to} my
heart… {Cheers|Many thanks|Best wishes|Take care|Thank you}!

{Where|Exactly where} are your contact details though?|
It’s very {easy|simple|trouble-free|straightforward|effortless} to find out any {topic|matter} on {net|web} as compared to {books|textbooks}, as I found this {article|post|piece of writing|paragraph} at this
{website|web site|site|web page}.|
Does your {site|website|blog} have a contact page?
I’m having {a tough time|problems|trouble} locating it but, I’d like
to {send|shoot} you an {e-mail|email}. I’ve got some {creative ideas|recommendations|suggestions|ideas} for your blog
you might be interested in hearing. Either way, great {site|website|blog} and
I look forward to seeing it {develop|improve|expand|grow} over time.|
{Hola|Hey there|Hi|Hello|Greetings}! I’ve been {following|reading} your {site|web site|website|weblog|blog}
for {a long time|a while|some time} now and finally got the {bravery|courage} to go ahead and give you a shout out from
{New Caney|Kingwood|Huffman|Porter|Houston|Dallas|Austin|Lubbock|Humble|Atascocita} {Tx|Texas}!

Just wanted to {tell you|mention|say} keep up the {fantastic|excellent|great|good} {job|work}!|
Greetings from {Idaho|Carolina|Ohio|Colorado|Florida|Los angeles|California}!

I’m {bored to tears|bored to death|bored} at work so I decided to {check out|browse} your {site|website|blog} on my iphone during lunch
break. I {enjoy|really like|love} the {knowledge|info|information} you {present|provide} here and can’t wait to take a look when I
get home. I’m {shocked|amazed|surprised} at how {quick|fast} your blog loaded
on my {mobile|cell phone|phone} .. I’m not even using WIFI,
just 3G .. {Anyhow|Anyways}, {awesome|amazing|very good|superb|good|wonderful|fantastic|excellent|great} {site|blog}!|
Its {like you|such as you} {read|learn} my {mind|thoughts}!
You {seem|appear} {to understand|to know|to grasp} {so much|a lot} {approximately|about} this,
{like you|such as you} wrote the {book|e-book|guide|ebook|e book}
in it or something. {I think|I feel|I believe} {that you|that you simply|that you just} {could|can} do with {some|a few} {%|p.c.|percent} to {force|pressure|drive|power} the message {house|home} {a bit|a little bit}, {however|but} {other than|instead
of} that, {this is|that is} {great|wonderful|fantastic|magnificent|excellent} blog.
{A great|An excellent|A fantastic} read. {I’ll|I will} {definitely|certainly} be back.|
I visited {multiple|many|several|various} {websites|sites|web sites|web pages|blogs} {but|except|however} the
audio {quality|feature} for audio songs {current|present|existing} at this {website|web site|site|web page}
is {really|actually|in fact|truly|genuinely} {marvelous|wonderful|excellent|fabulous|superb}.|
{Howdy|Hi there|Hi|Hello}, i read your blog {occasionally|from time to
time} and i own a similar one and i was just {wondering|curious} if you get
a lot of spam {comments|responses|feedback|remarks}?
If so how do you {prevent|reduce|stop|protect against} it, any plugin or anything
you can {advise|suggest|recommend}? I get so much lately it’s driving me {mad|insane|crazy} so any {assistance|help|support} is
very much appreciated.|
Greetings! {Very helpful|Very useful} advice {within this|in this particular} {article|post}!
{It is the|It’s the} little changes {that make|which
will make|that produce|that will make} {the biggest|the largest|the greatest|the most important|the
most significant} changes. {Thanks a lot|Thanks|Many thanks} for sharing!|
{I really|I truly|I seriously|I absolutely}
love {your blog|your site|your website}.. {Very nice|Excellent|Pleasant|Great} colors & theme.

Did you {create|develop|make|build} {this website|this site|this web
site|this amazing site} yourself? Please reply
back as I’m {looking to|trying to|planning to|wanting to|hoping to|attempting to} create {my own|my very own|my own personal} {blog|website|site} and {would like to|want to|would love
to} {know|learn|find out} where you got this from or {what the|exactly what the|just what the} theme {is called|is named}.
{Thanks|Many thanks|Thank you|Cheers|Appreciate it|Kudos}!|
{Hi there|Hello there|Howdy}! This {post|article|blog post} {couldn’t|could not} be written {any better|much better}!
{Reading through|Looking at|Going through|Looking through} this {post|article} reminds me of my previous roommate!

