Clay Shirky: RIAA Succeeds Where Cypherpunks Fail 342
scubacuda writes "Clay Shirky has an interesting take on encryption: 'The RIAA is succeeding where the Cypherpunks failed, convincing users to trade a broad but penetrable privacy for unbreakable anonymity under their personal control. In contrast to the Cypherpunks "eat your peas" approach, touting encryption as a first-order service users should work to embrace, encryption is now becoming a background feature of collaborative workspaces. Because encryption is becoming something that must run in the background, there is now an incentive to make its adoption as easy and transparent to the user as possible. It's too early to say how widely casual encryption use will spread, but it isn't too early to see that the shift is both profound and irreversible.'"
Here's a link to the article... (Score:4, Informative)
http://www.shirky.com/writings/riaa_encryption.ht
Re:can someone explain (Score:5, Informative)
what eating peas has to do with encyprtion? I'm totally lost.
Shirky means that using encryption is good for you and that's the approach that proponents (Cypherpunks) have used, even though using encryption has historically been difficult and an unpleasant experience for the average user. Hence the "eat your peas" reference, similar to parents who try to get children to eat vegetables which they find distasteful (an unpleasant dining experience).
How about "Fear of RIAA" (Score:5, Informative)
--
You didn't read the article (Score:5, Informative)
Re:Digging their own graves... (Score:3, Informative)
1. your IP address is still visible (lesser of all)
2. WHO are you trusting to view your files? who's to say it's not a RIAA-mandated agency ?
3. WHO are you trusting to download from?
4. even if you KNOW who you're talking to, if you don't manually verify, on a secure medium, the key used. how do you know there's no middle-man? the dsniff tool widely show this (sshmitm) by assuming users always click "yes" when prompted about unknown or changed hosts keys, that's sysadmins we're talking about, imagine joe-nowhere now?
Re:Cypherpunk is a stupid name (Score:1, Informative)
Re:Interesting, but apathy will prevail (Score:3, Informative)
Re:snake oil (Score:5, Informative)
Where does that claim come from? I'm pretty sure it's not true because more than 10% of encryption is PGP (not counting government crypto, anyway), and PGP isn't snake oil.
It's pretty easy to find snake oil, just read the Doghouse section of Bruce Schneier's monthly Crypto-Gram [counterpane.com]. But there are also a lot of good companies out there providing a lot of crypto solutions (although admittedly most of them actually license the technology from a small handful of good companies, like RSA and Certicom).
Encryption also does little when physical security can't be controlled
But the issue at hand, with regard to the RIAA and anonymity, is about network security. The RIAA finds it much easier to subpoena your ISP than to sneak into your house and steal your USB keys.
Good and ubiquitous crypto certainly isn't the end-all-and-be-all of security, as you point out, but it would indeed make for 'profound and irreversible' changes in the Internet, in the vulnerability landscape, and in the threat models of pretty much everyone on it.
Musicians! "Take back the guitar case!" (Score:5, Informative)
Imagine a 'one-hit wonder' like Normal Greenbaum's "Spirit in the Sky," garnering 7 million or so direct tips for a quarter worth of gold (most tips would probably be more, if you actually liked the song enough to bother tipping the artist, and Norman's old "Spirit in the Sky" tune kinda rocks IMNSHO). I'm talking about more than a million dollars -- AFTER taxes. I have no idea what Norman's made from the song, but I doubt he did that well...
JMR
Speaking ONLY for Jim Ray.
WASTE! (Score:5, Informative)
Re:Seems obvious. (Score:4, Informative)
It only takes one person to break the encryption and put a song up on the net, but if he's likely to get sued/arrested then he'll think twice, and only those "in the know" will know where to go to get the songs.
Re:Speaking of encrypting files (Score:3, Informative)
Win32 only I believe though. At least, last I tried it didn't ask me what target platform the executable should be compiled to
Re:Unbreakable anonymity? (Score:3, Informative)
As long as an arbitrary (untrusted) node can see who the source and destination is, it won't work.
Re:Unbreakable anonymity? (Score:4, Informative)
Sign the packets. Broadcast them, and anyone who receives them broadcasts them to anyone else who's interested. You don't need to hide the fact you're sending packets if there's no way of knowing whether you originated them or not. You're just a part of the network, routing traffic for anyone who's interested. You're no more liable for filtering it than the Tier-1 routers are.
You sent that packet? No I didn't I forwarded it. From whom? Don't know, it's automatic.
Konspire2B
Re:changing laws (Score:2, Informative)
Over the next 5-10 years, I predict that many laws will be completely rewritten to better accommodate the changes that the internet has brought upon society. Many of these changes will be for the better, and the end result will almost certainly be a more free and open society.
Alternative lisencing scemes [creativecommons.org] have already been created, which are the copyright equivalent to the GPL. These alternative copyright systems will compete with full copyright instead of replaceing it. As more and more artists put their work into liberal lisencing scemes it will become harder for others to do business the old fashoned way. The fact that these alternative lisences exsist ensure the future of full copyright, because now producers and consumers have a choice. For this reason there will always be some content locked out of the public domain. Old fashoned copyright law will not change, but it's perseption and proliferation of use will.
Take the Microsoft anti-trust case for example. It's no coinsedence that the issue puttered out at the same time Linux was gaining in popularity. It seems that legal alternatives, (the GPL) and public action beat the government to the punch. For the most part, copyright will follow the same path.
Re:changing laws (Score:3, Informative)
I like the way that John Parry Barlow [eff.org] expresses this idea:
Re:Shirky, Clay Shirky - who the hell is he? (Score:3, Informative)
He's another guy who goes "Big Picture" and "Philosophical" because the nuts and bolts of technology, programming, and in this case encryption are (and always will be) beyond him.
He's a lightweight.
If you're still confused: See "Esther Dyson"
You can't hide the IP's in a P2P network (Score:3, Informative)
Isn't that (Score:4, Informative)
Re:obvious yes... but legal? (Score:3, Informative)
I see that you're not a lawyer... nor a citizen concerned enough to learn about his national laws. There used to be widespreah myths about entrapment, but I thought the illegal-drug culture in the US had spread the truth (as a defensive measure).
Here's a few little facts about entrapment:
Not entrapment: "Here's $20, give me some cocaine".
Entrapment: "Here's $20000, kill that guy"
It also looks like illegal search and seizure--and an unconstitutional invasion of privacy and misuse of private property.
The Constitution only restricts the actions of governments, not private groups like the RIAA. (And it doesn't guarantee privacy either.)