Pre-class Discussion for Jan 18: Difference between revisions

From Cyberlaw: Internet Points of Control Course Wiki
Jump to navigation Jump to search
Line 1: Line 1:


== Zittrain, ''The Future of the Internet'', Conclusion ==
== Zittrain, ''The Future of the Internet'', Conclusion ==
Line 33: Line 32:
**** Also, does Godwin's law have a corollary for child pornography? [[User:Anna|Anna]] 01:26, 18 January 2008 (EST)
**** Also, does Godwin's law have a corollary for child pornography? [[User:Anna|Anna]] 01:26, 18 January 2008 (EST)
**** Godwin, Jr.'s law. [[User:Eroggenkamp|Eroggenkamp]] 10:23, 18 January 2008 (EST)
**** Godwin, Jr.'s law. [[User:Eroggenkamp|Eroggenkamp]] 10:23, 18 January 2008 (EST)
** Bands do make most of their money from touring at many levels of the music industry. Even those bands lucky enough to sign with a major label are usually given contracts that give most of the profits from album sales to the record label for at least their first album or two, while giving most of the touring profits to the band. The majority of bands don't have more than one or two hit albums, so piracy that reduced CD sales hits the record labels a lot harder than it hits the vast majority of musicians. [[User:Eroggenkamp|Eroggenkamp]] 10:37, 18 January 2008 (EST)

Revision as of 11:37, 18 January 2008

Zittrain, The Future of the Internet, Conclusion

Frank Bajak, Laptop project enlivens Peruvian village

For those interested, I found a link on YouTube that shows the laptop and explains its use. OLPC One Laptop per Child KStanfield 20:24, 17 January 2008 (EST)

  • I had the opportunity to experiment with an XO during a class on Science, Technology and Public Policy last semester. Kenyan-born Calestous Juma, the Director of Science, Technology and Innovation at the Kennedy School's Belfer Center was a guest speaker and he brought in an XO laptop for everyone to try out. Prof. Juma has devoted his professional career to sustainable development in the 3rd world and is a member of the board developing the XO's software. If you're interested in learning more about this impressive man, see the rather chatty Guardian story about Prof. Juma For Juma's thoughts on the problems of marketing the XO in Africa see Business Daily Africa article --Tseiver 21:51, 17 January 2008 (EST)
  • Here's a video review of the XO from a NY Times Technology writer. It shows its capabilities in more detail - and better resolution - than the item cited above by KStanfield. See NY Times XO review Yet another clip has a developer talking about it at a tech conference. See XO at tech fair --Tseiver 22:15, 17 January 2008 (EST)
  • One last video reference. This one is the slickest, produced artfully by the Red Hat development team for the XO. Quite informative. See Red Hat on XO The clip even ends with a Creative Commons message. --Tseiver 22:30, 17 January 2008 (EST)
  • I have a concern related to the kill switch. See details on the wiki referenced in the JZ chapter. Even if thieves couldn't work around it, couldn't they just threaten the owner with violence if it is deactivated? I can imagine a sad child coming to school without their laptop - the teacher wants to report it as stolen so it can be deactivated if it is in range of a wireless access point, but the student is scared of reprisal. In other words, the thieves might not be able to break the technological layer of anti-theft, but they can substitute a social/physical technique. Anyone see a solution to this? I realize that it's not a critical problem with the program, rather something that should fall under the procrastination principle. WillM 23:22, 17 January 2008 (EST)
    • I guess one solution would be to make the laptop permanently keyed to the child (perhaps through a biometric like a fingerprint scanner) although this would make the computer significantly, if not prohibitively, expensive. The manufacturers did put in some level of theft-protection, at least from adults - the keys are so small that it would be difficult for anyone but a child to type on it. There may also be other enforcement mechanisms. The police might confiscate the laptop if they saw it in an adult's hands or social pressure from the community might be brought to bear on such an individual. Anna 01:16, 18 January 2008 (EST)
      • A better, cheaper solution would be to install a GPS system in each XO. That way, instead of deactivating the system when it is stolen, which allows the thief to know it has been reported and potentially retaliate, you allow the authorities to determine the location of a stolen XO and retrieve it. There are still problems attendant on this approach--for example, the authorities might not have the inclination to go after the thief, or the firepower to do it in certain areas of the globe, or they might be corrupt and ask for a bribe that the child can't afford--but with wide enough publicity, I think it could operate in a similar manner to robots.txt, deterring enough crime to make it largely unused.
      • Another, more generative workaround would be a password-protection program. Again, there's a problem of retaliation if the thief realizes that he needs a password to get into the XO, but perhaps the kids who are programming their computers could come up with a workaround: the password is only required once a week, so by the time the thief is asked for it, he's too far away to harm the child; combine that with a GPS, and if the thief throws away the XO when it becomes unusable, it can be easily retrieved. I think the potential for workarounds and the good that comes from the XO overrides this concern.
      • Finally, it might be possible to use the wireless connections in each laptop to triangulate the location of any stolen laptop. This would be shorter range than a GPS, but would again enable catching the thief. Eroggenkamp 10:33, 18 January 2008 (EST)

