Via Howard Rheingold comesDavid Weinberger'sNPR talk on emerging technologies that could significantly limit our ability to use and create with digital content -- the "triple threat" of content lockdown: Digital Rights Management (DRM), digital identity and trusted computing.
Rheingold observes that "This talk should recall [John] Walker'sDigital Imprimatur paper." Indeed. That paper, which spawned amuch-discussed Steven Levypiece, builds on the same insight (and pessimism) made famous by EFF board member Larry Lessig in hisCode and Other Laws of Cyberspace -- "Hey, you Internet pioneers, your Internet isn'tintrinsically free -- it's already proven quite regulable and we're headed toward more regulation. Wake up!" Lessig went on to divide the "levers" of regulation into four categories -- code; law; markets; norms.
What Digital Imprimatur does is add granularity to the "code" category -- a specific laundry list of technologies that have the potential to transform the Internet from open to closed. EFF'sFred von Lohmann read the paper; below, he provides a digest -- Digital Imprimatur in a Nutshell -- as well as his own list of countervailing technologies.
Writes Fred:
"Walker's list:
1. The Firewalled Consumer: NAT ascendant! Connections controlled upstream.
2. Certificates: Everything gets a cryptographically unique identity assigned by a central authority.
3. Trusted Computing: Walker may not fully understand TCG, but he's right to point it out.
4. Certified Micropayments: In the glare of e-commerce, no one notices the death of anonymity, free linking, free networking, free Internet.
5. DRM: 'Nuff said.
6. Trusted Internet Traffic: Only 'certified' packets get carried.
These technologies together create a strong current toward the creation of the Secure Internet -- 'No ID, No IP' -- only certified packets, payments, programs and data are allowed. Mainstream computers ignore, or are cut off from, all traffic not on the Secure Internet. Not because Big Brother/Big Content has a grand conspiracy but, rather, because well-intentioned policy-makers and techies want to stop worms, spam, porn, fraud, terrorists and all manner of other ills.
As a side-effect, however, the open Internet becomes a thing of the past.
Chilling. Yet familiar. EFF is working on (or at least aware of) every technology Walker cites, and most of the policy issues he identifies. But it's a darn good roadmap.
My list of countervailing technologies to watch:
1. Low cost meshing wireless networks. Small-world Darknets.
2. Inexpensive, high-density unrestricted storage devices. Darknet over sneaker-net.
3. Open source software, if it's a real alternative computing environment for regular people.
4. Distributed anonymizing proxy networks."
Who needs a DDoS (Denial of Service) attack when you have a new president? As ofFebruary 2nd, thousands of web pages and datasets have been removed from U.S. government agencies following a series of executive orders. The impacts span theDepartment of Veteran Affairs and the...
EFF, Public Knowledge, and the Center for Democracy and Technology Urge The United States Court of Appeals for the Fourth Circuit to Protect Internet Subscribers in BMG v. Cox.
No one should have to fear losing their Internet connection because of unfounded accusations. But some rights holders want to...
Washington D.C.—The Electronic Frontier Foundation (EFF) sued the U.S. government today on behalf of technology creators and researchers to overturn onerous provisions of copyright law that violate the First Amendment.
EFF’slawsuit, filed with co-counsel Brian Willen, Stephen Gikow, and Lauren Gallo White of Wilson Sonsini Goodrich...
If you only listened to entertainment industry lobbyists, you’d think that music and film studios are fighting a losing battle against copyright infringement over the Internet. Hollywood representatives routinely tell policymakers that the only response to the barrage of online infringement is to expand copyright or even create new copyright-adjacent...
Copyright Lawsuits Won’t Stop People from Sharing ResearchIn principle, everyone in the world should have access to the same body of knowledge. The UN Declaration of Human Rights says thateveryone deserves the right “to share in scientific advancement and its benefits.”The reality is a bit messier. Institutional subscriptions...
Right now the FCC isconsidering a set of rules that would allow Internet providers to offer faster access to some websites that can afford to pay. We need to stop them.
Let’s start with the obvious: The Internet is how we communicate and how we work,...
The content lobby's narrative about the Internet's impact on the creative industry has grown all too familiar. According to this tiresome story, Hollywood is doing everything it can to prevent unauthorized downloading, but people—enabled by peer-to-peer technologies, “rogue” websites, search engines, or whatever the bogeyman of the moment is—keep doing...
In July 2009, South Korea became the first country to introduce agraduated response or "three strikes" law. The statute allows the Minister of Culture or the Korean Copyright Commission to tell ISPs and Korean online service providers to suspend the accounts of repeated infringers and block or...
The "Copyright Alert System" – an elaborate combination of surveillance, warnings, punishments, and "education" directed at customers of most major U.S. Internet service providers – is poised to launch in the next few weeks, as has been widely reported. The problems with it are legion. Big...
Check out our 4-star rating onCharity Navigator.