Zittrain's "The Future of the Internet" -- how to save the Internet from the Internet

Discuss

26 Responses to “Zittrain's "The Future of the Internet" -- how to save the Internet from the Internet”

  1. zikzak says:

    It’s cool that those devices are hackable, but you have to admit that in the best case that’s because the sole manufacturer decided to add in hackability as a sort of “feature” of the design they produced. The worst case is that it was an unintentional accident uncovered by curious minds.

    Either way, the point is hackability isn’t something that’s inherent in a “tethered device” platform, like it is with PCs. It’s a feature that can be granted and denied by the manufacturer each time they release a product. You may think you’re pretty clever for hacking your XBox to run linux, but if Microsoft doesn’t like that you can be damn sure the next XBox can be made to thwart your hack. Not so with open standards architecture.

  2. Cochituate says:

    To hell with the future of the Internet(s). Where was the book’s cover photo taken? Was it Photoshopped? It looked so very cool.

  3. MarkHB says:

    T100, if you’re thinking that way, then what’s really worth considering is the debasing of education in mathematics and the hard sciences at virtually every level of schooling. The repercussions of that one might actually be linked to the end of the Baby Boom, as the downturn in engineering and science study seems vaguely synchronous with the Boomers passing a certain age.

    Going to be interesting, for sure.

  4. David D. says:

    Mithrandir: “The Internet is pretty much horrible. Probably the invention responsible for the most freaks this side of Thalidomide.”

    Actually, the freaks were already there and always had been. That’s like blaming the telephone for heavy breathers and prank callers.

  5. MarlboroTestMonkey7 says:

    I’ve said it before, you can’t assume everyone is a criminal. Hacking can be both beneficial to the development of a tech as well as a window of opportunity for the evildoer; at most it should prompt further development in order to protect the user, even if -when- such action makes the tech obsolete. Tethering goes against the spirit of investigation and development, slowing progress.
    I want tech that enables me to do more; the ethical compass should always reside on the person, not the corporation.

  6. clarkie604 says:

    Interesting thoughts, but I gotta call you out on the CALEA example. Because it seems like it would be easy for hackers to take advantage of the back door and they haven’t for whatever reason — the example support’s Zittrain’s position.

    My problem with the whole theory is that, I think, the world includes and will continue to include both generative and nongenerative options. Even as Tivo, Microsoft and others, with or without the government’s help, limit user customization, the marketplace provides alternatives. Your grandma gets her Comcast box – easy to set up and run – and you get your Linux-based media center PC – which takes a little more work. There is no reason that customization won’t be available for those that want it.

    But great review – I’m ordering the book right now.

  7. padster123 says:

    Great review/article – thanks Cory.

  8. Pieps says:

    @Wizardru #6:
    Ah, but that doesn’t jive with Zittrain’s definition of “generativity”. Check out page 71 of his book here (warning: PDF link).

    I agree that a hackable appliance is better than a locked-down appliance, but gadget-makers need to understand that being hostile to those who want to leverage the features of their products is counterproductive.

  9. t100 says:

    Sounds like a very interesting book. But, what’s going to happen in the US, when all the baby boomers are 60, 70 and older. I’m at the tail end of the boomers. People are going to live longer/no one seems to think about the huge # of old timers/the net/gadgets. They use computers etc.. But, at some point, it will have an impact. I already complain that my phone is so small can’t see the numbers without reading glasses. I’m only 43. Just a thinker…wondering if any one has any thoughts on the subject.

  10. Mithrandir says:

    David D.:

    Ahhhh, but the telephone had legitimate uses too.

  11. mattbots says:

    Mithandir: So your claim is that the internet has no legitimate uses.

    Recommended reading:
    http://en.wikipedia.org/wiki/Troll_(Internet)

  12. MarkHB says:

    Wht fnd rthr ntrgng s th prlll btwn ths nd th rgmnts sd t spprt th rght t kp nd br rms n th S: Th vst mjrty f gn wnrs r lw-bdng, nc ppl wh dn’t g ‘rnd mggng, mrdrng nd gnrlly bng hrrbl.

    Gn cntrl dsrms vryn nltrlly – I suppose the UK’s knife-crime rash would be the unpleasant equivalent of illegally backdooring into phone switches and other tethered devices, from a purely meme-equivalence viewpoint.

    I guess it all comes down to the simple fact that you can’t stop people from abusing things just by regulating them.

    (I’m not pretending to have any answers here, I’m just riffing thoughts).

