17.01.2015 Views

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Stabil<strong>it</strong>y on a Generative Net 169<br />

anyone could free-ride <strong>of</strong>f <strong>of</strong> his effort <strong>to</strong> distinguish between spammers and<br />

nonspammers. In 1999, leading Web-based e-mail provider Hotmail decided<br />

<strong>to</strong> do just that on behalf <strong>of</strong> <strong>it</strong>s cus<strong>to</strong>mers. 31 Thus if Paul Vixie believed a particular<br />

mail server <strong>to</strong> be accommodating a spammer, no one using that server<br />

could send e-mail <strong>to</strong> anyone w<strong>it</strong>h an account at hotmail.com. MAPS was also<br />

known as <strong>the</strong> “Realtime Blackhole List,” referring <strong>to</strong> <strong>the</strong> black hole that one’s<br />

e-mail would enter if one’s outgoing e-mail provider were listed. The service<br />

was viewed as a deterrent as much as an incapac<strong>it</strong>ation: <strong>it</strong> was designed <strong>to</strong> get<br />

people who e-mail (or who run e-mail servers) <strong>to</strong> behave in a certain way. 32<br />

Vixie was not <strong>the</strong> only social entrepreneur in this space. O<strong>the</strong>rs also <strong>of</strong>fered<br />

<strong>to</strong>ols for deciding what was spam and who was sending <strong>it</strong>, w<strong>it</strong>h varying <strong>to</strong>lerance<br />

for appeals from those incorrectly flagged. The Open Relay Behaviormodification<br />

System (ORBS) sent au<strong>to</strong>mated test e-mails through o<strong>the</strong>rs’ e-mail<br />

servers <strong>to</strong> figure out who maintained so-called open relays. If ORBS was able <strong>to</strong><br />

send <strong>it</strong>self e-mail through ano<strong>the</strong>r’s server successfully, <strong>it</strong> concluded that <strong>the</strong><br />

server could be used <strong>to</strong> send spam and would add <strong>it</strong> <strong>to</strong> <strong>it</strong>s own blacklist. Vixie<br />

concluded that <strong>the</strong> opera<strong>to</strong>r <strong>of</strong> ORBS was <strong>the</strong>refore also a spammer—for<br />

sending <strong>the</strong> test e-mails. He blackholed <strong>the</strong>m on MAPS, and <strong>the</strong>y blackholed<br />

him on ORBS, spurring a brief dig<strong>it</strong>al war between <strong>the</strong>se private secur<strong>it</strong>y<br />

forces. 33<br />

Vixie’s efforts were undertaken w<strong>it</strong>h what appear <strong>to</strong> be <strong>the</strong> best <strong>of</strong> intentions,<br />

and a sense <strong>of</strong> humil<strong>it</strong>y. Vixie expressed reservations about his system even as he<br />

continued <strong>to</strong> develop <strong>it</strong>. He worried about <strong>the</strong> heavy responsibil<strong>it</strong>ies attendant<br />

on private parties who amass <strong>the</strong> power <strong>to</strong> affect o<strong>the</strong>rs’ lives <strong>to</strong> exercise <strong>the</strong><br />

power fairly. 34 The judgments <strong>of</strong> one private party about ano<strong>the</strong>r—perhaps in<br />

turn informed by o<strong>the</strong>r private parties—can become as life-affecting as <strong>the</strong><br />

judgments <strong>of</strong> public author<strong>it</strong>ies, yet w<strong>it</strong>hout <strong>the</strong> elements <strong>of</strong> due process that<br />

cabin <strong>the</strong> actions <strong>of</strong> public author<strong>it</strong>ies in societies that recognize <strong>the</strong> rule <strong>of</strong> law.<br />

At <strong>the</strong> time, being listed on MAPS or o<strong>the</strong>r powerful real time blackhole lists<br />

could be tantamount <strong>to</strong> having one’s <strong>Internet</strong> connection turned <strong>of</strong>f. 35<br />

MAPS was made possible by <strong>the</strong> generative creation and spread <strong>of</strong> <strong>to</strong>ols that<br />

would help interested network administra<strong>to</strong>rs combat spam w<strong>it</strong>hout reliance<br />

on legal intervention against spammers. It was a predictable response by a system<br />

<strong>of</strong> users in which strong norms against spamming had lost effectiveness as<br />

<strong>the</strong> <strong>Internet</strong> became more impersonal and <strong>the</strong> pr<strong>of</strong><strong>it</strong>s <strong>to</strong> be gleaned from sending<br />

spam increased. 36 In <strong>the</strong> absence <strong>of</strong> legal solutions or changes at <strong>the</strong> center<br />

<strong>of</strong> <strong>the</strong> network, barriers like MAPS could be put in place closer <strong>to</strong> <strong>the</strong> end-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!