182 overview lecture

advertisement
Technical and Social Foundations of
the Internet
Compsci 182s, Spring 2011 Overview
overview.1
IP2: Two points of view


Inte[llectual|rnet] Pro[perty|tocol]
What is the Internet Protocol?




Who made it, how did they make it
Why has it been successful
What is its future, what are the issues
What is Intellectual Property?


From a US-centric point of view
From a WIPO/world point of view
Compsci 182s, Spring 2011 Overview
overview.2
Internet: Who, What, Where, When

What is IPv4? Who created it? IPv6?

Who governs the Internet?

What is a domain name?

What is a cookie?

What is the DMCA?

What is DNS? ICANN?

What is common to: IP, SMTP, BGP, HTTP?
Compsci 182s, Spring 2011 Overview
overview.3
Technical and Social Foundations

What is the Internet?



According to … Wikipedia
According to Jon Stewart and Ted Stevens
A collection of autonomous systems (AS)s




Network of networks
How do these networks communicate?
Country level, company level, …
Until 2007, 16-bit AS numbers, now 32 bits
Compsci 182s, Spring 2011 Overview
overview.4
Communication on the Internet

AS level, communication between AS's




Send email from Duke to Malaysia
visualroute.visualware.com
What names and numbers are involved?
Duke has ASN 13371




what is an ASN for YouTube?
AS communicates with neighbors using BGP
Computers on the internet communicate with IP
Mail works because of SMTP
Compsci 182s, Spring 2011 Overview
overview.5
Can the Internet break?

Internet Glitch Can Strand You
Similar incidents in the past
 What about this phrasing?
The upstream carrier accepted the routing message,
and passed it along to other carriers across the
world, which started sending all requests for
YouTube videos to Pakistan Telecom. Soon, even
Internet users in the U.S. were deprived of videos
of singing cats and skateboarding dogs for a few
hours.
 Did Pakistan hijack YouTube intentionally?

Compsci 182s, Spring 2011 Overview
overview.6
Internet Protocol RFC 791, 1981
http://www.ietf.org/rfc/rfc791.txt
The internet protocol is specifically limited in scope to
provide the functions necessary to deliver a package of
bits (an internet datagram) from a source to a
destination over an interconnected system of networks.
There are no mechanisms to augment end-to-end data
reliability, flow control, sequencing, or other services
commonly found in host-to-host protocols. The internet
protocol can capitalize on the services of its supporting
networks to provide various types and qualities of
service.
Compsci 182s, Spring 2011 Overview
overview.7
Internet Protocol RFC 791, 1981
http://www.ietf.org/rfc/rfc791.txt
A distinction is made between names,
addresses, and routes [4]. A name indicates
what we seek. An address indicates where it is.
A route indicates how to get there. The internet
protocol deals primarily with addresses.
Compsci 182s, Spring 2011 Overview
overview.8
An address indicates where it is

IPv4 address: dotted quad







dig www.cnn.com : 157.166.224.25
Why do we use name and not address?
Quad part: 0-255, note that 28=256
Why is this a 32-bit address? What’s a bit?
Limitations of 32 bits?
DNS: map name to address
Routers: map address to route
Compsci 182s, Spring 2011 Overview
overview.9
Internet Addresses and Routing
Thinkgeek.com
Compsci 182s, Spring 2011 Overview
overview.10
Jon Postel






Size matters
DNS
Names
Numbers
ICANN
U.S.A. v World
Photo by Irene Fertik, USC News Service.
Copyright 1994, USC. Permission granted for free use and distribution,
conditioned upon inclusion of the above attribution and copyright notice.
Froomkin, Wrong Turn in Cyberspace
Compsci 182s, Spring 2011 Overview
overview.11
What is IPv6?

What is the 6 in IPv6? Is Vint Cerf in on it?




When will the Internet stop growing?
What did Chicken Little say?
Who made up IPv4 and IPv6?
Difference between 32 bits and 128 bits?


232 = 4,294,967,296
2128 =340,282,366,920,938,463,463,374,607,431,768,211,456
Compsci 182s, Spring 2011 Overview
overview.12
Google and Scale

# Queries/day?

How does Google
make money?

What about privacy?
Picture of Original Server (Stanford)

What about gmail?
Compsci 182s, Spring 2011 Overview
overview.13
Who are Sergey and Larry?
What is google.org?
Compsci 182s, Spring 2011 Overview
overview.14
Niklas Zennstrom and Janus Friis

Kazaa, Skype, Rdio

Transforming Society

Buy, Sell, Buy, Sue


Google phone

Compsci 182s, Spring 2011 Overview
eBay and Skype
August 26, 2010!
overview.15
Estimates and Sources

How many packages does Fedex ship a day
through Memphis, TN?


How many packets are sent each day over
the Internet?


