17.01.2015 Views

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

106<br />

After <strong>the</strong> Stall<br />

that <strong>of</strong>fer a way around network blocks. 26 Such applications can be distributed<br />

through <strong>the</strong> network, and unsavvy users can <strong>the</strong>n partake simply by doubleclicking<br />

on an icon. Comprehensive regula<strong>to</strong>ry crackdowns require a non-generative<br />

endpoint or influence over <strong>the</strong> individual using <strong>it</strong> <strong>to</strong> ensure that <strong>the</strong> endpoint<br />

is not repurposed.<br />

For example, non-generative endpoints like radios and telephones can be<br />

constrained by filtering <strong>the</strong> networks <strong>the</strong>y use. Even if someone is unafraid <strong>to</strong><br />

turn a radio tuning knob or dial a telephone number <strong>to</strong> <strong>the</strong> outside world, radio<br />

broadcasts can be jammed, and phone connections can be disabled or moni<strong>to</strong>red.<br />

Because radios and telephones are not generative, such jamming cannot<br />

be circumvented. North Korea has gone even fur<strong>the</strong>r w<strong>it</strong>h endpoint lockdown.<br />

There, by law, <strong>the</strong> radios <strong>the</strong>mselves are built so that <strong>the</strong>y cannot be tuned <strong>to</strong><br />

frequencies o<strong>the</strong>r than those w<strong>it</strong>h <strong>of</strong>ficial broadcasts. 27<br />

W<strong>it</strong>h generative devices like PCs, <strong>the</strong> regula<strong>to</strong>r must settle for ei<strong>the</strong>r much<br />

leakier enforcement or much more resource-intensive measures that target <strong>the</strong><br />

individual—such as compelling c<strong>it</strong>izens <strong>to</strong> perform <strong>the</strong>ir <strong>Internet</strong> surfing in<br />

cyber cafés or public libraries, where <strong>the</strong>y might lim<strong>it</strong> <strong>the</strong>ir activ<strong>it</strong>ies for fear<br />

that o<strong>the</strong>rs are watching.<br />

The shift <strong>to</strong>ward non-generative endpoint technology driven by consumer secur<strong>it</strong>y<br />

worries <strong>of</strong> <strong>the</strong> sort described in this book changes <strong>the</strong> equation. 28 The trad<strong>it</strong>ional<br />

appliance, or nearly any object, for that matter, once placed w<strong>it</strong>h an individual,<br />

belongs <strong>to</strong> that person. Te<strong>the</strong>red appliances belong <strong>to</strong> a new class <strong>of</strong><br />

technology. They are appliances in that <strong>the</strong>y are easy <strong>to</strong> use, while not easy <strong>to</strong> tinker<br />

w<strong>it</strong>h. They are te<strong>the</strong>red because <strong>it</strong> is easy for <strong>the</strong>ir vendors <strong>to</strong> change <strong>the</strong>m<br />

from afar, long after <strong>the</strong> devices have left warehouses and s<strong>how</strong>rooms. Consider<br />

<strong>how</strong> useful <strong>it</strong> was in 2003 that Apple could introduce <strong>the</strong> iTunes S<strong>to</strong>re directly<br />

in<strong>to</strong> iTunes s<strong>of</strong>tware found on PCs running Mac OS. 29 Similarly, consumers can<br />

turn on a TiVo—or EchoStar—box <strong>to</strong> find that, thanks <strong>to</strong> a remote update, <strong>it</strong><br />

can do new things, such as share programs w<strong>it</strong>h o<strong>the</strong>r televisions in <strong>the</strong> house. 30<br />

These te<strong>the</strong>red appliances receive remote updates from <strong>the</strong> manufacturer,<br />

but <strong>the</strong>y generally are not configured <strong>to</strong> allow anyone else <strong>to</strong> tinker w<strong>it</strong>h<br />

<strong>the</strong>m—<strong>to</strong> invent new features and distribute <strong>the</strong>m <strong>to</strong> o<strong>the</strong>r owners who would<br />

not know <strong>how</strong> <strong>to</strong> program <strong>the</strong> boxes <strong>the</strong>mselves. Updates come from only one<br />

source, w<strong>it</strong>h a model <strong>of</strong> product development lim<strong>it</strong>ed <strong>to</strong> non-user innovation.<br />

Indeed, recall that some recent devices, like <strong>the</strong> iPhone, are updated in ways<br />

that actively seek out and erase any user modifications. These boxes thus resemble<br />

<strong>the</strong> early proprietary information services like CompuServe and AOL,

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!