Stecklow & Bandler, A Little Laptop With Big Ambitions

Link to the 60 minutes piece referenced in the article. WillM 23:56, 17 January 2008 (EST)

Palfrey & Gasser, Born Digital (Optional)

John Perry Barlow A Declaration of Independence for Cyberspace

  • Apparently Barlow has tempered his optimism regarding cyberspace becoming a sort of left-libertarian utopia. See towards the bottom of this 2004 interview in Reason here. Saying of his earlier writing on cyberspace and presumably this declaration in particular, "We all get older and smarter." WillM 13:48, 17 January 2008 (EST)
  • I think it would be a mistake to take this declaration too literally, much like Barlow's earlier appearance in the material related to copyright (i.e., bands should all tour for their revenue and not worry about piracy). Nonetheless, I'll take the argument seriously:
    • Barlow consents to government control over our bodies in the physical world, but not in cyberspace, "Ours is a world that is both everywhere and nowhere, but it is not where bodies live." Is this a good justification for cyberspace being entirely free from real-world governments? Cyberspace might not be a place where bodies live, but what goes on there (e.g., child pornography) can have very real effects IRL. So then it becomes a sort of jurisdiction question: should real-world institutions ever have jurisdiction over a cyber-event? Barlow says no, but I would argue the answer is yes when the actions in cyberspace have directed effects at that other jurisdiction, the real world. WillM 22:38, 17 January 2008 (EST)
    • Barlow really misses the point in this declaration. Even though it seems like Cyberspace exists outside the physical world, it is really just a flow of electrons through physical wires, computer chips, servers, etc. The physical world and the governments that regulate it can still control the places those electrons have to go in order to control Cyberspace--witness the restrictions that Sealand has to impose upon itself to get connectivity with the rest of the globe, and the filtering that China, Iran, Burma, and other countries are able to impose upon Cyberspace. He reminds me of the citizens of the State of Jefferson--long on rhetoric and short on reality. Eroggenkamp 10:23, 18 January 2008 (EST)
      • I felt that the tone of this piece was less of a declaration and more of a call to arms. It didn't seem like he was saying that this had already occurred or that this was inevitable, but rather that this was a possibility and the one that he wanted to encourage others to fight for. Anna 01:25, 18 January 2008 (EST)
        • Also, does Godwin's law have a corollary for child pornography? Anna 01:26, 18 January 2008 (EST)
        • Godwin, Jr.'s law. Eroggenkamp 10:23, 18 January 2008 (EST)
    • Bands do make most of their money from touring at many levels of the music industry. Even those bands lucky enough to sign with a major label are usually given contracts that give most of the profits from album sales to the record label for at least their first album or two, while giving most of the touring profits to the band. The majority of bands don't have more than one or two hit albums, so piracy that reduced CD sales hits the record labels a lot harder than it hits the vast majority of musicians. Eroggenkamp 10:37, 18 January 2008 (EST)