Download - Future of the Internet â And how to stop it.
Download - Future of the Internet â And how to stop it.
Download - Future of the Internet â And how to stop it.
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Stabil<strong>it</strong>y on a Generative Net 169<br />
anyone could free-ride <strong>of</strong>f <strong>of</strong> his effort <strong>to</strong> distinguish between spammers and<br />
nonspammers. In 1999, leading Web-based e-mail provider Hotmail decided<br />
<strong>to</strong> do just that on behalf <strong>of</strong> <strong>it</strong>s cus<strong>to</strong>mers. 31 Thus if Paul Vixie believed a particular<br />
mail server <strong>to</strong> be accommodating a spammer, no one using that server<br />
could send e-mail <strong>to</strong> anyone w<strong>it</strong>h an account at hotmail.com. MAPS was also<br />
known as <strong>the</strong> “Realtime Blackhole List,” referring <strong>to</strong> <strong>the</strong> black hole that one’s<br />
e-mail would enter if one’s outgoing e-mail provider were listed. The service<br />
was viewed as a deterrent as much as an incapac<strong>it</strong>ation: <strong>it</strong> was designed <strong>to</strong> get<br />
people who e-mail (or who run e-mail servers) <strong>to</strong> behave in a certain way. 32<br />
Vixie was not <strong>the</strong> only social entrepreneur in this space. O<strong>the</strong>rs also <strong>of</strong>fered<br />
<strong>to</strong>ols for deciding what was spam and who was sending <strong>it</strong>, w<strong>it</strong>h varying <strong>to</strong>lerance<br />
for appeals from those incorrectly flagged. The Open Relay Behaviormodification<br />
System (ORBS) sent au<strong>to</strong>mated test e-mails through o<strong>the</strong>rs’ e-mail<br />
servers <strong>to</strong> figure out who maintained so-called open relays. If ORBS was able <strong>to</strong><br />
send <strong>it</strong>self e-mail through ano<strong>the</strong>r’s server successfully, <strong>it</strong> concluded that <strong>the</strong><br />
server could be used <strong>to</strong> send spam and would add <strong>it</strong> <strong>to</strong> <strong>it</strong>s own blacklist. Vixie<br />
concluded that <strong>the</strong> opera<strong>to</strong>r <strong>of</strong> ORBS was <strong>the</strong>refore also a spammer—for<br />
sending <strong>the</strong> test e-mails. He blackholed <strong>the</strong>m on MAPS, and <strong>the</strong>y blackholed<br />
him on ORBS, spurring a brief dig<strong>it</strong>al war between <strong>the</strong>se private secur<strong>it</strong>y<br />
forces. 33<br />
Vixie’s efforts were undertaken w<strong>it</strong>h what appear <strong>to</strong> be <strong>the</strong> best <strong>of</strong> intentions,<br />
and a sense <strong>of</strong> humil<strong>it</strong>y. Vixie expressed reservations about his system even as he<br />
continued <strong>to</strong> develop <strong>it</strong>. He worried about <strong>the</strong> heavy responsibil<strong>it</strong>ies attendant<br />
on private parties who amass <strong>the</strong> power <strong>to</strong> affect o<strong>the</strong>rs’ lives <strong>to</strong> exercise <strong>the</strong><br />
power fairly. 34 The judgments <strong>of</strong> one private party about ano<strong>the</strong>r—perhaps in<br />
turn informed by o<strong>the</strong>r private parties—can become as life-affecting as <strong>the</strong><br />
judgments <strong>of</strong> public author<strong>it</strong>ies, yet w<strong>it</strong>hout <strong>the</strong> elements <strong>of</strong> due process that<br />
cabin <strong>the</strong> actions <strong>of</strong> public author<strong>it</strong>ies in societies that recognize <strong>the</strong> rule <strong>of</strong> law.<br />
At <strong>the</strong> time, being listed on MAPS or o<strong>the</strong>r powerful real time blackhole lists<br />
could be tantamount <strong>to</strong> having one’s <strong>Internet</strong> connection turned <strong>of</strong>f. 35<br />
MAPS was made possible by <strong>the</strong> generative creation and spread <strong>of</strong> <strong>to</strong>ols that<br />
would help interested network administra<strong>to</strong>rs combat spam w<strong>it</strong>hout reliance<br />
on legal intervention against spammers. It was a predictable response by a system<br />
<strong>of</strong> users in which strong norms against spamming had lost effectiveness as<br />
<strong>the</strong> <strong>Internet</strong> became more impersonal and <strong>the</strong> pr<strong>of</strong><strong>it</strong>s <strong>to</strong> be gleaned from sending<br />
spam increased. 36 In <strong>the</strong> absence <strong>of</strong> legal solutions or changes at <strong>the</strong> center<br />
<strong>of</strong> <strong>the</strong> network, barriers like MAPS could be put in place closer <strong>to</strong> <strong>the</strong> end-