home > archives > ILaw 2003
August 19, 2003
ILAW 2003 - Attendee Interviews - Donna Wentworth

Here's Donna Wentworth on Friday, July 4, 2003, telling us what she thought of the conference.

Of course, Donna was sort of a special attendee -- she took incredible notes and posted for them in near-real time all week long.

Her favorite session (when forced to choose) was the Future of Entertainment: Music panel with the EFF's Fred von Lohmann.


Donna Wentworth On ILAW 2003


Posted by Lisa at 06:36 PM
August 15, 2003
ILAW 2003 - Day 4 - July 3, 2003 - Terry Fisher On Business Method Patents

My notes and 40+ pictures located below.


Terry Fisher On BMPs - Part 1 of 5
(Small - 39 MB)


Terry Fisher On BMPs - Part 2 of 5
(Small - 40 MB)


Terry Fisher On BMPs - Part 3 of 5
(Small - 36 MB)


Terry Fisher On BMPs - Part 4 of 5
(Small - 26 MB)


Terry Fisher On BMPs - Part 5 of 5
(Small - 41 MB)







More pictures underneath notes below.

Day 4 Tape 1

Terry - Business Method Patents

5:05 - different kinds of patents

5:34 - Examples of extensions to patents

6:31 - purified versions of naturally occurring..

10:07 - Plant Protection Act (1930) - asexually producing plants

10:42 - PVPA (1970) - sexually producing

11:09 - 1980 Chakrabarty

"Anything under the sun made by man is patentable." - Terry Fisher

12:02 - Supreme Court - also covered under utility patents

12:15 - 1954 - Atomic Weapons

12:40 - Software patents

13:30 - How surgical procedures were able to be patented

16:40 - Make doctors immune from prosecution

30:42 - Bounty Quest

33:10 - "Inventive Step" requirement

emergence of...

34:30 - In England

35:01 - France

35:12 - Germany

36:20 - Graham Factors

40:07 - ****verify*** Aggietation for Administrative Reform

42:31 - European Initiatives
Prohibited "methods of doing business" - not allowed unless involving "technical aspect"

44:24 - European BMPs
Queue systems

45:13 - Japanese Initiatives

46:00 - "Business Method Patents are a bad idea and we should not use them at all." - Terry

46:45 - Disadvantages of IPR

48:00 - Mousetrap example

50:25 - perfect price disc

Profit maximizing behavior by a rational monopolist

55:30 - people die because of profits

Day 4 - Tape 2

2:29 - Why Business Method Patents are bad

People innovate in Business anyway

Little, if any demonstrative benefits

Increased transaction costs:
-two examiners etc.
-large dead weight losses
-consumers priced out of the market

6:00 Q and A

8:29 Reward Theory

My pythagorus question here

20:00 - How do you define them? (Business Method Patents)

















































































Posted by Lisa at 06:49 PM
August 08, 2003
ILAW 2003 - Day 3 - July 2, 2003 - PM 2 of 2 - The Future Of Entertainment: Music

This panel had the EFF's Fred von Lohmann, Charlie Nesson and Leslie L. Vadasz, Director Emeritus, Intel Corporation on it and was hosted by Jonathan Zittrain.

Music Law Panel - Part 1 of 5
(Small - 49 MB)

Music Law Panel - Part 2 of 5
(Small - 50 MB)

Music Law Panel - Part 3 of 5
(Small - 51 MB)

Music Law Panel - Part 4 of 5
(Small - 51 MB)

Music Law Panel - Part 5 of 5
(Small - 65 MB)

Below: Charlie Nesson (left), Leslie L. Vadasz (middle) and the EFF's Fred von Lohmann (right)


Below: Leslie L. Vadasz (left) and the EFF's Fred von Lohmann (right)


Day 3 Tape 7

5:45 - Fred

9:20 CD singles never sold anyway

19:48 Fred - in the rush to save the pirates?

20:49 - Charlie

29:00 Trusted computing - my question

52:45 Report

53:48 Barton

****

Tape 8

8:19 - Interdiction (Charlie)

14:20 - illegal DDOS

Fred!

Posted by Lisa at 03:24 PM
August 07, 2003
ILAW 2003 Attendee Interviews - Reshmi Sarkarv

Here's an interview with Reshmi Sarkar of IT for Change about the conference and what she learned there.


