17.01.2015 Views

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Strategies for a Generative <strong>Future</strong> 193<br />

tercultural movement, like that <strong>of</strong> graff<strong>it</strong>i—part <strong>of</strong> <strong>the</strong> point <strong>of</strong> doing <strong>it</strong> is that<br />

<strong>it</strong> is edgy or illegal. It may even make <strong>the</strong> products <strong>of</strong> amateur cultural innovation<br />

less co-optable by <strong>the</strong> mainstream industrial information economy, since<br />

<strong>it</strong> is hard <strong>to</strong> clear rights for an anonymous film packing in images and sounds<br />

from hundreds <strong>of</strong> different sources, some proprietary.<br />

But if prevention <strong>of</strong> commercial explo<strong>it</strong>ation is <strong>the</strong> goal <strong>of</strong> some authors, <strong>it</strong> is<br />

best <strong>to</strong> let <strong>the</strong>m simply structure <strong>the</strong>ir licenses <strong>to</strong> preclude <strong>it</strong>. Authors can opt <strong>to</strong><br />

share <strong>the</strong>ir work under Creative Commons licenses that restrict commercial<br />

reuse <strong>of</strong> <strong>the</strong> work, while perm<strong>it</strong>ting lim<strong>it</strong>less noncommercial use and modification<br />

by o<strong>the</strong>rs. 80<br />

Finding ways through content thickets as Benkler and his cohort suggest is<br />

especially important if te<strong>the</strong>red appliances begin <strong>to</strong> take up more <strong>of</strong> <strong>the</strong> information<br />

space, making information that much more regulable. In a more regulable<br />

space <strong>the</strong> gap between prohib<strong>it</strong>ed uses and <strong>to</strong>lerated uses shrinks, creating<br />

<strong>the</strong> prospect that content produced by c<strong>it</strong>izens who cannot easily clear permissions<br />

for all <strong>it</strong>s ingredients will be squeezed out.<br />

MAINTAINING REGULATORS’ TOLERANCE OF GENERATIVE<br />

SYSTEMS<br />

Individual Liabil<strong>it</strong>y Instead <strong>of</strong> Technology Mandates<br />

As <strong>the</strong> capac<strong>it</strong>y <strong>to</strong> inflict damage on “real world” interests increases w<strong>it</strong>h <strong>the</strong> <strong>Internet</strong>’s<br />

reach and w<strong>it</strong>h <strong>the</strong> number <strong>of</strong> valuable activ<strong>it</strong>ies reliant upon <strong>it</strong>, <strong>the</strong> imperatives<br />

<strong>to</strong> take action will also increase. As both generative and non-generative<br />

devices maintain constant contact w<strong>it</strong>h various vendors and s<strong>of</strong>tware<br />

providers, regula<strong>to</strong>rs may seek <strong>to</strong> require those manufacturers <strong>to</strong> shape <strong>the</strong> services<br />

<strong>the</strong>y <strong>of</strong>fer more precisely, causing a now-familiar wound <strong>to</strong> generativ<strong>it</strong>y.<br />

One way <strong>to</strong> reduce pressure on inst<strong>it</strong>utional and technological gatekeepers is<br />

<strong>to</strong> ensure that individual wrongdoers can be held directly responsible. Some<br />

piecemeal solutions <strong>to</strong> problems such as spam take this approach. ISPs are<br />

working w<strong>it</strong>h makers <strong>of</strong> major PC e-mail applications <strong>to</strong> provide for forms <strong>of</strong><br />

sender au<strong>the</strong>ntication. 81 A given domain can, using public key encryption<br />

<strong>to</strong>ols, au<strong>the</strong>nticate that <strong>it</strong> is indeed <strong>the</strong> source <strong>of</strong> e-mail <strong>it</strong> sends. W<strong>it</strong>h Sender<br />

ID, e-mail purporting—but not proved—<strong>to</strong> be from a user at yahoo.com can<br />

be so trivially filtered as spam that <strong>it</strong> will no longer be worthwhile <strong>to</strong> send. This<br />

regime will hold ISPs more accountable for <strong>the</strong> e-mail that originates on <strong>the</strong>ir

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!