PrintNumber ErrorLocation Error Correction DateAdded
2 pv print line needs updated done 7/31/2008
2 pxvii Hal Abelson is Class of 1922 Professor of Electrical Engineering and Computer Science at MIT, and an IEEE Fellow. Hal Abelson is Class of 1922 Professor of Computer Science and Engineering at MIT, and an IEEE Fellow. 7/31/2008
2 pxvii Harry Lewis, former Dean of Harvard College, is Gordon McKay Professor of Computer Science at Harvard. Harry Lewis, former Dean of Harvard College, is Gordon McKay Professor of Computer Science at Harvard and Fellow of the Berkman Center for Internet and Society. 7/31/2008
2 p24 Global Positioning Systems (GPSs) have improved the marital lives of countless males too stubborn to ask directions. Put a Garmin or a TomTom in a car, and the car will radio its location to satellites, which will in turn communicate with ground-based mapping databases, which will finally radio driving directions to the car. It’s a marvel that the 24 satellites spinning 12,500 miles above the earth can pin down the location of your car within 25 feet, all at a price that makes these systems standard options for new cars and popular birthday presents as add-ons. People love these systems.
But change the scenario just a bit and the same technology feels less wonderful.
Global Position Systems (GPSs) have improved the marital lives of countless males too stubborn to ask directions. Put a Garmin or a Tom Tom in a car, and it will listen to precisely timed signals from satellites reporting their positions in space. The GPS calculates its own location from the satellites' locations and the times their signals are received. The 24 satellites spinning 12,500 miles above the earth enable your car to locate itself within 25 feet, at a price that makes these systems popular birthday presents.