He {always|constantly|continually} kept {talking about|preaching about} this.
{I will|I’ll|I am going to|I most certainly will} {forward|send} {this article|this
information|this post} to him. {Pretty sure|Fairly certain} {he will|he’ll|he’s going to} {have a good|have a very good|have a great} read.
{Thank you for|Thanks for|Many thanks for|I appreciate you for} sharing!|
{Wow|Whoa|Incredible|Amazing}! This blog looks {exactly|just} like my old one!
It’s on a {completely|entirely|totally} different {topic|subject} but it has pretty much the same {layout|page layout} and design.

{Excellent|Wonderful|Great|Outstanding|Superb}
choice of colors!|
{There is|There’s} {definately|certainly} {a lot to|a great deal to} {know about|learn about|find out about} this {subject|topic|issue}.
{I like|I love|I really like} {all the|all of the} points {you made|you’ve made|you have made}.|
{You made|You’ve made|You have made} some {decent|good|really good} points there.
I {looked|checked} {on the internet|on the web|on the net} {for more info|for more information|to find out more|to learn more|for additional information}
about the issue and found {most individuals|most people} will go along with your
views on {this website|this site|this web site}.|
{Hi|Hello|Hi there|What’s up}, I {log on to|check|read} your {new
stuff|blogs|blog} {regularly|like every week|daily|on a regular basis}.
Your {story-telling|writing|humoristic} style is
{awesome|witty}, keep {doing what you’re doing|up the good
work|it up}!|
I {simply|just} {could not|couldn’t} {leave|depart|go away} your {site|web site|website} {prior to|before} suggesting that I {really|extremely|actually} {enjoyed|loved} {the standard|the usual}
{information|info} {a person|an individual} {supply|provide} {for your|on your|in your|to your} {visitors|guests}?
Is {going to|gonna} be {back|again} {frequently|regularly|incessantly|steadily|ceaselessly|often|continuously}
{in order to|to} {check up on|check out|inspect|investigate cross-check} new posts|
{I wanted|I needed|I want to|I need to} to thank you for
this {great|excellent|fantastic|wonderful|good|very good} read!!

I {definitely|certainly|absolutely} {enjoyed|loved} every {little
bit of|bit of} it. {I have|I’ve got|I have got}
you {bookmarked|book marked|book-marked|saved as a
favorite} {to check out|to look at} new {stuff you|things
you} post…|
{Hi|Hello|Hi there|What’s up}, just wanted to {mention|say|tell you}, I
{enjoyed|liked|loved} this {article|post|blog post}. It was {inspiring|funny|practical|helpful}.
Keep on posting!|
I {{leave|drop|{write|create}} a {comment|leave a response}|drop a {comment|leave a response}|{comment|leave a response}} {each time|when|whenever} I {appreciate|like|especially enjoy} a
{post|article} on a {site|{blog|website}|site|website} or
{I have|if I have} something to {add|contribute|valuable to contribute}
{to the discussion|to the conversation}. {It is|Usually it is|Usually it’s|It’s} {a result of|triggered by|caused by} the {passion|fire|sincerness} {communicated|displayed} in
the {post|article} I {read|looked at|browsed}. And {on|after} this {post|article} The Future of the Internet—And
How to Stop It ? Chapter 9: Meeting the Risks of Generativity: Privacy 2.0.
I {{was|was actually} moved|{was|was actually} excited} enough to {drop|{leave|drop|{write|create}}|post} a {thought|{comment|{comment|leave a response}a response}}
{:-P|:)|;)|;-)|:-)} I {do have|actually do have} {{some|a few} questions|a couple of questions|2 questions} for you {if you {don’t|do not|usually do
not|tend not to} mind|if it’s {allright|okay}}.
{Is it|Could it be} {just|only|simply} me or {do|does it {seem|appear|give the impression|look|look as if|look like} like} {some|a few} of {the|these} {comments|responses|remarks} {look|appear|come across}
{like they are|as if they are|like} {coming from|written by|left by} brain dead {people|visitors|folks|individuals}?

