17.01.2015 Views

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Strategies for a Generative <strong>Future</strong> 185<br />

<strong>of</strong> network secur<strong>it</strong>y ought <strong>to</strong> include <strong>the</strong> endpoints as well as <strong>the</strong> middle <strong>of</strong> <strong>the</strong><br />

network—w<strong>it</strong>h a generative principle <strong>to</strong> determine whe<strong>the</strong>r and when <strong>it</strong><br />

makes sense <strong>to</strong> violate <strong>the</strong> end-<strong>to</strong>-end principle—our far-ranging debates on<br />

network neutral<strong>it</strong>y ought <strong>to</strong> be applied <strong>to</strong> <strong>the</strong> new platforms <strong>of</strong> Web services<br />

that in turn depend on <strong>Internet</strong> connectiv<strong>it</strong>y <strong>to</strong> function. At least <strong>Internet</strong> connectiv<strong>it</strong>y<br />

is roughly commod<strong>it</strong>ized; one can move from one provider <strong>to</strong> ano<strong>the</strong>r<br />

so long as <strong>the</strong>re is sufficient compet<strong>it</strong>ion, or—in an extreme case—one can<br />

even move <strong>to</strong> a new physical location <strong>to</strong> have better options for <strong>Internet</strong> access.<br />

W<strong>it</strong>h open APIs for Web services <strong>the</strong>re is much less portabil<strong>it</strong>y; services built<br />

for one input stream—such as for Google Maps—cannot easily be repurposed<br />

<strong>to</strong> ano<strong>the</strong>r, and <strong>it</strong> may ultimately make sense <strong>to</strong> have only a handful <strong>of</strong> frequently<br />

updated mapping data providers for <strong>the</strong> world, at least as much as <strong>it</strong><br />

can make sense only <strong>to</strong> invest in a handful <strong>of</strong> expensive physical network condu<strong>it</strong>s<br />

<strong>to</strong> a particular geographic location.<br />

Maintaining Privacy as S<strong>of</strong>tware Becomes Service<br />

As Chapter Five explained, <strong>the</strong> use <strong>of</strong> our PCs is shrinking <strong>to</strong> that <strong>of</strong> mere<br />

workstations, w<strong>it</strong>h private data s<strong>to</strong>red remotely in <strong>the</strong> hands <strong>of</strong> third parties.<br />

This section elaborates on that idea, s<strong>how</strong>ing that <strong>the</strong>re is l<strong>it</strong>tle reason <strong>to</strong> think<br />

that people have—or ought <strong>to</strong> have—any less <strong>of</strong> a reasonable expectation <strong>of</strong><br />

privacy for e-mail s<strong>to</strong>red on <strong>the</strong>ir behalf by Google and Micros<strong>of</strong>t than <strong>the</strong>y<br />

would have if <strong>it</strong> were s<strong>to</strong>red locally in PCs after being downloaded and deleted<br />

from <strong>the</strong>ir e-mail service providers.<br />

The latest version <strong>of</strong> Google Desk<strong>to</strong>p is a PC application that <strong>of</strong>fers a “search<br />

across computers” feature. It is advertised as allowing users w<strong>it</strong>h multiple computers<br />

<strong>to</strong> use one computer <strong>to</strong> find documents that are s<strong>to</strong>red on ano<strong>the</strong>r. 40<br />

The application accomplishes this by sending an index <strong>of</strong> <strong>the</strong> contents <strong>of</strong> users’<br />

documents <strong>to</strong> Google <strong>it</strong>self. 41 While networking one’s own private computers<br />

would not appear <strong>to</strong> functionally change expectations <strong>of</strong> privacy in <strong>the</strong>ir contents,<br />

<strong>the</strong> placement or s<strong>to</strong>rage <strong>of</strong> <strong>the</strong> data in o<strong>the</strong>rs’ hands does not hew well <strong>to</strong><br />

<strong>the</strong> doctrinal boundaries <strong>of</strong> privacy protection by <strong>the</strong> U.S. Const<strong>it</strong>ution. These<br />

boundaries treat <strong>the</strong> things one has held on<strong>to</strong> more gingerly than things entrusted<br />

<strong>to</strong> o<strong>the</strong>rs. For example, in SEC v. Jerry T. O’Brien, Inc., 42 <strong>the</strong> Supreme<br />

Court explained: “It is established that, when a person communicates information<br />

<strong>to</strong> a third party even on <strong>the</strong> understanding that <strong>the</strong> communication is<br />

confidential, he cannot object if <strong>the</strong> third party conveys that information or<br />

records <strong>the</strong>re<strong>of</strong> <strong>to</strong> law enforcement author<strong>it</strong>ies. ... These rulings disable respondents<br />

from arguing that notice <strong>of</strong> subpoenas issued <strong>to</strong> third parties is nec-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!