17.01.2015 Views

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

172<br />

Solutions<br />

<strong>the</strong> explo<strong>it</strong> that was on his s<strong>it</strong>e. (He also said that <strong>the</strong> explo<strong>it</strong> was located in a<br />

l<strong>it</strong>tle-used area <strong>of</strong> his s<strong>it</strong>e, and noted that he had not been given notice before a<br />

Google warning was placed on links <strong>to</strong> his page.) W<strong>it</strong>h <strong>the</strong> Google/S<strong>to</strong>pBadware<br />

project in full swing, Web s<strong>it</strong>e owners have experienced a major shift in incentives,<br />

such that <strong>the</strong> explo<strong>it</strong> is <strong>the</strong>ir problem if <strong>the</strong>y want Google traffic back.<br />

That is perhaps more powerful than a law directly regulating <strong>the</strong>m could manage—and<br />

<strong>it</strong> could in turn generate a market for firms that help validate, clean,<br />

and secure Web s<strong>it</strong>es.<br />

Still, <strong>the</strong> justice <strong>of</strong> Google/S<strong>to</strong>pBadware and similar efforts remains rough,<br />

and market forces alone might not make for a desirable level <strong>of</strong> attention <strong>to</strong> be<br />

given <strong>to</strong> those wrongly labeled as people or Web s<strong>it</strong>es <strong>to</strong> be avoided, or properly<br />

labeled but unsure where <strong>to</strong> turn for help <strong>to</strong> clean <strong>the</strong>mselves up. Google/S<strong>to</strong>p-<br />

Badware and MAPS are not <strong>the</strong> only mainstream examples <strong>of</strong> this kind <strong>of</strong><br />

effort. Windows Vista’s anti-spyware program displays a welcome screen during<br />

installation inv<strong>it</strong>ing you <strong>to</strong> “meet your computer’s new bodyguards.” 44<br />

These bodyguards advise you what you can and cannot run on your PC if you<br />

want <strong>to</strong> be safe, as far as Micros<strong>of</strong>t is concerned.<br />

These private programs are serving important functions that might o<strong>the</strong>rwise<br />

be undertaken by public author<strong>it</strong>ies—and <strong>the</strong>ir very efficiency is what<br />

might make <strong>the</strong>m less than fair. Micros<strong>of</strong>t’s bodyguard metaphor is apt, and<br />

most <strong>of</strong> us rely on <strong>the</strong> police ra<strong>the</strong>r than mercenaries for analogous protection.<br />

45 The responsibil<strong>it</strong>ies when <strong>the</strong> private becomes <strong>the</strong> public were addressed<br />

in <strong>the</strong> Un<strong>it</strong>ed States in <strong>the</strong> 1940s, when <strong>the</strong> <strong>to</strong>wn <strong>of</strong> Chickasaw,<br />

Alabama, was owned lock, s<strong>to</strong>ck, and barrel by <strong>the</strong> Gulf Shipbuilding Corporation.<br />

A Jehovah’s W<strong>it</strong>ness was prosecuted for trespass for distributing l<strong>it</strong>erature<br />

on <strong>the</strong> <strong>to</strong>wn’s streets because <strong>the</strong>y were private property. In a regular <strong>to</strong>wn,<br />

<strong>the</strong> First Amendment would have protected those activ<strong>it</strong>ies. The Supreme<br />

Court <strong>of</strong> <strong>the</strong> Un<strong>it</strong>ed States <strong>to</strong>ok up <strong>the</strong> s<strong>it</strong>uation in Marsh v. Alabama, and held<br />

that <strong>the</strong> private property was <strong>to</strong> be treated as public property, and <strong>the</strong> conviction<br />

was reversed. 46 O<strong>the</strong>rs have speculated that Marsh <strong>of</strong>fers some wisdom for<br />

cyberspace, where certain chokepoints can arise from private parties. 47 Marsh<br />

advises that sometimes <strong>the</strong> government can defend <strong>the</strong> individual against a<br />

disproportionately powerful private party. This view can put public governments<br />

in a pos<strong>it</strong>ion <strong>of</strong> encouraging and defending <strong>the</strong> free flow <strong>of</strong> b<strong>it</strong>s and<br />

bytes, ra<strong>the</strong>r than seeking <strong>to</strong> constrain <strong>the</strong>m for particular regula<strong>to</strong>ry purposes.<br />

It would be a complex <strong>the</strong>oretical leap <strong>to</strong> apply <strong>the</strong> Marsh subst<strong>it</strong>ution <strong>of</strong> public<br />

for private for Paul Vixie’s anti-spam service or Micros<strong>of</strong>t’s bodyguards—<br />

asking each <strong>to</strong> give certain minimum due process <strong>to</strong> those <strong>the</strong>y deem bad or

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!