The Battle for the Internet: Difference between revisions

From Berkman@10
Jump to navigation Jump to search
No edit summary
m (Protected "The Battle for the Internet" [edit=sysop:move=sysop])
 
(15 intermediate revisions by 7 users not shown)
Line 1: Line 1:
The session was intended to be a discussion of who would be fighting for the soul of the internet and where. The martial title, however, brought in relatively militant discussants, so we mostly talked about government, control, crime, and openness.
The session was intended to be a discussion of who would be fighting for the soul of the internet and where. I was thinking of fleshing out Zittrain's framework of generativity vs. security. The martial title, however, brought in relatively militant discussants, so we mostly talked about government, control, crime, and openness.




'''The players'''
'''The players'''
I've arranged them from Left to Right, depending upon their commitment to the past models of control, Top to Bottom, based upon their praiseworthiness. (Since this is a wiki, feel free to revise my opinions.)
I've arranged them from Left to Right, depending upon their commitment to the past and control, Top to Bottom, based upon their praiseworthiness. (This is a wiki, feel free to revise my opinions.)
<nowiki>
 
                      NANOG
                      NANOG
             Nokia
             Nokia
                                                     Government Agencies
                                                     Government Agencies
Line 18: Line 18:
                                                     Verisign
                                                     Verisign
             Commercial Spies
             Commercial Spies
                                 Russia and China
                                 Russia and China
             Pornographers
             Pornographers
             Organized Crime
             Organized Crime


</nowiki>
 


The "battlefields" identified were mostly issues rather than locations. However, Africa and Asia were discussed briefly as places where cell phones were vital additions to their lives, not just alternative internet devices.
The "battlefields" identified were mostly issues rather than locations. However, Africa and Asia were discussed briefly as places where cell phones were vital additions to their lives, not just alternative internet devices.
Line 29: Line 28:
'''Battlefields'''
'''Battlefields'''
* DRM: The content owners vs. the consumers with the PC industry caught in the middle.
* DRM: The content owners vs. the consumers with the PC industry caught in the middle.
* Knowledge
* Anonymity: The Right described the needs for dependable authentication claiming the internet's anonymity is far too pervasive. The Left observed that ''anonymity is a constitutional right''.
* Anonymity
* Identity Integrity: Being impersonated can be a problem. ''Being authenticated in a blog comment can allow you to build credibility.''
The conservatives described the needs for dependable authentication claiming the internet's anonymity is far too pervasive.
* Encryption: Left and Right agreed that the barriers to adoption have been usability and enterprise customers, not government, wanting to control users.
*  Liberals observed that anonymity is a constitutional right.
* Traffic Blocking: If you count Comcast and Cox blocking Bit Torrent, the ''US does more than any other country''.
* Identity Integrity
* Transparency: The biggest complaint against Comcast service tweaking was their misleading customers. Google and others can be collecting information, but we don't know what -- the new Panopticon.
Being impersonated can be a problem
Being authenticated in a blog comment can allow you to build credibility.
* Encryption
*  Conservatives and liberals agreed that the barriers to adoption have been usability and enterprise customers, not government, wanting to control users.
* Traffic Blocking is an issue. If you count Comcast and Cox blocking Bit Torrent, the US does more than any other country.
* Transparency
The biggest complaint against Comcast service tweaking was their misleading customers.
Google and others can be collecting information, but we don't know what -- the new Panopticon.
* Literacy

Latest revision as of 10:13, 17 June 2010

The session was intended to be a discussion of who would be fighting for the soul of the internet and where. I was thinking of fleshing out Zittrain's framework of generativity vs. security. The martial title, however, brought in relatively militant discussants, so we mostly talked about government, control, crime, and openness.


The players I've arranged them from Left to Right, depending upon their commitment to the past and control, Top to Bottom, based upon their praiseworthiness. (This is a wiki, feel free to revise my opinions.)

                      NANOG
            Nokia
                                                   Government Agencies
                         OLPC
                                        Microsoft
                           Intel
       Google
                     ICANN                                
                                                                        Telecoms
                                          Content Owners
                                                               Comcast & Cox
                                                    Verisign
            Commercial Spies
                                Russia and China
            Pornographers
            Organized Crime


The "battlefields" identified were mostly issues rather than locations. However, Africa and Asia were discussed briefly as places where cell phones were vital additions to their lives, not just alternative internet devices.

Battlefields

  • DRM: The content owners vs. the consumers with the PC industry caught in the middle.
  • Anonymity: The Right described the needs for dependable authentication claiming the internet's anonymity is far too pervasive. The Left observed that anonymity is a constitutional right.
  • Identity Integrity: Being impersonated can be a problem. Being authenticated in a blog comment can allow you to build credibility.
  • Encryption: Left and Right agreed that the barriers to adoption have been usability and enterprise customers, not government, wanting to control users.
  • Traffic Blocking: If you count Comcast and Cox blocking Bit Torrent, the US does more than any other country.
  • Transparency: The biggest complaint against Comcast service tweaking was their misleading customers. Google and others can be collecting information, but we don't know what -- the new Panopticon.