Download - Future of the Internet â And how to stop it.
Download - Future of the Internet â And how to stop it.
Download - Future of the Internet â And how to stop it.
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
106<br />
After <strong>the</strong> Stall<br />
that <strong>of</strong>fer a way around network blocks. 26 Such applications can be distributed<br />
through <strong>the</strong> network, and unsavvy users can <strong>the</strong>n partake simply by doubleclicking<br />
on an icon. Comprehensive regula<strong>to</strong>ry crackdowns require a non-generative<br />
endpoint or influence over <strong>the</strong> individual using <strong>it</strong> <strong>to</strong> ensure that <strong>the</strong> endpoint<br />
is not repurposed.<br />
For example, non-generative endpoints like radios and telephones can be<br />
constrained by filtering <strong>the</strong> networks <strong>the</strong>y use. Even if someone is unafraid <strong>to</strong><br />
turn a radio tuning knob or dial a telephone number <strong>to</strong> <strong>the</strong> outside world, radio<br />
broadcasts can be jammed, and phone connections can be disabled or moni<strong>to</strong>red.<br />
Because radios and telephones are not generative, such jamming cannot<br />
be circumvented. North Korea has gone even fur<strong>the</strong>r w<strong>it</strong>h endpoint lockdown.<br />
There, by law, <strong>the</strong> radios <strong>the</strong>mselves are built so that <strong>the</strong>y cannot be tuned <strong>to</strong><br />
frequencies o<strong>the</strong>r than those w<strong>it</strong>h <strong>of</strong>ficial broadcasts. 27<br />
W<strong>it</strong>h generative devices like PCs, <strong>the</strong> regula<strong>to</strong>r must settle for ei<strong>the</strong>r much<br />
leakier enforcement or much more resource-intensive measures that target <strong>the</strong><br />
individual—such as compelling c<strong>it</strong>izens <strong>to</strong> perform <strong>the</strong>ir <strong>Internet</strong> surfing in<br />
cyber cafés or public libraries, where <strong>the</strong>y might lim<strong>it</strong> <strong>the</strong>ir activ<strong>it</strong>ies for fear<br />
that o<strong>the</strong>rs are watching.<br />
The shift <strong>to</strong>ward non-generative endpoint technology driven by consumer secur<strong>it</strong>y<br />
worries <strong>of</strong> <strong>the</strong> sort described in this book changes <strong>the</strong> equation. 28 The trad<strong>it</strong>ional<br />
appliance, or nearly any object, for that matter, once placed w<strong>it</strong>h an individual,<br />
belongs <strong>to</strong> that person. Te<strong>the</strong>red appliances belong <strong>to</strong> a new class <strong>of</strong><br />
technology. They are appliances in that <strong>the</strong>y are easy <strong>to</strong> use, while not easy <strong>to</strong> tinker<br />
w<strong>it</strong>h. They are te<strong>the</strong>red because <strong>it</strong> is easy for <strong>the</strong>ir vendors <strong>to</strong> change <strong>the</strong>m<br />
from afar, long after <strong>the</strong> devices have left warehouses and s<strong>how</strong>rooms. Consider<br />
<strong>how</strong> useful <strong>it</strong> was in 2003 that Apple could introduce <strong>the</strong> iTunes S<strong>to</strong>re directly<br />
in<strong>to</strong> iTunes s<strong>of</strong>tware found on PCs running Mac OS. 29 Similarly, consumers can<br />
turn on a TiVo—or EchoStar—box <strong>to</strong> find that, thanks <strong>to</strong> a remote update, <strong>it</strong><br />
can do new things, such as share programs w<strong>it</strong>h o<strong>the</strong>r televisions in <strong>the</strong> house. 30<br />
These te<strong>the</strong>red appliances receive remote updates from <strong>the</strong> manufacturer,<br />
but <strong>the</strong>y generally are not configured <strong>to</strong> allow anyone else <strong>to</strong> tinker w<strong>it</strong>h<br />
<strong>the</strong>m—<strong>to</strong> invent new features and distribute <strong>the</strong>m <strong>to</strong> o<strong>the</strong>r owners who would<br />
not know <strong>how</strong> <strong>to</strong> program <strong>the</strong> boxes <strong>the</strong>mselves. Updates come from only one<br />
source, w<strong>it</strong>h a model <strong>of</strong> product development lim<strong>it</strong>ed <strong>to</strong> non-user innovation.<br />
Indeed, recall that some recent devices, like <strong>the</strong> iPhone, are updated in ways<br />
that actively seek out and erase any user modifications. These boxes thus resemble<br />
<strong>the</strong> early proprietary information services like CompuServe and AOL,