Reshmi Sarkar At ILAW 2003
(Small - 7 MB)




Posted by Lisa at 12:00 PM
August 05, 2003
ILAW 2003 - Day 3 - July 2, 2003 - PM 1 of 2 - Lessig and Fisher On How Technology, Law and The Market Work Together

Larry explains this session best in his own words:

"Okay, so. We've talked a little bit this morning about the technology affecting content distribution.

Terry gave you, as is typical with Terry, an extrordinary breadth of knowledge about the law affecting content distribution. And what I want to do today in this afternoon's session is to draw together something about that technology and the story about law and the story about the market to give you some idea of what transformation has occured here. A picture of a change that is hard to see unless you synthesize these three different perspectives of "technology," "law" and "the market."

After Larry talks for awhile, he gives the stage back to Terry to elaborate for a bit on a new possible system for paying artists for file sharing distribution of their works.


Larry/Terry On Technology, Law and The Market - Part 1 of 5
(Small - 53 MB)

Larry/Terry On Technology, Law and The Market - Part 2 of 5
(Small - 36 MB)

Larry/Terry On Technology, Law and The Market - Part 3 of 5
(Small - 35 MB)

Larry/Terry On Technology, Law and The Market - Part 4 of 5
(Small - 29 MB)

Larry/Terry On Technology, Law and The Market - Part 5 of 5
(Small - 33 MB)

Day 3 Tape 5 -- Larry

Before this Disney/Steamboat Bill

16:38 - Statute of Anne

17:55 - Extension of copyright term

21:00 - Changes in scope

26:30 - shift to covering previously unregulated uses

29:00 - How technology

30:30 - E books. Larry's book - "can't read aloud."

33:30 - AIBO Dog

34:00 - How DMCA hurts fair use

38:06 - Norman Lear - all in the family

40:30 - Never before has culture been in the hands of so few

44:30 - Eldred case

47:51 - PDEA

54:00 - CC info


Day 3 Tape 6

Rest of Larry
Terry on alternatives for paying artists

8:50 Responses to public goods problem

tfisher.org - document explaining in more detail

14:30 - alternative compensation system
10-digit ID

15:00 taxation



















































Posted by Lisa at 12:51 AM
July 28, 2003
ILAW 2003 - Day 3 - July 2, 2003 - AM 2 of 2 - Terry Fisher - Promises to Keep: Technology, Law, and the Future of Entertainment

In this presentation, Terry Fisher compares the traditional internet distribution models and explains some of the most important case law surrounding it all including the Sony Betamax case and the Napster case.


Terry Fisher On Music Models - Part 1 of 4
(Small - 39 MB)

Terry Fisher On Music Models - Part 2 of 4
(Small - 39 MB)

Terry Fisher On Music Models - Part 3 of 4
(Small - 50 MB)

Terry Fisher On Music Models - Part 4 of 4
(Small - 50 MB)




Day 3 - Tape 3

9:00 - comparing old and new CD models

12:00 2/3 of the costs disappear

14:27 Semiotic democracy

18:00 Moral Rights

32:00 Good slide on music

35:00 my question about retailers and shelf space

todo: ask about "character provision" of compulsory for covering songs -- note: I never followed up on this - but mean to -- lisa rein

42:40 - movies

45:47 - Fair use and Factors

53:03 - non-infringing uses

Day 3 Tape 4

13:34 - CARP

18:15 - Napster

20:00 CD Burning

























































Posted by Lisa at 06:17 PM
July 27, 2003
ILaw 2003 Highlights - Zack Rosen On Americans For Dean

Here are "small" and Hi-res versions of Zack Rosen explaining the Americans For Dean website. This is taken from the blogging panel that took place on Monday, June 30, 2003 in Stanford, CA.

Zack Rosen At ILaw (Small - 12 MB)
Zack Rosen At ILaw (Hi-res - 167 MB)



Posted by Lisa at 06:49 PM
July 24, 2003
ILAW 2003 - Day 3 - July 2, 2003 - AM 1 of 2 - How Technology, Law and the Market Affect The Web's Content Layer

This panel also includes a lot of illegal art so I've included it in the appropriate category.

This is a panel featuring Google's Alex Macgillivray, the Electronic Frontier Foundation's Wendy Seltzer and Glenn Otis Brown of the Creative Commons.