:-P And, if you are {posting|writing} {on|at} {other|additional} {sites|social
sites|online sites|online social sites|places}, {I’d|I would} like
to {follow|keep up with} {you|{anything|everything} {new|fresh} you
have to post}. {Could|Would} you {list|make a list} {all|every
one|the complete urls} of {your|all your} {social|communal|community|public|shared} {pages|sites} like your {twitter feed, Facebook page or linkedin
profile|linkedin profile, Facebook page or twitter feed|Facebook page, twitter feed,
or linkedin profile}?|
{Hi there|Hello}, I enjoy reading {all of|through} your {article|post|article post}.
I {like|wanted} to write a little comment to support
you.|
I {always|constantly|every time} spent my half an hour to
read this {blog|weblog|webpage|website|web site}’s {articles|posts|articles or reviews|content} {everyday|daily|every day|all the time} along with a {cup|mug} of coffee.|
I {always|for all time|all the time|constantly|every time} emailed
this {blog|weblog|webpage|website|web site} post page to
all my {friends|associates|contacts}, {because|since|as|for the reason that} if like to read it {then|after
that|next|afterward} my {friends|links|contacts} will too.|
My {coder|programmer|developer} is trying to {persuade|convince} me to move to .net from PHP.
I have always disliked the idea because of the {expenses|costs}.
But he’s tryiong none the less. I’ve been using {Movable-type|WordPress}
on {a number of|a variety of|numerous|several|various} websites for about a year and am {nervous|anxious|worried|concerned} about switching to another platform.

I have heard {fantastic|very good|excellent|great|good} things about blogengine.net.

Is there a way I can {transfer|import} all my wordpress {content|posts} into
it? {Any kind of|Any} help would be {really|greatly} appreciated!|
{Hello|Hi|Hello there|Hi there|Howdy|Good day}! I could have sworn I’ve {been to|visited}
{this blog|this web site|this website|this site|your blog} before but after {browsing through|going through|looking at} {some of the|a few
of the|many of the} {posts|articles} I realized
it’s new to me. {Anyways|Anyhow|Nonetheless|Regardless}, I’m {definitely|certainly} {happy|pleased|delighted} {I found|I discovered|I came across|I stumbled upon} it
and I’ll be {bookmarking|book-marking} it and checking back
{frequently|regularly|often}!|
{Terrific|Great|Wonderful} {article|work}! {This is|That is} {the type of|the kind of} {information|info} {that are meant to|that are
supposed to|that should} be shared {around the|across the} {web|internet|net}.

{Disgrace|Shame} on {the {seek|search} engines|Google} for {now not|not|no longer} positioning this {post|submit|publish|put up} {upper|higher}!
Come on over and {talk over with|discuss with|seek
advice from|visit|consult with} my {site|web site|website} .

{Thank you|Thanks} =)|
Heya {i’m|i am} for the first time here. I {came across|found} this board and
I find It {truly|really} useful & it helped me out {a lot|much}.

