The Next Net

The moment the “net neutrality” debate began was the moment the net neutrality debate was lost. For once the fate of a network – its fairness, its rule set, its capacity for social or economic reformation – is in the hands of policymakers and the corporations funding them – that network loses its power to effect change. The mere fact that lawmakers and lobbyists now control the future of the net should be enough to turn us elsewhere.

Of course the Internet was never truly free, bottom-up, decentralized, or chaotic. Yes, it may have been designed with many nodes and redundancies for it to withstand a nuclear attack, but it has always been absolutely controlled by central authorities. From its Domain Name Servers to its IP addresses, the Internet depends on highly centralized mechanisms to send our packets from one place to another.

The ease with which a Senator can make a phone call to have a website such as Wikileaks yanked from the net mirrors the ease with which an entire top-level domain, like say .ir, can be excised. And no, even if some smart people jot down the numeric ip addresses of the websites they want to see before the names are yanked, offending addresses can still be blocked by any number of cooperating government and corporate trunks, relays, and ISPs.

That’s why ministers in China finally concluded (in cables released by Wikileaks, no less) that the Internet was “no threat.” Continue reading…

Related Posts

Building a Distributed, Decentralized Internet – A Roadmap I know that I'm not Patrick, and I don't pretend to speak for anyone but myself here. I just want to say that I share Patrick's belief in the radical ...
Android Vulnerability: Use Precaution on Public WiFi Yesterday, researchers from Germany’s University of Ulm reported that some Android applications transmit sensitive authentication data without properl...
An Introduction to the Federated Social Network Lately, EFF's work to protect rights and liberties in the online world has focused rather heavily on social networking sites and their policies. The...
Mozilla Leads the Way on Do Not Track Earlier today, Mozilla announced plans to incorporate a Do Not Track feature into their next browser release, Firefox 4.1. Google also announced a new...
Steer clear of Android Market and its DRM Google recently made headlines after they identified some malware being distributed through the Android Market. Not only did they stop distributing t...
Controlling a Computer With Thoughts? Researchers at the University of Pittsburgh have been awarded funding for two projects that will place brain-computer interfaces (BCI) in patients wit...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*