Introduction from Larry:


Yesterday, we focused on the physical layer and the logical layer.

Today, we focus on the content layer. The content layer has two radically different types of content built into it:

1) Content of MP3s and film

2) Content of programs and applications

Today we will walk through the scope of technology affecting *this* type of content and the law affecting on *this* type of content and the market on *this* type of content.

Charlie Nesson was the host for the panel.


Charlie's Content Panel - Part 1 of 4
(Small - 43 MB)

Charlie's Content Panel - Part 2 of 4
(Small - 39 MB)

Charlie's Content Panel - Part 3 of 4
(Small - 44 MB)

Charlie's Content Panel - Part 4 of 4
(Small - 36 MB)

Just a few notes and lots of pictures for this one. This includes excerpts from the Illegal Art film festival and lots of great media clips from all three guests.

Day 3 Tape 1

8:49 - What is P2P with Alex

9:51 - "Democratization of the space"

11:00 - Napster

13:30 - Charlie Nesson as a supernode

20:14 - Fred

***

Day 3 Tape 2

Cut out part around 13:20 - tech diff

21:45 - Lynne Cheney

25:00 Mention of Howard Dean meetup




























Posted by Lisa at 05:52 PM
July 18, 2003
ILAW 2003 - Day 2 - July 2, 2003 - PM 2 of 2 - Internet Governance With Jonathan Zittrain and Terry Fisher

a.k.a - Domain names - How the mess came about

or

"How the Nerds Were Having A Perfectly Good Time Until The Businesspeople And Lawyers Showed Up And Ruined Everything"

This is a tag team lecture by Jonathan Zittrain and Terry Fisher which covers the entire history of domain names from the beginning of the Internet to the present day.


Jonathan and Terry - Part 1 of 4
(Small - 60 MB)

Jonathan and Terry - Part 2 of 4
(Small - 54 MB)

Jonathan and Terry - Part 3 of 4
(Small - 50 MB)

Jonathan and Terry - Part 4 of 4
(Small - 52 MB)

I don't have any notes for this section, but I do have a ton of pictures.







Creative Commons License

This work is licensed under a
Creative Commons License.












































Posted by Lisa at 04:05 PM
ILAW 2003 - Day 2 - July 1, 2003 - PM 1 of 2 - Reed H. Hundt and Leslie Vadasz

This is a placeholder for the brief panel with former FCC Chairman Reed Hundt and Leslie L. Vadasz, Director Emeritus, Intel Corporation that took place during the first part of Tuesday afternoon at ILAW 2003.

I had only recorded a portion of their presentations and the Q and A afterwards, because I hadn't brought enough tape for the entire day and I didn't want to miss the governance tag team with Jonathan Zittrain and Terry Fisher that was scheduled afterwards.

As it turns out, Reed Hundt asked that I not publish his presentation (which was quite a surprise considering that it didn't seem like he had said anything that could be construed as even remotely controversial).

So this entry is just a placeholder for what would have gone here.

Note: Except for Jonathan Zittrain's introductory presentation (Day 1-AM 1) and this presentation (Day 2 - PM 1), my ILAW 2003 video archive will contain the conference in its entirety.

Posted by Lisa at 01:02 PM
July 17, 2003
ILAW 2003 - Day 2 - July 1, 2003 AM 2 Of 2 - Lawrence Lessig On The Importance Of The Web's End To End Architecture

The most important point:


End to end character of the web.

How this was a design choice.

Intelligence is at the edges. Network is simple.

Dominant monopoly can't control/discriminate.
Can't see who people are.
Can't forbid certain uses.

This was a fundamental architectural choice.


Larry On End-to-End - Part 1 of 4
(Small - 69 MB)

Larry On End-to-End - Part 2 of 4
(Small - 59 MB)

Larry On End-to-End - Part 3 of 4
(Small - 81 MB)

Larry On End-to-End - Part 4 of 4
(Small - 74 MB)























Creative Commons License

This work is licensed under a
Creative Commons License.



day 2 tape 3

Larry On End to End Architecture

The end to end character of the logical layer

2:26 - Difference Between AM and FM Radio

4:15 - How Sarnoff Tried to...

AM/FM Radio Backrounder

David Sarnoff vs. Armstrong and RCA

Packet Switching

How AT & T discriminated against any ideas that wouldn't benefit their monopoly.