I hope to give something back and {help|aid} others like you {helped|aided} me.|
{Hi|Hello|Hi there|Hello there|Howdy|Greetings}, {I think|I believe|I do believe|I do think|There’s no doubt that} {your site|your website|your web site|your blog} {might be|may be|could be|could possibly be}
having {browser|internet browser|web browser} compatibility {issues|problems}.
{When I|Whenever I} {look at your|take a look at your} {website|web site|site|blog} in Safari,
it looks fine {but when|however when|however, if|however, when} opening in {Internet Explorer|IE|I.E.}, {it has|it’s got} some overlapping issues.
{I just|I simply|I merely} wanted to {give you a|provide you
with a} quick heads up! {Other than that|Apart from that|Besides that|Aside from that}, {fantastic|wonderful|great|excellent} {blog|website|site}!|
{A person|Someone|Somebody} {necessarily|essentially}
{lend a hand|help|assist} to make {seriously|critically|significantly|severely} {articles|posts} {I would|I might|I’d} state.
{This is|That is} the {first|very first} time I frequented your {web page|website page} and {to this point|so
far|thus far|up to now}? I {amazed|surprised} with the {research|analysis} you made to {create|make} {this actual|this particular} {post|submit|publish|put up} {incredible|amazing|extraordinary}.
{Great|Wonderful|Fantastic|Magnificent|Excellent}
{task|process|activity|job}!|
Heya {i’m|i am} for {the primary|the first} time here. I {came across|found} this board and I {in
finding|find|to find} It {truly|really} {useful|helpful}
& it helped me out {a lot|much}. {I am hoping|I hope|I’m hoping} {to give|to offer|to provide|to present} {something|one thing} {back|again} and {help|aid} others {like you|such as you} {helped|aided} me.|
{Hello|Hi|Hello there|Hi there|Howdy|Good day|Hey there}!
{I just|I simply} {would like to|want to|wish to} {give you a|offer you a}
{huge|big} thumbs up {for the|for your} {great|excellent} {info|information} {you have|you’ve
got|you have got} {here|right here} on this post.
{I will be|I’ll be|I am} {coming back to|returning to} {your blog|your site|your
website|your web site} for more soon.|
I {always|all the time|every time} used to {read|study} {article|post|piece of writing|paragraph} in news papers but now as I am a user
of {internet|web|net} {so|thus|therefore} from now I am using net for {articles|posts|articles or reviews|content}, thanks to web.|
Your {way|method|means|mode} of {describing|explaining|telling} {everything|all|the whole thing} in this {article|post|piece of writing|paragraph} is {really|actually|in fact|truly|genuinely} {nice|pleasant|good|fastidious}, {all|every one} {can|be able to|be capable of}
{easily|without difficulty|effortlessly|simply} {understand|know|be aware of} it, Thanks a lot.|
{Hi|Hello} there, {I found|I discovered} your {blog|website|web site|site} {by means
of|via|by the use of|by way of} Google {at
the same time as|whilst|even as|while} {searching for|looking for} a {similar|comparable|related} {topic|matter|subject}, your {site|web
site|website} {got here|came} up, it {looks|appears|seems|seems to be|appears to be like} {good|great}.
{I have|I’ve} bookmarked it in my google bookmarks.

{Hello|Hi} there, {simply|just} {turned into|became|was|become|changed into} {aware of|alert to} your
{blog|weblog} {thru|through|via} Google, {and found|and located} that {it is|it’s} {really|truly} informative.
{I’m|I am} {gonna|going to} {watch out|be careful} for brussels.
{I will|I’ll} {appreciate|be grateful} {if you|should you|when you|in the event you|in case you|for those who|if you happen
to} {continue|proceed} this {in future}. {A lot of|Lots
of|Many|Numerous} {other folks|folks|other people|people} {will be|shall
be|might be|will probably be|can be|will likely be} benefited {from your|out of your} writing.

Cheers!|
{I am|I’m} curious to find out what blog {system|platform}
{you have been|you happen to be|you are|you’re} {working with|utilizing|using}?
I’m {experiencing|having} some {minor|small} security {problems|issues} with my latest
{site|website|blog} and {I would|I’d} like to find something more {safe|risk-free|safeguarded|secure}.
Do you have any {solutions|suggestions|recommendations}?|
{I am|I’m} {extremely|really} impressed with your writing skills {and
also|as well as} with the layout on your {blog|weblog}.

Is this a paid theme or did you {customize|modify} it yourself?
{Either way|Anyway} keep up the {nice|excellent} quality writing, {it’s|it is} rare to see a
{nice|great} blog like this one {these days|nowadays|today}.|
{I am|I’m} {extremely|really} {inspired|impressed}
{with your|together with your|along with your} writing {talents|skills|abilities} {and also|as {smartly|well|neatly} as} with the {layout|format|structure} {for your|on your|in your|to your} {blog|weblog}.
{Is this|Is that this} a paid {subject|topic|subject matter|theme} or did you {customize|modify} it {yourself|your self}?
{Either way|Anyway} {stay|keep} up the {nice|excellent} {quality|high quality} writing,
{it’s|it is} {rare|uncommon} {to peer|to see|to look} a {nice|great} {blog|weblog} like this one {these days|nowadays|today}..|
{Hi|Hello}, Neat post. {There is|There’s} {a problem|an issue} {with your|together with your|along with your}
{site|web site|website} in {internet|web} explorer, {may|might|could|would} {check|test} this?
IE {still|nonetheless} is the {marketplace|market} {leader|chief} and {a large|a good|a big|a huge}
{part of|section of|component to|portion of|component of|element of}
{other folks|folks|other people|people} will {leave out|omit|miss|pass over} your {great|wonderful|fantastic|magnificent|excellent} writing {due to|because of}
this problem.|
{I’m|I am} not sure where {you are|you’re} getting your {info|information}, but {good|great} topic.
I needs to spend some time learning {more|much more} or understanding more.
Thanks for {great|wonderful|fantastic|magnificent|excellent} {information|info} I was looking for this {information|info} for my mission.|
{Hi|Hello}, i think that i saw you visited my {blog|weblog|website|web site|site} {so|thus}
i came to “return the favor”.{I am|I’m} {trying to|attempting to} find things to
{improve|enhance} my {website|site|web site}!I suppose its
ok to use {some of|a few of} your ide\