  13. Antinous says:

    MarkHB,

    Please do not post any more comments about gun control in threads that are not about gun control.

  14. Anonymous says:

    On the phone call monitoring mentioned…

    Italy had some very large issues with compromised monitoring services a couple years ago.

    http://www.tscmvideo.com/News/cellular-wiretapping-phone-taps-news.html

    Or google “italy vodaphone eavesdropping”. I see later speculation was that it was the NSA.

  15. proto says:

    If you check Jonathan Zittrain’s web site, not only will you find a downloadable .pdf, but a couple experimental formats — futureoftheinternet.org/download

    Most exciting is the one with a group running an open annotation project using the Diigo system.

    I like this! It really seems to me the next logical step in book publishing, where your work basically becomes the framework for a wiki.

  16. Pam Rosengren says:

    I haven’t finished the book yet, but I agree with Cory that the backlash isn’t “being driven by identity thieves and spyware vendors”, the backlash is being driven by corporate and state interests. However, those bad guys (the first ones mentioned) provide the ideal way to get internet users to happily accept changes which will reduce the generativity of the PC/internet. So I think Cory and Zittrain are both right.

    I am finding Zittrain’s concept of generativity most interesting; same for the way he visualises layers of networks. I’d like to see people do more of this kind of analysis in relation to, for example, the music industry and the excesses of copyright. Zittrain touches only lightly on the content and social layers of the network (as far as I have read), but I’m sure his conceptual frame will be very useful there.

    My rating: essential, thought provoking reading.

  17. joly says:

    Video of NYC book launch: http://www.isoc-ny.org/?p=195

  18. Anonymous says:

    In any invention there is a plus and minus. We have to use it positively.

  19. PeterNBiddle says:

    Yay! Another great blog post! W007!

  20. downdb says:

    “More importantly, I disagree about the security offered by tethered appliances.”

    I disagree also, but if you substitute “perceived security” for actual security, Zittrain’s claim stands. I’d also add to that the perceived simplicity of tethered/dedicated devices for the average user.

    Sure, I enjoy setting up a Linux-based media center PC, but my mother-in-law is perfectly happy to have Time-Warner come out and install her set-top box for her.

  21. Anonymous says:

    Most of my simple websurfing I now do on my Wii – in fact, I’m doing it now! – because many of the benefits in using the pc have evaporated – windows is so bloated that I can’t even surf and listen to mp3s at the same time, and *nix doesn’t have the other apps I like to use. I also do support, and for the technical illiterate, especially if it’s a guy (pr0n) I would recommend it in an instant. Granted, the more flash 8+ is out there, the less convenient it is, but for the basics including youtube it works great!

  22. Anonymous says:

    My point in the previous post is that all web-appliance behaviour is not bad – as with any tool, you must know its limits. I personally can’t imagine not having a pc for more creative or complicated tasks.

  23. Mithrandir says:

    The Internet is pretty much horrible. Probably the invention responsible for the most freaks this side of Thalidomide.

    I say, let it burn.

  24. dewexdewex says:

    What was on the other side of Thalidomide?

  25. Memory Harker says:

    Ah, but Cory …

    “… but I disagree … I think it’s being driven by the same authoritarian urge that gave rise to all the other spying and control laws that have been passed for centuries.”

    Yes, of course. But certainly that urge is driven by fear in the first place ~ fear of identity thieves and spyware hackers, for two things, and many other things available for activating a hair-trigger fight-or-flight response (if not an actual paranoid abreaction) …

    Call me optimistic about human nature (What? Nevar!), but I reckon that most authoritarian types get that way through fear (at least originally) rather than through some basic, twisted love-of-squashing-freedom. Note that I do say “most,” and suggest that in any case it’s, well, it’s too fucking bad that some people are so easily motivated by (validly triggered or not) fear. Especially when they’re in a position to affect the rest of us.

    However: Hell of a fine short review, sir. Always good to read a piece where the reviewer disagrees with the author in places and yet still makes one want to read the book.

  26. WizarDru says:

    I disagree that tethered appliance aren’t generative, too. Quite the opposite, in fact.

    The original X-box and the TiVo are considered to be hacker’s paradises. There is an entire cottage industry surrounding modifying the TiVo for more capacity and adding devices to it. Yes, that’s because TiVo encourages such behavior (or used to and now just tolerates it, instead). But Microsoft had no idea how far people would mod their box and subvert it. Even a device like a Roomba can and has been hacked for other purposes.

    There may be additional steps, but once the genie is out of the bottle, technology-wise, generative behaviors begin.

Leave a Reply