![]() |
#16 |
Reader
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 11,504
Karma: 8720163
Join Date: May 2007
Location: South Wales, UK
Device: Sony PRS-500, PRS-505, Asus EEEpc 4G
|
There is also an html version, downloadable chapter by chapter.
|
![]() |
![]() |
![]() |
#17 | |
Grand Sorcerer
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 7,452
Karma: 7185064
Join Date: Oct 2007
Location: Linköpng, Sweden
Device: Kindle Voyage, Nexus 5, Kindle PW
|
Quote:
|
|
![]() |
![]() |
![]() |
#18 | |
Grand Sorcerer
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 8,478
Karma: 5171130
Join Date: Jan 2006
Device: none
|
Quote:
As we've all seen, that attitude turned out to be a bit naive, though understandably, as the original designers had no idea the web would be utilized as it has been. But if they had built-in even modest security protocols, many of the problems we deal with today, related to viruses, hackers, botnets, etc, could have been easily avoided. And, I think, much of the problems related to intellectual property and copyright issues would also be less of an issue than they are today. |
|
![]() |
![]() |
![]() |
#19 | |
Grand Sorcerer
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 7,452
Karma: 7185064
Join Date: Oct 2007
Location: Linköpng, Sweden
Device: Kindle Voyage, Nexus 5, Kindle PW
|
Quote:
The realized that the could not predict how the net would be used so they took that into account in the design. |
|
![]() |
![]() |
![]() |
#20 |
Grand Sorcerer
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 11,527
Karma: 37057604
Join Date: Jan 2008
Device: Pocketbook
|
(Sets up the soap box...Climbs on it. (Ow, my hips!) Picks up megaphone...(Testing....Testing...) Dodges tomato....)
Finished the book. Waaay too long winded. Should have been 100 pages shorter. On the first part - We got to where we are (malware, viruses, zombies) because most end unit devices were set-up to allow automated remote programs to run on end unit devices. Ladies, Gentlemen, and Stooges, why do you think Java exists!!! It's a variant of C designed explicitly for running programs on a remote machine!!! And everybody thought that it was GOOD! Offload the processing onto the <other> machine. Save money and bandwidth. Steal the machine! (Or at least part of it.) It's OK when the results are what you want, a horror story when it's not. The method is the same. The answer - spike off remote program processing capability, or at least require a manual override to allow any remote program to run, and/or be saved. Yes, Virginia, it can be done without turning every machine into a tethered machine. A tethered machine is a completely different animal. The problem is three-fold. One - It'll use a lot more bandwidth (you want dancing palm trees on your web site? You'll have to sent each change of movement to the receiving machine. No remote program to run creating the waving palm trees on the receiving machine.) Two - It'll take a lot more processing capability at the host end (to create the waving palm tree image.) And Three - no more shoving your choices down other people's machines - Good or Bad!!! That's unforgivable! It doesn't matter whether it's Big Brother or Little Brother or the Mafia, everybody wants to use other people for their own benefit. How dare you stand in their way! So nobody will change the system to solve the problem. (Dodges three tomatoes and a cabbage.) As to the second part - general survelliance - The only way it's going away is if the technology is totally suppressed. And that's not going to happen. The one good thing I can say about it is that it won't be limited to the main power blocs, a la 1984. The little people can spy right back. This in itself puts limits on government reach, but at a high social price. Otherwise, all I can say is - be seeing ya. Brickbat away... |
![]() |
![]() |
![]() |
#21 | ||
Grand Sorcerer
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 8,478
Karma: 5171130
Join Date: Jan 2006
Device: none
|
Quote:
Development would have still happened, assuredly much more slowly... however, it might have been more orderly as well. But all of that is speculation at this point. Quote:
(Not finished the book yet, so I won't go into Zittrain's "solutions" yet.) |
||
![]() |
![]() |
![]() |
#22 |
Grand Sorcerer
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 8,478
Karma: 5171130
Join Date: Jan 2006
Device: none
|
Well, I finished the book late on Friday, so here's my comment:
Although the book nicely (if verbosely) describes the current situation regarding internet lack of security, and the ways in which this will likely lead to a crippled internet in the future... I was disappointed by the fact that the book offers no real solutions to the problem. Instead of giving us ideas or other ways to stop the future train wreck that is today's internet, Zittrain concludes with a description of the potential of Nicolas Negroponte's One Laptop Per Child project, and suggests that we should let these appropriately-empowered children fix the internet for us. This, despite the fact that Zittrain describes in multiple places the human capacity to duck responsibility, misbehave and procrastinate, instead of fixing the problems at hand. Yet he assumes the children from the Third World will step forward and fix our mess with creative programming and an idealistic desire for good. That, and the image on the cover, serves to remind me of a commercial depicting an adult who represents wasteful and polluting humanity, standing on the railroad tracks as the train named Disaster plows down on him, whereupon he steps aside to avoid the train... and we finally see a child standing there behind him, still on the tracks, sadly waiting for the train to run her down. Surprisingly, Zittrain discusses the web's lack of security, and even indicates in places where some establishment of security in the early days of the internet could have prevented viruses, denial-of-service attacks, hacks, ID theft, botnets, and threats to national security. Yet he fails to actually recommend specific applications of security measures to the web, as if the very words are too heinous to utter. Overall, a book that says, very clearly, "Yes, we have a problem"... then finishes with a rendition of "I believe the children are our future, teach them well and let them lead the way..." |
![]() |
![]() |
![]() |
#23 | |
Grand Sorcerer
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 19,832
Karma: 11844413
Join Date: Jan 2007
Location: Tampa, FL USA
Device: Kindle Touch
|
Quote:
BOb |
|
![]() |
![]() |
![]() |
#24 |
Grand Sorcerer
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 8,478
Karma: 5171130
Join Date: Jan 2006
Device: none
|
Considering the "businesses involved" that use the internet for commerce all have their own agendas, we can't depend on them to resolve those problems. Their "resolutions" have so far given us multiple incompatible formats, draconian DRM, exorbitant pricing and more reasons for people to resort to piracy than we can collectively count.