Verifiable?
Verifiable?
How many cell phone calls made each day?

Verifiable?
Compsci 182s, Spring 2011 Overview
overview.16
Questions
Compsci 182s, Spring 2011 Overview
overview.17
Bits and Atoms

How do send a letter? A phone call? A
certified letter? An Internet Packet?


I want to watch Hot Tub Time Machine




Are there differences?
Right now vs. tomorrow, in my living room
Netflix, Amazon, Pirate Bay/isohunt, Rapidshare
Shipping bits or atoms? Differences?
Negroponte's Being Digital
http://bit.ly/12xV0f
 “Worse, a book can go out of print. Digital books
never go out of print. They are always there.” overview.18
Compsci 182s, Spring 2011 Overview

Bits and Atoms again

Amazon, Kindle, 1984

July, 2009
Compsci 182s, Spring 2011 Overview
overview.19
Comparing Bits and Atoms

Number of atoms in the observable universe



Where do you find an answer to this?
What about atoms on Earth? Different?
Number of IPv6 addresses



Where do you find this out?
How does compare to IPv4?
What is the v in IPv?
Compsci 182s, Spring 2011 Overview
overview.20
Aside: Akamai for neophytes
http://www.akamai.com/html/about/company_history.html
http://www.youtube.com/watch?v=d2E3NfcomVI

How do cnn.com and facebook.com cope?



15,000 servers; 69 countries; 1,000 networks



What was traffic like at 10:00 pm EST?
Web/Internet cope with flash crowds?
Richmedia, software, e-commerce, …
70%? Of CDN market
Customized DNS, overlay network,
patented

Location, Server, …
Compsci 182s, Spring 2011 Overview
overview.21
Akamai and other CDNs

Referenced in local/cache YouTube article



Facebook has and uses CDNs



Redirect URL to distributed hosting service
Leverages capabilities in HTTP (what's the P?)
Largest photo-site on the web
Custom and commercial CDNs
Patent: Limelight law suit

How do lawsuits work?
Compsci 182s, Spring 2011 Overview
overview.22
IP: Intellectual Property

Copyright, Patent, Trade Secret: IP




IP term is pervasive, so we will use it
Differences from "real" property?
What does IP mean to Cisco employee?
In US, and most other countries, IP similar



Copyright: fixed/expressed, not an idea
Patent: idea/invention, non-obvious, useful
Trade-secret: not-disclosed, secret
Compsci 182s, Spring 2011 Overview
overview.23
Patents and the Internet

Internet built on open standards and source



What are open standards? Why?
cf: patented, licensed, proprietary standards?
Is IP2 an oxymoron with Internet’s start?



Why was there a change (e.g., patents)?
Court system and economics/business
Why does the world change?
Compsci 182s, Spring 2011 Overview
overview.24
Key Patent Aspects

US: First to File



Provisional Patent (protect invention)
$1500 provisional to $15K full (legal fees)
Lasts 20 years from date of filing
• Requires paying “maintenance fees”

Non-obvious to one skilled-in-the-art


Must examine prior art, who must?
Must be useful, must exist!

No speculative patents
Compsci 182s, Spring 2011 Overview
overview.25
Why patent something?

Effectively grants monopoly: invention/idea


Not expression as copyright, but novel concept
Different protection than trade secret
• If it stays secret, good forever, but once out, gone!

Defensive patent



Keep invention accessible/available
Lessen concerns about infringement
More common with software, esp. Open Source
Compsci 182s, Spring 2011 Overview
overview.26
Software Patent: Brief History

State Street Bank & Trust, 1998




Software running mutual funds
State Street asks to invalidate patent
Patent upheld: useful, concrete and tangible result
should be considered patentable.
Beginning of huge number of software
patents being filed

Prior to this no algorithms patented
Compsci 182s, Spring 2011 Overview
overview.27
Amazon One-Click

What does patent cover? How to find this?




USPTO online, Google Patents
Essentially store credit card
Sues B&N 23 days/issue
Some claims invalidated

What’s a claim?
Compsci 182s, Spring 2011 Overview
overview.28
Patents: good, bad, ugly, other?

