17.01.2015 Views

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

208<br />

Solutions<br />

plore more efficient solutions. A spammer can wr<strong>it</strong>e a program <strong>to</strong> fill in all <strong>the</strong><br />

information but <strong>the</strong> captcha, and when <strong>it</strong> gets <strong>to</strong> <strong>the</strong> captcha <strong>it</strong> places <strong>it</strong> in front<br />

<strong>of</strong> a real person trying <strong>to</strong> get <strong>to</strong> a piece <strong>of</strong> information—say on a page a user<br />

might get after clicking a link that says, “You’ve just won $1000! Click<br />

here!” 35 —or perhaps a pornographic pho<strong>to</strong>. 36 The captcha had been copied<br />

that instant from a blog where a spammer’s robot was wa<strong>it</strong>ing <strong>to</strong> leave a comment,<br />

and <strong>the</strong>n pasted in<strong>to</strong> <strong>the</strong> prompt for <strong>the</strong> human wanting <strong>to</strong> see <strong>the</strong> next<br />

page. The human’s answer <strong>to</strong> <strong>the</strong> captcha was <strong>the</strong>n instantly ported back over <strong>to</strong><br />

<strong>the</strong> blog s<strong>it</strong>e in order <strong>to</strong> solve <strong>the</strong> captcha and leave <strong>the</strong> spammed comment. 37<br />

Predictably, companies have also sprung up <strong>to</strong> meet this demand, providing<br />

cus<strong>to</strong>m s<strong>of</strong>tware <strong>to</strong> thwart captchas on a contract basis <strong>of</strong> $100 <strong>to</strong> $5,000 per<br />

project. 38 Generative indeed: <strong>the</strong> abil<strong>it</strong>y <strong>to</strong> remix different pieces <strong>of</strong> <strong>the</strong> Web,<br />

and <strong>to</strong> deploy new code w<strong>it</strong>hout gatekeepers, is crucial <strong>to</strong> <strong>the</strong> spammers’ work.<br />

O<strong>the</strong>r uses <strong>of</strong> captchas are more benign but equally subtle: a project called<br />

reCAPTCHA provides an open API <strong>to</strong> subst<strong>it</strong>ute for regular captchas where a<br />

Web s<strong>it</strong>e might want <strong>to</strong> test <strong>to</strong> see if <strong>it</strong> is a human vis<strong>it</strong>ing. 39 reCAPTCHA creates<br />

an image that pairs a standard, au<strong>to</strong>matically generated test word image<br />

w<strong>it</strong>h an image <strong>of</strong> a word from an old book that a computer has been unable <strong>to</strong><br />

properly scan and translate. When <strong>the</strong> user solves <strong>the</strong> captcha by entering both<br />

words, <strong>the</strong> first word is used <strong>to</strong> validate that <strong>the</strong> user is indeed human, and <strong>the</strong><br />

second is used <strong>to</strong> put <strong>the</strong> human’s computing power <strong>to</strong> work <strong>to</strong> identify one<br />

more word <strong>of</strong> one more book that o<strong>the</strong>rwise would be unscannable.<br />

* * *<br />

What do captchas have <strong>to</strong> do w<strong>it</strong>h privacy New generative uses <strong>of</strong> <strong>the</strong> <strong>Internet</strong><br />

have made <strong>the</strong> solutions proposed for Privacy 1.0 largely inapplicable. Fears<br />

about “mass dataveillance” 40 are not misplaced, but <strong>the</strong>y recognize only part <strong>of</strong><br />

<strong>the</strong> problem, and one that represents an increasingly smaller slice <strong>of</strong> <strong>the</strong> pie. Solutions<br />

such as disclosure 41 or encryption 42 still work for Privacy 1.0, but new<br />

approaches are needed <strong>to</strong> meet <strong>the</strong> challenge <strong>of</strong> Privacy 2.0, in which sens<strong>it</strong>ive<br />

data is collected and exchanged peer-<strong>to</strong>-peer in configurations as unusual as<br />

that <strong>of</strong> <strong>the</strong> spammers’ system for bypassing captchas.<br />

The power <strong>of</strong> centralized databases feared in 1973 is now being replicated<br />

and amplified through generative uses <strong>of</strong> individual data and activ<strong>it</strong>y. For example,<br />

cheap sensors have allowed various gunshot-detecting technologies <strong>to</strong><br />

operate through microphones in public spaces. 43 If a shot is fired, sensors associated<br />

w<strong>it</strong>h <strong>the</strong> microphones triangulate <strong>the</strong> shot’s location and summon <strong>the</strong><br />

police. To avoid false alarms, <strong>the</strong> system can be augmented w<strong>it</strong>h help from <strong>the</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!