The Kings of Content have always shown an intense and belligerent dislike for new technologies, regardless of their promise or popularity. History is littered with the embarrassing results. Take Jack Valenti.
For over 35 years, Valenti was head of the Motion Picture Association of America (MPAA). In 1982, the studios were in court trying to prevent Sony from shipping a single VCR to the US because of the alleged threat of piracy. Here’s how Valenti famously described the dangers of the VCR to a Congressional committee:
“I say to you that the VCR is to the American film producer and the American public as the Boston strangler is to the woman home alone.”
Update on other reactions to Turcke/Bell (1:10pm): Pete Nowak has his own biting critique in yesterday’s post – If VPN use is theft, then Bell’s CraveTV is extortion. And over at OpenMedia.ca, Josh Tabish has stirred up some really unfriendly reactions on Facebook about the whole fiasco – 181 315 and counting. (When I showed the FP article to my teenage daughter, her eye-rolling reaction was, OMG, as if using a VPN is hacking.)
As I suggested in my last post, some of the conclusions reached at the Rebooting conference will be echoed in the current CRTC proceeding on basic service objectives. Despite all the compelling reasons for reform, however, numerous barriers stand in the way. Some of those discussed at the conference will certainly play a continuing role in the broadband proceeding…
1 – No political will or vision. Short of improbable legislative change, we need something the Harper government is incapable of formulating: a national digital strategy. The CRTC suggested the need for a national strategy six years ago in its new media decision (2009-329, para 78). What we got from the Tories instead was a lousy marketing brochure. Even the opposition parties seem to regard our broadband future as unworthy of serious attention. Continue reading →
Ms Taylor’s old-fashioned apology for Cancon, with its predictable sideswipes at “freeriding” Netflix and marauding pirates, is based on ideology rather than evidence. It completely misconstrues the role of security tools like VPNs, at a time when Canadians should be far more concerned about their privacy and security online than about shelf space on the network for domestic TV shows. Most of all, it treats the Internet like a cultural and economic aberration that’s ruining our TV system, when the aberration is Canada’s bizarre and unworkable framework for broadcasting.
Virtual private networks and why you need one
What the article says about VPNs:
“The latest scheme is to use a virtual private network, or VPN, to trick Netflix into believing you are located in the United States and can thus subscribe to the video-streaming service’s American catalogue….
Internet advocates love to preach choice, diversity and freedom – after all, a VPN can also be used by citizens in China to access content censored by their government.”
A VPN is specialized client software that encrypts online messages, and is said metaphorically to “tunnel” through the public Internet. It’s a “virtual” network because there’s no real tunnel or separate physical network. Your data packets are still co-mingling with other people’s packets, but only you and folks with the authentication tools – like a password – can read those packets. The VPN is said to be private for exactly that reason, like an office behind a locked door. Continue reading →
Here in a nutshell is how things stand a week after my original comments on the hack and Sony’s culpability:
Sony Pictures chair Michael Lynton has even more pointedly dodged any responsibility for the damage caused on November 24.
FBI director James Comey insists more than ever that North Korea engineered the hack.
A high-profile crypto expert, Marc Rogers, has just published a detailed critique of the claims made by the FBI and Sony.
Lynton’s lapses. In an interview last week for ABC News, Chairman Lynton said the following:
“We are the canary in the coal mine, that’s for sure. There’s no playbook for this, so you are in essence trying to look at the situation as it unfolds and make decisions without being able to refer to a lot of you’ve had in the past or other peoples’ experiences. You’re on completely new ground.”
Talk about revisionist history. In case you haven’t read my previous post, I lay out the sordid 10-year history of Sony’s experiences in the so-called “coal mine.” Needless to say, Lynton has a vested interest in getting the audience to believe the November 24 attack came out of the blue. That makes him look less like a failed leader, and probably prevents him sinking even further into legal liability. Here are three highlights of the backstory he conveniently overlooks:
Sony Pictures itself (not the parent company) was hacked – with many of the same awful results – in the summer of 2011. No, November 24 didn’t happen without any “playbook.”
IT consultants hired by Sony Pictures in the summer of 2014 warned of numerous security vulnerabilities in their netwok, which management apparenty ignored.
Sony Corp’s fight with the hacker community began all the way back in 2005, with the Sony rootkit scandal, which produced years of conflict and plenty of guideposts to refer to, if the Lynton squad had been paying attention.
Sony Pictures, the White House and the FBI should get a medal for the greatest political marketing triumph of 2014.
After the horror show following the November 24 hack of Sony Pictures by the Guardians of Peace (GOP), America rallied behind Washington’s theory that Sony was the hapless victim of a Cold War cyberattack. Kim is certainly an easy guy to dislike and no friend of the Americans – no friend of anybody but Kim for that matter. (He comes by it legitimately. His dad and predecessor once had an actor hired to play grandpa Kim Il-sung in a movie role, for which the actor underwent plastic surgery to more closely resemble a Kim; once the shoot was over, the actor was shipped off to a concentration camp.)
The triumph of Cold War marketing over any hint of Sony’s bad behavior is all the more remarkable given the nasty quarrels that have embroiled US stakeholders, press and critics of all stripes. Not to mention the fact that as recently as New Year’s Eve, cryptographer Bruce Schneier and others were still casting doubt on the official claim that the hack was carried out by the Kim regime.
The point of this street-level story is to show how Canada’s broadband oligopoly works in practice, especially the incumbents’ freedom to collect economic rents as ISPs – i.e. charge prices they would never get away with in a competitive market.
Rogers drives a furious customer into the waiting arms of TekSavvy
I’ve known Jacky and Jimmy* for many years (*not their real names). They’re a happy, successful couple raising a terrific teenage daughter. But after months of terrible service as Rogers subscribers, they were anything but happy. In due course I got a phone call from Jimmy, who was beside himself, wanting to be rescued from their ISP hell. And btw, would I still recommend TekSavvy? Continue reading →
Or at least the triumph of depth of experience over outreach and a sense of commonality.
This is the 5th and last of my responses from the 2013-14 edition of the Pew/Elon experts survey on the future of the Internet. I only answered 5 of this year’s 8 questions; my four prior responses are these:
The final Pew question was the only one described as open-ended, i.e. it did not begin with the usual Yes/No binary choice. By the time I was done writing my relatively short response, I was seriously depressed. As Free Press president Craig Aaron said to The Verge’s Nilay Patel: “What we need right now is decisive action. We can still unfuck the Internet.” Sure, but where’s decisive action going to come from? The FCC? The CRTC? Questions for another time. Continue reading →
Partial map of the Internet cloud. Each line joins 2 nodes representing IP addresses.
Pew setup question
The evolution of embedded and wearable devices and the Internet/Cloud of Things – As billions of devices, artifacts, and accessories are networked, will the Internet of Things have widespread and beneficial effects on the everyday lives of the public by 2025?
The visualization of the Internet you see above, while pretty dense and complicated, captures only a fraction of a certain class of networks as they existed nine years ago (i.e., less than 30% of the Class C networks reached by the Opte Project in early 2005). In the intervening time, the number of Internet-connected hosts has increased from less than 400 million to over one billion. But you ain’t seen nuthin’ yet.
This past year marked the mainstreaming – in the public consciousness if not in our actual lives – of devices that are not only a) smart so they can compute, and b) small so they can be worn or embedded, but also c) networked so they can all communicate over the Internet. Judging by press coverage, I’d say the splashiest recent entries have been Google Glass and smart watches. Continue reading →