How competition can be crushed by the dominant network provider.

Excite/AT&T - Dominant cable provider
"Blood sucked from our veins"

9:30 - Innovations that gave birth to the internet

10:50 - All by kids and non-americans

11:52 - Policies and Consequences of Architecture

12:08 - End to end character of the web. How this was a design choice.

Intelligence is at the edges. Network is simple.

Dominant monopoly can't control/discriminate.
Can't see who people are.
Can't forbid certain uses.
This was a fundamental architectural choice.

23:14 - Hourglass model
Note to transcribe some of this...

26:20 - voice over IP

32:15 - Commons - What is a commons

33:30 - Tragedy of the commons

34:30 - rivalrous and non-rivalrous resources

39:40 - Innovation Commons

41:40 - Why the property model makes no sense on the Internet.

How it just doesn't make sense to propertize all resources.

44:35 - Strategic behavior

Competitors do things that benefits them but harms the network

45:40 - Microsoft case - defensive manipulation - note to highlight this

MS stops around 52:00

54:20 - consumer-financial innovation

57:20 - unlicensed spectrum

Day 2 Tape 4

8:00 Media Consolidation

11:00 How the Internet needs to run like the electric network

he mentions my weblog around 12:00

16:20 - Neutral Networks (Note: not "neural" but "neutral"

22:00 - Q and A - why complexity is bad

note: after this point, the numbers are iffy...

27:13 - when property rights aren't appropriate

28:29 - Eldred economists amicus brief - "no brainer."

32:00 - maybe "commons" isn't the right word

not either or but a balance between property and FREE

Eldred wanted to publish his annotated Robert Frost poems.

Note from lisa: people are always asking me what the work was that Eric Eldred was waiting to fall into the public domain that originally brought about the court case. The answer is "Robert Frost poems."

Posted by Lisa at 08:14 AM
July 16, 2003
ILAW 2003 - Day 2 - July 1, 2003 - AM 1 of 2 - Yochai Benkler - Architecture For Non-Technical People

This is from the first session on the second day of ILAW at Stanford, July 1, 2003.

My notes are located beneath the photographs.

Yochai Benkler was as amazing as ever (I've been a big fan since the Spectrum Conference -- note that there's no link there because I still haven't uploaded it...argh...)


Yochai On Architecture - Part 1 of 4
(Small - 62 MB)

Yochai On Architecture - Part 2 of 4
(Small - 62 MB)

Yochai On Architecture - Part 3 of 4
(Small - 50 MB)

Yochai On Architecture - Part 4 of 4
(Small - 16 MB)













Creative Commons License

This work is licensed under a
Creative Commons License.


Lotsa notes on this one:

Day 2 - Tape 1

7:15 - slide of a communications channel

9:57 - one of the things at stake is democracy

What Terry Fisher explained yesterday as "political democracy"

12:00 QOS Dangers

14:10 - innovation

19:00 architecture for non-techs

28:10 - "Monopoly and a half"

31:25 - Thing that changed from the last 100 years

35:50 - Verizon's competitor division makes more money than the entire recording industry

39:35- FCC notice of inquiry

42:00 intra-modal "competition within the mode of transmission"

"Maybe competition between these modes is all we need?" - Yochai

Duopoly...

44:30 - Do two pipelines a competitive market make?

50:00 - Where "the internet" fits into the cable and telecom

51:20 - where wireless fits in

53:50 - Personal Area Networks

Day 2 - Tape 2 (Yochai continued)

:47 - No owner of the network

-No license required

5:01 - old vs. new world

7:50 - "Mary had a little lamb" - example

Smart receivers and how they work.

10:50 - Processing gain

The use of intelligent receivers

12:20 - cooperation gain

14:30 - repeater networks

How they will work like cellphones.

15:10 - multi-user information theory

multi-user detections

16:20 - Does adding users cost nothing because each user adds their own capacity to the network?

We don't know for sure, yet. But it's definitely possible. (paraphrase)

21:00 - "efficient" use of spectrum can't be defined

23:00 - duopoly

25:28 - Trusted systems

27:25 - could be open or closed

How one can control it all if they control one layer.

35:36 - Version putting wifi in its phone booths in NY

Posted by Lisa at 01:22 PM
ILAW 2003 - Day 1 - June 30, 2003 - PM 2 of 2 - Charlie Nesson's Panel On Blogging And Democracy

My notes for this session are included underneath the links to the video files below.

