
From Our Fellows: Envisioning a Healthy Information Ecosystem

To meet this challenge, the regime must evolve from content-centred regulation to systems-level accountability —from evaluating discrete outputs to interrogating the design logic of digital environments. This requires a shift in regulatory maturity: what might be called a second-order regime , one that targets architectural manipulation as a first-... See more
Dr Mark R Leiser • Systemic Manipulation, Child Vulnerability, and the Regulatory Deficit in Ofcom’s Framework
We stand united against the commodification of our digital future, advocating instead for an ecosystem that is imbued with our collective cultural values, desires, and identities.
Austin Robey • Decentralization & Desire: A web3 Cultural Blueprint
In this discussion, we explore a wide variety of topics, including social engineering, deceit in the security sector, common hacking vulnerabilities, the legal abuse of data and privacy by big corporations, digital IDs, the future of deep fakes and brain computer interfaces, and a whole lot more.
singularity radio • FBL77: Brett Johnson - America’s Most Wanted Cybercriminal
Where others see a website that’s good for wasting time, Germans see a comprehensive surveillance tool that needs muscular oversight.
Sarah Wynn-Williams • Careless People: A Cautionary Tale of Power, Greed, and Lost Idealism
The most potent vectors of digital harm today are not merely located in what is seen , but in how interaction is engineered —through asymmetries of choice, misaligned incentives, and design architectures optimised for extraction rather than wellbeing.
Dr Mark R Leiser • Systemic Manipulation, Child Vulnerability, and the Regulatory Deficit in Ofcom’s Framework
there were very few useful designs suggesting how we might amplify the virtues of the internet and contain its likely vices.