Pluralistic: 31 Jan 2022


Nenad Stojkovic, CC BY 2.0, modified/Ed Webster, CC BY 2.0.

Today's links

Continue reading "Pluralistic: 31 Jan 2022"

The Inevitability of Trusted Third Parties

The search for a crypto use-case continues

Monroe H. Rosenfeld, “Finnegan the Umpire,” courtesy of Library of Congress

“Did you know that 87% of all conversations about blockchain technology are nonconsensual?”

It’s already an old joke, but it’s sure aged well.

Hardly a day goes by without someone demanding that I listen to their explanation of their blockchain idea. A lot of times, I listen. Look, a lot of people I consider to be smart and thoughtful are really excited by this stuff, and I know them well enough to believe them when they say they’re not excited about the possibility that they can get in on the ground floor of a Ponzi scheme and exit with a bunch of suckers’ money.

Continue reading "The Inevitability of Trusted Third Parties"

Pluralistic: 30 Jan 2022


Today's links

Continue reading "Pluralistic: 30 Jan 2022"

Pluralistic: 29 Jan 2022


Today's links

Continue reading "Pluralistic: 29 Jan 2022"

Pluralistic: 28 Jan 2022


Today's links

Continue reading "Pluralistic: 28 Jan 2022"

Pluralistic: 27 Jan 2022


Today's links

Continue reading "Pluralistic: 27 Jan 2022"

A Bug in Early Creative Commons Licenses Has Enabled a New Breed of Superpredator

Copyleft trolls, robosigning, and Pixsy.

A hand on a multibutton mouse, the body behind it is blurred and out-of-focus; a larger “DANGER” label in red, white and black, has been superimposed over it. Nenad Stojkovic (modified) https://commons.wikimedia.org/wiki/File:Hand_on_the_computer_mouse_-_50202556601.jpg CC BY 2.0: https://creativecommons.org/licenses/by/2.0/deed.en

Here’s a supreme irony: the Creative Commons licenses were invented to enable a culture of legally safe sharing, spurred by the legal terror campaign waged by the entertainment industry, led by a literal criminal predator who is now in prison for sex crimes.

But because of a small oversight in old versions of the licenses created 12 years ago, a new generation of legal predator has emerged to wage a new campaign of legal terror.

To make matters worse, this new kind of predator specifically targets people who operate in good faith, only using materials that they explicitly have been given permission to use.

What a mess.

Continue reading "A Bug in Early Creative Commons Licenses Has Enabled a New Breed of Superpredator"

The Internet Heist (Part III)

We are family

The anti-piracy “You Wouldn’t Steal A Car” title-card, modified to read “You Wouldn’t Steal the Future.”
FACT (modified)

Note: This is Part III in a series; Part I is here, Part II is here.

Even today, I can’t tell if the entertainment execs and their tech collaborators that I sparred with in the DRM wars were brilliant schemers or overconfident fools.

When these men — almost all men — set out to create laws that would give their corporations a collective veto over which programs all computers could run, and which real-world data could be captured by computers, were they really doing it all for the sake of controlling how we watch TV? Or did they grasp just how this power over our digital tools would translate into control over our lives in an increasingly digital era?

I still don’t know. It’s easy to believe in unlimited corporate hubris, but it’s just as easy to believe in unlimited corporate foolishness. What’s more, it’s possible that some of the players were along for the ride, while others had a very precise understanding of the stakes.

What were those stakes?

Well, for starters, how about the definition of “the family.”

Continue reading "The Internet Heist (Part III)"

Pluralistic: 10 Jan 2022


Today's links

Continue reading "Pluralistic: 10 Jan 2022"

The Internet Heist (Part II)

From broadcast flags to the analog hole

The anti-piracy “You Wouldn’t Steal A Car” title-card, modified to read “You Wouldn’t Steal the Future.”
FACT (modified)

Note: This is Part II in a series; Part I is here, Part III is here.

Last week, I began the story of the Broadcast Flag, a law that would make it illegal to build a general-purpose computer unless it conformed to a set of privately negotiated restrictions. The law had been promised by Billy Tauzin, then a lavishly corrupt Congressman, and its contours were being hammered out in an inter-industry body called the Broadcast Protection Discussion Group (BPDG), convened by the MPAA and attended by movie studios, TV studios, broadcasters, consumer electronics companies, and PC companies.

Continue reading "The Internet Heist (Part II)"