If you carry a GPS-enabled cell phone, your friends can find you, if that its what you want. If your GPS-enabled rental car has a radio transmitter, you can be found whether you want it or not.
7/31/2008
2 p43 You can find out for yourself, at www.fec.gov. You can find out for yourself, at www.fec.gov or fundrace.huffingtonpost.com.
7/31/2008
2 p64 Fair Practices Fair Information Practice Principles 7/31/2008
2 p65 These principles were originally promulgated for U.S. medical data, but became a model for thinking about all kinds of personal data, especially in Europe. They have been the foundation for many corporate privacy policies. These principles were proposed for U.S. medical data, but were never adopted. Nevertheless, they have been the foundation for many corporate privacy policies. 7/31/2008
2 p66 All corporations doing business with the public have privacy notices, and virtually no one reads them. Most large corporations doing business with the public have privacy notices, and virtually no one reads them. 7/31/2008
2 p67 The European reliance on the Fair Information Privacy Practices is often no more useful, in practice, than the American approach. The European reliance on the Fair Information Practice Principles is often no more useful, in practice, than the American approach. 7/31/2008
2 p69 If Seligmann had gone to the extraordinary lengths necessary to avoid leaving digital fingerprints—not using a modern camera, a cell phone, or a bank, and living off campus to avoid electronic locks—he might be in prison today. If Seligmann had gone to the extraordinary lengths necessary to avoid leaving digital fingerprints—not using a modern camera, a cell phone, or a bank, and living off campus to avoid electronic locks—his defense would have lacked important exculpatory evidence. 7/31/2008
2 p83 attaches a “message authentication code” (MAC) to the image, and uploads the image and the MAC to the verification system. The system processes the received image with the same key and verifies that the same MAC results. The system is secure because it is impossible, with any reasonable amount of computation, to produce any other image that would yield the same MAC with this key. attaches a “digital signature” (see Chapter 5) to the image and uploads the image and the signature to the verification system. The system processes the received image with the same key and verifies that the same signature results. The system is secure because it is impossible, with any reasonable amount of computation, to produce another image that would yield the same signature with this key. 7/31/2008
2 p90 Depending on the use for which the image was being put, a lossy compression method might be acceptable. Depending on how an image will be used, a lossy compression method might be acceptable. 7/31/2008
2 p93 Indeed, it does so regularly, in order to enhance the capabilities of its software—and new releases create incompatibilities with legacy documents. A document created with Word 2007 can’t be opened with Word 2003, and early adopters of the new, extended .docx format discovered similar problems with previous versions of the software. Indeed, it does so regularly, in order to enhance the capabilities of its software—and new releases create incompatibilities with legacy documents. Some documents created with Word 2007 can't be opened in Word 2003 without a software add-on, so even all-Microsoft offices risk document incompatibilities if they don't adjust to Microsoft's format changes. 7/31/2008
2 p102 Filling blocks with zeroes takes time—if the file is huge, a lot of time—so much time that users would complain about how slowly their computers were running if every abandoned block were immediately zeroed. Filling blocks with zeroes might take so much time that the users would complain about how slowly their machines were running if every block were zeroed immediately. With some clever programming the process could be made unnoticeable, but so far neither Microsoft nor Apple has made the necessary software investment. 7/31/2008
2 p117 In February 2008, a San Francisco Judge tried to shut down the Wikileaks web site, which posts leaked confidential documents anonymously as an aid to whistleblowers. In February 2008, a San Francisco judge tried to shut down the Wikileaks web site, which posts leaked confidential documents anonymously as an aid to whistleblowers. 7/31/2008
2 p153 (This is apparently an allusion to another Google maxim, “Do no evil”—now revised to read, “You can make money without doing evil.”) (This is apparently an allusion to another Google maxim, “Don’t be evil”—now revised to read, “You can make money without doing evil.”) 7/31/2008
2 p189 From “Clipper Wars,” the furious industry reaction against the Clinton Administration’s “Clipper Chip” proposal. Reprinted with permission. Reprint with permission of RSA Security, Inc. 8/12/2008
2 p227 That might have seemed reasonable at a time when planes flew at only 1,000 feet. That might have seemed reasonable at a time when planes flew at only a few thousand feet. 8/12/2008
2 p317 Endnote #6, extra space fixed 8/12/2008
2 p320 Endnote #30, Because his ticket did not... should be in italic. fixed 8/12/2008
2 p320 Endnote #49: “OnStar warns, ‘OnStar will cooperate…” OnStar “Helpful Info” web page. www.onstar.com/us_english/jsp/explore/onstar_basics/helpful_info.
jsp?info-view=serv_plan.

missing end quote
fixed 8/12/2008
2 p324 Endnote #77: bad spacing
Endnote #93: “A document created with Word 2007…” See, for example, Shan Wang, “New ‘Word’ frustrates users,” Harvard Crimson, November 26, 2007.
fixed
“Some documents created with Word 2007…” See, for example, Shan Wang, “New ‘Word’ frustrates users,” Harvard Crimson, November 26, 2007.
8/12/2008
2 p327 Endnote #139(2nd one): bad spacing fixed 8/12/2008
2 p341 Endnote #255: “Is it possible that a rogue…” Warren Richey, “Once it’s on the Web, whose law applies?,” Christian Science Monitor, December 19, 2002. “by imposing death sentences…” Warren Richey, “Once it’s on the Web, whose law applies?,” Christian Science Monitor, December 19, 2002. 8/12/2008
2 p358 Index entry: MAC (message authentication code), 83 removed 8/12/2008
3 p93 Public documents were public property; access should never require the cooperation of a single private corporation.


Public documents were public property; access should never require the cooperation of a single private corporation. Peter Quinn, the state’s Chief Information Officer, added, “The world is about open
standards...I can’t understand why anybody would want to continue making closed-format documents anymore.”
6/10/2009
3 p94 Kriss returned to private industry as he had planned to do before joining the state government.
Delete sentence. 6/10/2009
3 p324 Add endnote:
93 “The world is about open standards...” Massachusetts Verdict: MS Office Formats Out, eWeek.com, www.eweek.com/article2/0,1895,1863060,00.asp.
fixed 6/10/2009