17.01.2015 Views

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

298<br />

Notes <strong>to</strong> Pages 162–68<br />

18. See Wikipedia, Blue Screen <strong>of</strong> Death, http://en.wikipedia.org/wiki/Blue_screen_<strong>of</strong>_<br />

death (as <strong>of</strong> June 1, 2007, 09:30 GMT).<br />

19. See supra Ch. 5, at 119.<br />

20. See Jonathan Z<strong>it</strong>train, A His<strong>to</strong>ry <strong>of</strong> Online Gatekeeping, 19 HARV. J.L. & TECH. 253<br />

(2006).<br />

21. See David P. Reed et al., Active Networking and End-<strong>to</strong>-End Arguments, IEEE NETWORK,<br />

May/June 1998, at 69–71, available at http://web.m<strong>it</strong>.edu/Saltzer/www/publications/<br />

end<strong>to</strong>end/ANe2ecomment.html.<br />

22. See Marjory S. Blumenthal, End-<strong>to</strong>-End and Subsequent Paradigms, 2002 L. REV.<br />

M.S.U.-D.C.L. 709, 717 (2002) (remarking that end-<strong>to</strong>-end arguments “interact w<strong>it</strong>h<br />

economics, public policy, and advocacy dynamically <strong>to</strong> shape access <strong>to</strong> communication<br />

and information and <strong>to</strong> influence innovation”).<br />

23. See infra Ch. 8, note 8.<br />

24. See Jonathan Z<strong>it</strong>train, The Generative <strong>Internet</strong>, 119 HARV. L. REV. 1974, 1988–89<br />

(2006).<br />

25. See Saul Hansell, Spam Fighters Turn <strong>to</strong> Identifying Leg<strong>it</strong>imate E-Mail, N.Y. TIMES, Oct.<br />

6, 2003, at C1 (discussing au<strong>the</strong>ntication and o<strong>the</strong>r possible solutions for lim<strong>it</strong>ing<br />

spam); Yakov Shafranovich, 2004: The Year That Promised Email Au<strong>the</strong>ntication, CIR-<br />

CLEID, Dec. 27, 2004, http://www.circleid.com/posts/2004_<strong>the</strong>_year_that_promised_<br />

email_au<strong>the</strong>ntication (discussing various e-mail au<strong>the</strong>ntication proposals <strong>to</strong> lim<strong>it</strong> spam<br />

on <strong>the</strong> receiving end); see also Saul Hansell, 4 Rivals Near Agreement on Ways <strong>to</strong> Fight<br />

Spam, N.Y. TIMES, June 23, 2004, at C1 (discussing approaches <strong>to</strong>ward au<strong>the</strong>ntication<br />

proposed by major ISPs).<br />

26. See, e.g., JOHANNES ULLRICH, INTERNET SERVICE PROVIDERS: THE LITTLE MAN’S FIRE-<br />

WALL (2003), http://www.sans.org/reading_room/special/index.phpid=isp_blocking<br />

(providing a case study <strong>of</strong> traffic filtering by ISPs).<br />

27. See John Mark<strong>of</strong>f, Attack <strong>of</strong> <strong>the</strong> Zombie Computers Is a Growing Threat, Experts Say, N.Y.<br />

TIMES, Jan. 7, 2007, § 1, at 1.<br />

28. See Ryan Naraine, Micros<strong>of</strong>t Says Recovery from Malware Becoming Impossible, EWEEK<br />

.COM, Apr. 4, 2006, http://www.eweek.com/article2/0,1895,1945808,00.asp.<br />

29. See, e.g., S<strong>to</strong>pBadware.org Identifies Companies Hosting Large Numbers <strong>of</strong> Webs<strong>it</strong>es<br />

That Can Infect <strong>Internet</strong> Users w<strong>it</strong>h Badware, S<strong>to</strong>pBadware.org, May 3, 2007, http://<br />

s<strong>to</strong>pbadware.org/home/pr_050307 (discussing <strong>the</strong> <strong>to</strong>p five hosting providers in <strong>the</strong>ir<br />

clearinghouse and pointing out that while providers were <strong>of</strong>ten quick <strong>to</strong> help Web s<strong>it</strong>e<br />

owners clean <strong>the</strong> code, <strong>the</strong>y were unprepared <strong>to</strong> answer cus<strong>to</strong>mers’ questions about vulnerabil<strong>it</strong>ies<br />

that perm<strong>it</strong>ted hacks in <strong>the</strong> first place).<br />

30. See Reinier H. Kraakman, Gatekeepers: The Ana<strong>to</strong>my <strong>of</strong> a Third-Party Enforcement Strategy,<br />

2 J.L. ECON. & ORG. 61 (1986) (identifying four cr<strong>it</strong>eria for <strong>the</strong> appropriateness <strong>of</strong><br />

legal intervention: “(1) serious misconduct that practicable penalties cannot deter; (2)<br />

missing or inadequate private gatekeeping incentives; (3) gatekeepers who can and will<br />

prevent misconduct reliably, regardless <strong>of</strong> <strong>the</strong> preferences and market alternatives <strong>of</strong><br />

wrongdoers; and (4) gatekeepers whom legal rules can induce <strong>to</strong> detect misconduct at<br />

reasonable cost”).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!