|
![]() |
![]() |
![]() |
#25 | |
New York Editor
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 6,384
Karma: 16540415
Join Date: Aug 2007
Device: PalmTX, Pocket eDGe, Alcatel Fierce 4, RCA Viking Pro 10, Nexus 7
|
Quote:
Early manifestations like Usenet suffered growing pains, because of an implicit assumption that everyone participating had a right to be there and knew how to behave. Back in the days when Usenet sites were mostly universities and the participants mostly professors and grad students, that was a reasonably assumption. As access expanded, it became less reasonable. Newsgroups still exist, but many have migrated to private servers devoted to particular interests where controls can be applied. Hindsight is always 20/20. Had the folks involved in designing what became the Internet known the manner in which it would expand and the uses it would be put to, they might have made different decisions. They didn't, and they didn't. Deal with it. ______ Dennis |
|
![]() |
![]() |
![]() |
#26 |
Grand Sorcerer
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 8,478
Karma: 5171130
Join Date: Jan 2006
Device: none
|
It was still a naive assumption. But you're right, that's neither here nor there. What is important is whether the internet will remain as-is, will it be altered to fix some of its problems, or will its users all stop doing bad things and play nicey-nicey on the web... and how that will affect its future.
|
![]() |
![]() |
![]() |
#27 |
Grand Sorcerer
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 11,470
Karma: 13095790
Join Date: Aug 2007
Location: Grass Valley, CA
Device: EB 1150, EZ Reader, Literati, iPad 2 & Air 2, iPhone 7
|
Actually when the Internet was originally designed there was accountability. IP addresses were all fixed and could easily be traced back to a specific machine. Then Microsoft came along and made dynamic addresses which removed accountability.
Dale |
![]() |
![]() |
![]() |
#28 | |
New York Editor
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 6,384
Karma: 16540415
Join Date: Aug 2007
Device: PalmTX, Pocket eDGe, Alcatel Fierce 4, RCA Viking Pro 10, Nexus 7
|
It was also an assumption made over 40 years ago. Go ahead. Predict the future. Tell me how often you guess right.
Quote:
______ Dennis |
|
![]() |
![]() |
![]() |
#29 | |
New York Editor
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 6,384
Karma: 16540415
Join Date: Aug 2007
Device: PalmTX, Pocket eDGe, Alcatel Fierce 4, RCA Viking Pro 10, Nexus 7
|
Quote:
DHCP provides dynamic addresses, but those addresses are served out of a fixed range allocated to a provider. If you are strongly enough motivated, you can go after the provider to find out which node connected to their service got allocated that particular address. But that still brings you back to the problem that the Internet is a global entity. Contact the operator of a server in Korea which has nodes generating millions of pieces of spam. Tell me how far you get. Uniquely identifying the IP address of a malefactor doesn't mean you can do anything about them, save possibly block that particular address. ______ Dennis |
|
![]() |
![]() |
![]() |
#30 |
Grand Sorcerer
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 11,470
Karma: 13095790
Join Date: Aug 2007
Location: Grass Valley, CA
Device: EB 1150, EZ Reader, Literati, iPad 2 & Air 2, iPhone 7
|
Actually block an address has good use if they were static.
Dale |
![]() |
![]() |
![]() |
Thread Tools | Search this Thread |
|
![]() |
||||
Thread | Thread Starter | Forum | Replies | Last Post |
Download "The Keeper" by Sarah Langan free (all readers) | Dragoro | Deals and Resources (No Self-Promotion or Affiliate Links) | 3 | 10-12-2009 12:18 AM |
Dutch version of "Free" by Chris Anderson available for download | ebookreaders | Deals and Resources (No Self-Promotion or Affiliate Links) | 2 | 07-15-2009 03:41 AM |
Lawrence Lessig's "The Future of Ideas" set free | adinb | Deals and Resources (No Self-Promotion or Affiliate Links) | 10 | 01-21-2008 05:09 AM |
Kevin Kelly's "True Films" 3.0 free e-book download | TadW | Deals and Resources (No Self-Promotion or Affiliate Links) | 2 | 01-15-2008 06:58 AM |
"The Art and Science of Web Design" free download | Colin Dunstan | Deals and Resources (No Self-Promotion or Affiliate Links) | 0 | 07-01-2005 10:16 AM |