I'll be putting up highlight clips for Terry Fisher's description of the three different kinds of democracy, Zack Rosen's presentation on Americans For Dean, and probably a few other exciting moments.

Charlie Nesson put together an ad hoc panel on Blogging and Democracy. Aaron Swartz, Zack Rosen, yours truly, David Hornik, Colin Mutchler, and Frank Field all participated.


Charlie's Panel - Part 1 of 5
(Small - 44 MB)

Charlie's Panel - Part 2 of 5
(Small - 43 MB)

Charlie's Panel - Part 3 of 5
(Small - 38 MB)

Charlie's Panel - Part 4 of 5
(Small - 44 MB)

Charlie's Panel - Part 5 of 5
(Small - 30 MB)


Notes: Day 1 - Charlie's Panel On Blogging As A Tool Of Democracy

Terry Fisher explaining the different types of democracy.

Three primary meanings:

1) Political Democracy - A political system in which we are governed by laws we ourselves make.

Several parts to this:

1) Elected Officials
2) Frequent and Fair Elections
3) Anyone Can Run
4) Freedom Of Expression
5) Information From Alternative Sources
6) Freedom Of Association

2) Economic Democracy

Three parts to this:

1) Workplace Participation
2) Shape Character Of Products
3) Meaningful Work

3) Semiotic Democracy - Widespreade popular participation in the process of making cultural meanings.



From left to right: Colin Mutchler, Zack Rosen, David Hornik,
Aaron Swartz, Lisa Rein, Frank Field and Charlie Nesson.















Creative Commons License

This work is licensed under a
Creative Commons License.


Posted by Lisa at 07:53 AM
July 09, 2003
ILAW 2003 - Day 1 - June 30, 2003 - PM 1 of 2 - Lawrence Lessig and Jonathan Zittrain On Jurisdiction

In this session, Larry and Jonathan tag team in order to play devil's advocate across an array of Jurisdictional issues, using the situation of accessing porn over the internet and all of the case law surrounding it as the basis for discussion.

Ack! These links were bad this am - should be fixed now!
Lessig and Zittrain - Day 1 - Part 1 of 5 (Small - 53 MB)
Lessig and Zittrain - Day 1 - Part 2 of 5 (Small - 51 MB)
Lessig and Zittrain - Day 1 - Part 3 of 5 (Small - 51 MB)
Lessig and Zittrain - Day 1 - Part 4 of 5 (Small - 50 MB)
Lessig and Zittrain - Day 1 - Part 5 of 5 (Small - 53 MB)













Creative Commons License

This work is licensed under a
Creative Commons License.


Posted by Lisa at 11:41 AM
July 08, 2003
ILAW 2003 - Day 1 - June 30, 2003 - AM 2 of 2 - Lawrence Lessig - Regulation In Meatspace and Cyberspace

About these notes and videos -- how the files are named, etc.

Here's Lessig's own description of the Monday morning sessions:

"The point (of Jonathan's session) is to layout some framework for the technology. And the objective of this second part of the morning is to lay out the framework about how to think through these questions of regulation in the context of cyberspace by thinking through a little bit about the question of regulation in real space."

Larry June 30 - Part 1 of 4 (Small - 81 MB)
Larry June 30 - Part 2 of 4 (Small - 81 MB)
Larry June 30 - Part 3 of 4 (Small - 41 MB)
Larry June 30 - Part 4 of 4 (Small - 45 MB)

















Creative Commons License

This work is licensed under a
Creative Commons License.


Posted by Lisa at 12:18 PM
About These ILAW Videos

I don't have any notes for these opening sessions because I was getting aquainted with following Larry around with the camera.

(Jumpy bunch those ILAW folks! -- Larry, Jonathan, Yochai, Terry, Charlie -- the whole lot of them!)

In the afternoon, I actually got to be on a panel so I had to just get a long shot for most of it (although I did end up going back and forth between being on the panel and getting some close ups when the subject matter was to precious and I knew a long shot wouldn't do.

A bit later, after I was able to get used to things, I was able to take notes while filming. You'll know when this takes place because 1) you'll have the notes and 2) you'll start to notice me missing a shot every now and then when my subject bounces out of view momentarily.

