The Next Net

The moment the “net neutrality” debate began was the moment the net neutrality debate was lost. For once the fate of a network – its fairness, its rule set, its capacity for social or economic reformation – is in the hands of policymakers and the corporations funding them – that network loses its power to effect change. The mere fact that lawmakers and lobbyists now control the future of the net should be enough to turn us elsewhere.

Of course the Internet was never truly free, bottom-up, decentralized, or chaotic. Yes, it may have been designed with many nodes and redundancies for it to withstand a nuclear attack, but it has always been absolutely controlled by central authorities. From its Domain Name Servers to its IP addresses, the Internet depends on highly centralized mechanisms to send our packets from one place to another.

The ease with which a Senator can make a phone call to have a website such as Wikileaks yanked from the net mirrors the ease with which an entire top-level domain, like say .ir, can be excised. And no, even if some smart people jot down the numeric ip addresses of the websites they want to see before the names are yanked, offending addresses can still be blocked by any number of cooperating government and corporate trunks, relays, and ISPs.

That’s why ministers in China finally concluded (in cables released by Wikileaks, no less) that the Internet was “no threat.” Continue reading…

Related Posts

Search leakage is not FUD Lately I've been accused by some of spreading fear, uncertainty and doubt (FUD) by trying to let people know their search terms are being leaked to th...
EFF Brief: “Privacy” Protections for Corporations Undermines Government Transp... EFF and a coalition of public interest groups urged the U.S. Supreme Court in an amicus brief Tuesday to reject so-called "privacy" protections for co...
Steer clear of Android Market and its DRM Google recently made headlines after they identified some malware being distributed through the Android Market. Not only did they stop distributing t...
Android Malware DroidDream: How it Works Yesterday, Google pulled more than 50 apps from the Android Market after they were found to contain the Android malware dubbed DroidDream. Similar to...
Social Media and Law Enforcement: Who Gets What Data and When? This month, we were reminded how important it is that social media companies do what they can to protect the sensitive data they hold from the pryin...
How To Stop Domain Names Being Seized By The US Government As the United States authorities continue with their domain name seizure policy, file-sharing, streaming and link site operators around the world are ...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*