Coding Democracy: How Hackers Are Disrupting Power, Surveillance, and Authoritarianism by Maureen Webb
Author:Maureen Webb [Webb, Maureen]
Language: eng
Format: epub, pdf
ISBN: 9780262043557
Google: uajRDwAAQBAJ
Amazon: 0262043556
Publisher: MIT Press
Published: 2020-03-10T00:00:00+00:00
Solid?
Tim Berners-Lee, the inventor of the World Wide Web and Harry Halpinâs boss at the World Wide Web Consortium (W3C), seems to be working on this project. But a pall hangs over the work because Berners-Lee, respected elder statesman and Lorax steward of the internet, recently greenlighted a standard for a mechanism that would implement digital rights management (DRM) on that very web.
In his role as executive director of W3C, Berners-Lee was final arbiter of what the standards councilâs recommendation on this would be, and he tipped in favor of industry wishes to have a standard. The Electronic Frontier Foundation, Richard Stallman, and many others in the hacker and digital rights community fought vigorously against it. There was a stark lack of consensus. In July 2017, a secret vote by members ran 108 for and 57 against, with 20 abstentions, among the 185 members who voted.94 Nevertheless, one man decided the issue. So much for the Lorax style of âconsensusâ governance.
To appreciate what a big issue this now is in the technology world, recall the description of DRM and the Digital Millennium Copyright Act (DMCA) statutory regime provided in chapter 8. Hackers and others against the recommendation argued that the W3C would essentially be endorsing the DRM-DMCA model, making it harder to get the regime repealed. More immediately, it would be blessing the insertion by corporations of âblack boxesâ of code into everyoneâs computer through a standard mechanism, the encrypted media extension (EME), built into their web browsers. Black boxes into which corporations could include, in addition to the copyrighted materials that usersâ wished to access, all their usual malware to dictate terms of use, invade privacy, compromise security, and otherwise take control of usersâ computers. The EME mechanism was designed for video only, but W3C potentially could adopt standards for all kinds of DRM restricted material on the Web, including ebooks, documents, software updates, and pages for web services. Researchers and security experts were prevented from even looking into these black boxes to study what was there because the Digital Millennium Copyright Act made it a crime to do so. The DMCA ran over the rights of âfair useâ people had to study what was in the black boxes and to use the copyrighted material itself for fair-use purposes. It effectively killed fair use, an essential element in any copyright regime that aims to promote innovation and knowledge.
According to hackers and digital rights proponents, DRM, DMCA, and EME broke the architecture of the free and open web, making it insecure and unfixable. If users could not monitor what their browser was admitting into their computer, they were hooped. Browsers are the door to everything on the web. DRM, DMCA, and EME injected the poison of black code into the system and made it criminal to clean up the pollutions it spread. It was a model that potentially encouraged a draconian lockdown of everything on the webâthe gift to humankind that was supposed to be leading us all forward with its model of sharing and abundance.
Download
Coding Democracy: How Hackers Are Disrupting Power, Surveillance, and Authoritarianism by Maureen Webb.pdf
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7806)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6802)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6797)
Running Windows Containers on AWS by Marcio Morales(6318)
Kotlin in Action by Dmitry Jemerov(5089)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5045)
Combating Crime on the Dark Web by Nearchos Nearchou(4620)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4571)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4437)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4311)
The Age of Surveillance Capitalism by Shoshana Zuboff(3977)
Python for Security and Networking - Third Edition by José Manuel Ortega(3873)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3532)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
Learn Wireshark by Lisa Bock(3489)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3353)
Blockchain Basics by Daniel Drescher(3322)