So there are trade-offs, but this whole thing's just a big experiment anyway. So it would appear that no harms done.

I would really appreciate your feedback on this footage. Does it work OK? Can you hear everything? Suggestions for next time? All that kind of stuff is duly appreciated.

Oh yeah -- Every clip is numbered in order, by day (1-day1-larry-1of4-sm.mov, 2-day1-larry-1of4-sm.mov, etc.), so you can just watch them all in order if you like.

See more about this in the "How these files are named and organized" section I'll be putting up soon.

Posted by Lisa at 11:19 AM
ILAW 2003 - Day 1 - June 30, 2003 - AM 1 of 2 - Jonathan Zittrain - Internet Technologies And Why They Matter

This first half of the Monday morning's session is the only session of the conference that I wasn't able to capture on video.

(I hadn't asked if it was OK yet and I felt kind of funny just showing up with a camera.)

Below are my notes...

Notes from the ILaw Conference - June 30, 2003


So I've brought my camera, but I'm sort of waiting for the right time to bust it out.

(Note: since I first wrote this, Larry has given me the OK to tape. So the rest of the sessions will be recorded.)


Until then, you probably want to read Donna's notes, but I'm also going to offer some of my own.


Jonathan Zittrain


Internet Technologies and Why They Matter

I'm prefacing Zittrain's slide language or quotes from his mouth with a "-" to separate them from my notes.


-Code is a powerful form of regulation
-it's subtle
-can't tell when it's regulating you

Example:
The cops were actually directing traffic at the new Crispy Creams opening in Mass.
(Shows where their priorities are.)

-brooks little resistance from the herd


-plastic

-Some current questions:
-Why is it hard to trace people on the Net?
-Why is video streaming such a pain?
-Why are we so vulnerable to viruses and hacks?


-IETF
-IETF "Hourglass" Architecture (CTSB, NRC, "The Internet's Coming of Age" (2001)

-"any task" - "email WWW phone...", SMTP HTTP RTP, TCP, UDP
-IP (in the middle)
-"any medium" -ethernet PPP, CSMA async sonet..., copper fiber radio

Kept the physical infrastructure out of the loop on purpose. The people that do wires can do that. Medium independent for a wide range of media.

At the top of the hourglass are the "applications." Network-aware applications. The point was to allow any kind of application to come about without having to know anything special about the network.


The IETF hums for rough consensus. We did a hum in the room on whether or not we understood what he was saying so far so we could see such a strategy in action.

So no force of law, but an agreement among technologists.

-W3C - how HTML was born.

-The birth of Gnutella
-"Network Neighborhood On Steroids"

-The lesson of the Internet is that efficiency is not the primary consideration. Ability to grow and adapt to changing requirements is the primary consideration.
-This makes simplicity and uniformity ....(ack! he switched slides....you get the message)

Jon Postel - IANA - Internet Assigned Numbers Authority

-Amish barnraising theory of packet transport
-your packet goes to an ISP
-ISP might have an ISP
-this goes on with the russian dolls
-routing packets is just the neighborly thing to do
-you pass on mail with your router even if it isn't for you
-no one to complain to when mail doesn't make it
-persistent problem today

-video streaming model

Lisa Reminds you guys to always download my movies and not try to stream them. Even on a T1 :-)

routers know where to send everything...
-not like fed ex, where everything goes through atlanta.
-this is why the IP addresses are in blocks

different ranges are in different parts of the world so the routers don't have to know exactly where everthing is

-this is why IP addresses are "non-portable"

Now Jonathan is trying to check an email to trace where it came from

So he's starting out with one of those fake AOL emails that tell you to enter your credit card information.

He's looking up the IP address (after getting it from the email header using "traceroute" at the command line)

MAPS is a list of "bad" email IP distributors -- so email administrators can use to "blackhole" certain blocks.

He doesn't get that far. Manages to figure out it was sent from Bulgaria.

Question: How do you get connected to the MAPS?

Answer: If you are an ISP, MAPS for a small fee, will provide you with this service.
You can't just get there whole list. You have to ask an address at a time.

-"You cannot build a corporate network out of TCP/IP." - IBM 1992

-What's Missing?
-quality of service
-accounting and traffic management
-encryption and security


-accounting and traffic management

who pays for what? should it be like the telephone where "caller pays?" very difficult to get a business model.
who's benefiting who more?

