July 27, 2004
Meltdown: IP

I'm at PFIR's "Preventing the Internet Meltdown", where today kicked off with a discussion of intellectual property (the other IP). It was a happy surprise to share the stage with Thane Tierney, of Universal Music Group, who shared our horror at the Induce Act and joined a genuine dialogue about the collision between the Internet and the recording industry. I hope we'll be able to continue that conversation with Thane and others in his business, to move toward a solution that leaves the Internet open to innovation and pays artists and copyright holders.

Also on the panel, Ed Felten commented on the one-way ratchet of copyright legislation; Michael Froomkin called on technologists to spec and build speech-enabling technologies (like Tor); and Carrie Lowe of the ALA called our attention to the copyright-driven inaccessibility of material to libraries and the public they serve. I talked about reclaiming the Internet from amid the copyright-dominated debate in Washington.

Posted by Wendy at 04:27 PM
Meltdown: Day 1

Scott Bradner noted that "the value of conference will be inversely proportional to time spent bashing ICANN." By that standard (and others), the conference got off to a good start, raising bigger questions of governance and regulation: Who makes the rules? and Who says who makes the rules? Since much regulation is about protecting incumbents, watch the regulations (in laws and standards), as well as the regulators who don't understand the technologies they're regulating.

Like Ed Felten, I'm not going to try to summarize, but just to pick up a few points.

  • Chokepoints. Many decisions now are made for us by intermediaries. Can we empower the end-users to make those choices for ourselves? Can we solve the information imperfections to allow market forces to help?
  • Collateral damage of untargeted solutions. Do we really want to respond to spam by putting the government into the middle of end-to-end email? Will we let unwanted email kill off anonymity? The spammers will still break the law, and still find ways to be anonymous, while the innocent end-users' experience is far worse. If we identify email senders to the endpoints, do we make those more attractive targets for zombie attacks?
More to come...

Posted by Wendy at 12:33 PM