Download - Future of the Internet â And how to stop it.
Download - Future of the Internet â And how to stop it.
Download - Future of the Internet â And how to stop it.
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
298<br />
Notes <strong>to</strong> Pages 162–68<br />
18. See Wikipedia, Blue Screen <strong>of</strong> Death, http://en.wikipedia.org/wiki/Blue_screen_<strong>of</strong>_<br />
death (as <strong>of</strong> June 1, 2007, 09:30 GMT).<br />
19. See supra Ch. 5, at 119.<br />
20. See Jonathan Z<strong>it</strong>train, A His<strong>to</strong>ry <strong>of</strong> Online Gatekeeping, 19 HARV. J.L. & TECH. 253<br />
(2006).<br />
21. See David P. Reed et al., Active Networking and End-<strong>to</strong>-End Arguments, IEEE NETWORK,<br />
May/June 1998, at 69–71, available at http://web.m<strong>it</strong>.edu/Saltzer/www/publications/<br />
end<strong>to</strong>end/ANe2ecomment.html.<br />
22. See Marjory S. Blumenthal, End-<strong>to</strong>-End and Subsequent Paradigms, 2002 L. REV.<br />
M.S.U.-D.C.L. 709, 717 (2002) (remarking that end-<strong>to</strong>-end arguments “interact w<strong>it</strong>h<br />
economics, public policy, and advocacy dynamically <strong>to</strong> shape access <strong>to</strong> communication<br />
and information and <strong>to</strong> influence innovation”).<br />
23. See infra Ch. 8, note 8.<br />
24. See Jonathan Z<strong>it</strong>train, The Generative <strong>Internet</strong>, 119 HARV. L. REV. 1974, 1988–89<br />
(2006).<br />
25. See Saul Hansell, Spam Fighters Turn <strong>to</strong> Identifying Leg<strong>it</strong>imate E-Mail, N.Y. TIMES, Oct.<br />
6, 2003, at C1 (discussing au<strong>the</strong>ntication and o<strong>the</strong>r possible solutions for lim<strong>it</strong>ing<br />
spam); Yakov Shafranovich, 2004: The Year That Promised Email Au<strong>the</strong>ntication, CIR-<br />
CLEID, Dec. 27, 2004, http://www.circleid.com/posts/2004_<strong>the</strong>_year_that_promised_<br />
email_au<strong>the</strong>ntication (discussing various e-mail au<strong>the</strong>ntication proposals <strong>to</strong> lim<strong>it</strong> spam<br />
on <strong>the</strong> receiving end); see also Saul Hansell, 4 Rivals Near Agreement on Ways <strong>to</strong> Fight<br />
Spam, N.Y. TIMES, June 23, 2004, at C1 (discussing approaches <strong>to</strong>ward au<strong>the</strong>ntication<br />
proposed by major ISPs).<br />
26. See, e.g., JOHANNES ULLRICH, INTERNET SERVICE PROVIDERS: THE LITTLE MAN’S FIRE-<br />
WALL (2003), http://www.sans.org/reading_room/special/index.phpid=isp_blocking<br />
(providing a case study <strong>of</strong> traffic filtering by ISPs).<br />
27. See John Mark<strong>of</strong>f, Attack <strong>of</strong> <strong>the</strong> Zombie Computers Is a Growing Threat, Experts Say, N.Y.<br />
TIMES, Jan. 7, 2007, § 1, at 1.<br />
28. See Ryan Naraine, Micros<strong>of</strong>t Says Recovery from Malware Becoming Impossible, EWEEK<br />
.COM, Apr. 4, 2006, http://www.eweek.com/article2/0,1895,1945808,00.asp.<br />
29. See, e.g., S<strong>to</strong>pBadware.org Identifies Companies Hosting Large Numbers <strong>of</strong> Webs<strong>it</strong>es<br />
That Can Infect <strong>Internet</strong> Users w<strong>it</strong>h Badware, S<strong>to</strong>pBadware.org, May 3, 2007, http://<br />
s<strong>to</strong>pbadware.org/home/pr_050307 (discussing <strong>the</strong> <strong>to</strong>p five hosting providers in <strong>the</strong>ir<br />
clearinghouse and pointing out that while providers were <strong>of</strong>ten quick <strong>to</strong> help Web s<strong>it</strong>e<br />
owners clean <strong>the</strong> code, <strong>the</strong>y were unprepared <strong>to</strong> answer cus<strong>to</strong>mers’ questions about vulnerabil<strong>it</strong>ies<br />
that perm<strong>it</strong>ted hacks in <strong>the</strong> first place).<br />
30. See Reinier H. Kraakman, Gatekeepers: The Ana<strong>to</strong>my <strong>of</strong> a Third-Party Enforcement Strategy,<br />
2 J.L. ECON. & ORG. 61 (1986) (identifying four cr<strong>it</strong>eria for <strong>the</strong> appropriateness <strong>of</strong><br />
legal intervention: “(1) serious misconduct that practicable penalties cannot deter; (2)<br />
missing or inadequate private gatekeeping incentives; (3) gatekeepers who can and will<br />
prevent misconduct reliably, regardless <strong>of</strong> <strong>the</strong> preferences and market alternatives <strong>of</strong><br />
wrongdoers; and (4) gatekeepers whom legal rules can induce <strong>to</strong> detect misconduct at<br />
reasonable cost”).