-encryption and security

This was something that either relies on the good graces of others...
Routers had to learn to deal with misconfigured computers.

One solution is "end to end." Presume the network will be open. That way you don't have to trust everybody along with way.


-authentication

Knowing that the bucket contents you got came from the place you think it came from
a way to let you know when tampering has taken place (can't prevent it ahead of time)


Question: what does this system cost? How much does the internet cost?

Answer: I have no earthly idea.


Question: How bout equipment costs?

Answer: Well, routers aren't cheap... This is a tough question because it's such a decentralized network.


Graham Freeman - My van can connect to the internet when I flick a switch for about $1500...(paraphrased)

Terry Fisher: Could you say a little bit more about what happens in the Cloud?
(paraphrase - we started out with the Amish and ended up talking about "tier 1 providers." how'd we get there (in the discussion)?

Answer: You're right that there's only a handful of Tier 1 internet providers...


Question: How does the bucket brigade work?

Answer: Roughly speakin the network topology maps on to the geography.
(paraphrase) AOL is the Fed Ex of the internet in that, on dialup, everything goes through a central connection.

Question: is there "smart routing"? - routing that takes in to account when a server is busy(paraphrased)
Barbara Roseman ICANN -
Before I was with ICANN I was with "Global Crossing", one of those T1s that didn't disappear.
(paraphrased) Yes there are paths (on the same network) that they know to take for certain geo areas.

So not over the internet, but within a network you might configure your routers in this way.


Questions: I was hoping you could talk more about the physical lines...

Answers: I'm sorry, security considerations stop me from doing that....(chuckles)
(para) the hourglass makes that transparent (basically)


Caida.org - has "skitter" graphs.

My question: Does Sealand (link) function as a Mae West of sorts?

Answer (para) - no not at all. It's just a data store.

question: so it could actually put more strain on the network?

answer (para) - yes they have to buy their connectiving from someone else...

Encryption in 3 easy steps:

1. "Hello" (is the message) - convert the letters to numbers

2. share password ahead of time with the person receiving the message

H 8 I 9 17
E 5 L12 17
L 12 A 1 13
L 12 W 23 35
0 15 Z 26 41

this is uncrackable.

-old style way of encrypting stuff.
-key has to be same length as original data.
we had to get together secretly and share the key first.


Enter "Pubic Key Encryption"

-Task is to find a one-way function (computationally speaking - function where it is really easy to start one thing and get to another), but for which (computationally speaking) it is hard to do the reverse.
-multiply like lightning, but factor only slowly

-find a one way function
-generate two related keys of one person's use
-declare one key "public key" and the other one "private"

-data + public key = garbage no one can read by no one except someone who has your private key too.


Might want to use your dig signature and PGP key to encrypt and vouch for a message.

-Digital Signature - personal to the very thing being encrypted
-To digitally sign something - to vouch for it "could have only been generated by someone who has access to my private key"

Last question: why viruses so hard?

PC ready to run software.

Most viruses just want to replicate, not erase your hard drive. These are like missles without payloads. The damage to the network is from being clogged up.

Primary reason is that "general purpose computing devices" are meant to run anything, so, they do.

(para nutshell) Because software is coming from so many sources. Sometimes the software can't work with each other.

End of notes for this session -- and end of all notes for me because Larry said I can video the rest of it!

(I actually do take notes later...)

Posted by Lisa at 11:10 AM
July 05, 2003
Damn. My Movie Archive Is Down

No ILAW or any other goodies until it's back up.

I'll be crunching away until then -- so there will be lots to upload when I am able!

(Already have the first session with Larry in the kitty...)

Posted by Lisa at 08:31 AM
July 01, 2003
ILAW 2003 Off To A Great Start

Okay so there's good news and bad news.

The good news is that Larry is letting me film ILAW!

The bad news is that, with me recovering from a cold, an hour commute each way for five days straight, and my having to stand up for most of the sessions (because they get kind of exciting and I have to move the camera around alot between the audience and speakers to get the best coverage of everything), I won't be pulling any late nighters trying to get any of this footage to you before the weekend.

So for now, you should read Donna Wentworth's Coverage and know that it will all be online in due time.

(Yes all five days' worth.)

Cheers!

Posted by Lisa at 07:02 AM