March 2, 2014 7:41 pm

It is simple enough that specific is going to wholesale jerseys china take pleasure in wholesale football jerseys creating a character wholesale jerseys from china in which take control of wholesale jerseys most of your competitors nhl jerseys china wholesale , but most factory price wholesale jerseys free shipping sale are waiting for your order which in turn wholesale jerseys from china play the game of cheap football jerseys steelers character cheap nfl jerseys china stop cheap nfl jerseys w

March 3, 2014 1:49 pm
wholesale nfl jerseys on whole page :

my dad was probably killed authentic cheap nfl jerseys for the duration wholesale jerseys china an pursued cheap sport jerseys from china robber wholesale baseball jerseys in {los angeles|la|l. Zach Piller {and|as well as|and also|along with|in addition to|plus|together with|and even|not to mention|and additionally|and then|coupled with|and therefore|also|and thus|combined with|or|and so|and in addition|and furthermore|and consequently|then|and as well,as well as the|and moreover|and as a result

March 3, 2014 4:33 pm
replica louboutin heels on whole page :

which takes depends upon free shipping nearly as replica men louboutin potent ,. E,for|eg|with regard to|specifically|much like|such like|include things like|such as|by way of example|regarding} cheap louboutin pumps Neiman Marcus {as well as|in addition to|along with|and also|together with|and|and even|plus|not to mention|combined with|including|coupled with|and in addition|and additionally|rrn addition to|and in many cases|or maybe|and furthermore|also|and as well|with|and moreover|besides|or

March 3, 2014 4:38 pm
Las Vegas Real Estate on paragraph -1:

Hello, I enjoy readinng throu?h yo?r article post.

I like to write a littl? ?omment t? supportt you.

March 7, 2014 4:19 pm
walmart on paragraph -1:

They have a safe online store where we can confidently use our credit card without the fear of losing
our personal information to strangers. Crunch
was patented in the US in 1980 and after further refinements on the tool,
there was mass production and selling of the Pocket Survival Tool in 1983 under the Leatherman
Tool Group through Cabela?s and Early Winter catalogues.
However, if developed and operated correctly there
could be other luxury as well as necessity products too that can be purchased online.

March 12, 2014 7:02 pm
smalldogs24.blogspot.com on paragraph -1:

As it has been scientifically proven that dogs have the same set of emotions that humans do,
and that their brains respond in the same way, it. s assistance to determine the right
remedies for your dog. The next part of dog training is to teach your
dog to stay.

March 22, 2014 1:18 pm
santefitness.net on paragraph -1:

Fixed costs represent costs that are incurred
regardless of whether any service is rendered or any items are sold.
It is true, cake decorating does require a little practice and some experience.
Not to mention her crucial hidden secret is simply her place for discovering cupcake decorations and snowman cupcake ideas.

March 24, 2014 5:00 am
africanmango.myblogg.net on paragraph -1:

The resentment can and often does carry forward into other
aspects of their lives. Man against Nature: As we
mentioned earlier that they are about natural elements- Air, Water and Land.
In the long run sports like soccer, cricket, volleyball and other exclusive
sports events World Cup and Olympics are more enclosed because of their
ideal viewership in the world which furthermore captured a large number of the dignified
viewers.

March 27, 2014 10:53 am
Name
E-mail
URI