USPTO examiners not always “expert”



Defensive patenting: Red Hat, IBM, Sun


Procure patents, no enforcement, why?
Patent trolls as business model



Are they skilled-in-the-art?
Getting better, but…
Buy patents, not “in business” per se
http://bit.ly/bd73tt
http://pubpat.org/ What are the stories here?
Compsci 182s, Spring 2011 Overview
overview.29
test.com, Patent 6513042

One may appreciate that although the
invention has been shown and described
with respect to a certain preferred
embodiment, obvious and/or equivalent
alterations and modifications will occur to
others skilled in the art upon the reading
and understanding of this specification. The
present invention includes all equivalent
alterations and modifications and is limited
only by the scope of the following claims.
Compsci 182s, Spring 2011 Overview
overview.30
Patent issues

Repeal: prior art ignored


License to infringers, MP3



Robert Silvers: photo mosaic
Law/Lawyers can intervene
For free!: H.264: http://bit.ly/ajs4EP
Sue infringers

Google query: patent suit. Settled or in court
Compsci 182s, Spring 2011 Overview
overview.31
Questions
Compsci 182s, Spring 2011 Overview
overview.32
Copyright Infringement?
ice ice baby (youtube)
Under Pressure (youtube)
Compsci 182s, Spring 2011 Overview
overview.33
Copyright, DMCA, Intellectual Property
Compsci 182s, Spring 2011 Overview
overview.34
Article I, Section 8
To promote the Progress of Science and useful
Arts, by securing for limited Times to
Authors and Inventors the exclusive Right to
their respective Writings and Discoveries.


Copyright and patent
From Constitution to US Code (section??)



Can’t copyright ideas
Is this class copyrighted? Notes? Lecture?
Who “owns” the rights, does it matter?
Compsci 182s, Spring 2011 Overview
overview.35
Copyright Basics

What can by copyrighted?




US Code Title 17, Section 102
Ideas? No. Fixed in tangible medium? Yes.
https://www.eff.org/cases/electric-slide-litigation
Software and computer programs, facts and
data, parodies and copies, …

What about Fair Use? What about infringement?
Compsci 182s, Spring 2011 Overview
overview.36
From IP to IP via copyright

Intellectual Property

What does this mean? Can we own it?
when Jefferson and his fellow creatures of the Enlightenment
designed the system that became American copyright law,
their primary objective was assuring the widespread
distribution of thought, not profit. Profit was the fuel that
would carry ideas into the libraries and minds of their new
republic. Libraries would purchase books, thus rewarding the
authors for their work in assembling ideas; these ideas,
otherwise "incapable of confinement," would then become
freely available to the public. But what is the role of libraries
in the absence of books? How does society now pay for the
distribution of ideas if not by charging for the ideas
themselves? Economy of Ideas
Compsci 182s, Spring 2011 Overview
overview.37
Software, Copyright (towards Patents)

Software the code v. software the program


Competitor’s viewpoint, user’s viewpoint
Tangible medium when written
• What about when running on a machine?

What a program does, rather than the code


Whelan v Jaslow 1985/6
Lotus v Borland (1995)
• Supreme Court goes 4/4, look and feel not copyrighted

More cases that change interpretation of laws
Compsci 182s, Spring 2011 Overview
overview.38
Facts not subject to copyright



http://mlb.mlb.com/mediacenter/
http://bit.ly/bDnKry
Rotisserie Baseball? http://bit.ly/a3d1Bc
Since facts do not owe their origin to an act
of authorship, they are not original, and thus
are not copyrightable.
 Feist v Rural (Wikipedia and others)
Compsci 182s, Spring 2011 Overview
overview.39
Sunglasses or recipes copyrighted?


http://amzn.to/aTtcTy
$189.99 at Amazon


http://bit.ly/9kBXsp
$9.99 at …
Molten Chocolate Cakes Recipe by
Jean-Georges Vongerichten
Compsci 182s, Spring 2011 Overview
overview.40
Copyrights and Licensing

Most software is licensed rather than sold




Why isn’t it sold? First-sale doctrine
Are EULAs valid? According to whom?
Can I back up my software? DVD/CD?
Tale of three logos

Linux
Compsci 182s, Spring 2011 Overview
Windows
SQlite
overview.41
Toward Open Source

http://tinyurl.com/yqfcq (Groklaw)

Copyright law, guarantees protections





Exclusive right to copy
Exclusive right to create derivative works
Exclusive right to distribute work
Exclusive right to perform/display work
Fair use exceptions, First Amendment
tension, facts and ideas vs their expression
Compsci 182s, Spring 2011 Overview
overview.42
Fair use, face-to-face education

Educational Exceptions




What about YouTube videos?
What about Social Network Torrent?
Clip from Ferris Bueller?
Four prongs copy/use copyrighted work:




(1) For commercial or non-profit use
(2) Nature of copyrighted work, e.g., original?
(3) How much of work used
(4) Effect on market or value
Compsci 182s, Spring 2011 Overview
overview.43
Digital Millennium Copyright Act,DMCA

Copyright law of United States



DMCA I: Rules against circumvention



Passed in 1998, general industry support
What's different about digital copyright?
Can’t try to bypass DRM, CSS, …
What about Bittorrent, Rapidshare, Elliott’s
server, Youtube
DMCA II: Safe Harbor provisions

Protect online service providers (blogs?)
Compsci 182s, Spring 2011 Overview
overview.44
DMCA: Chilling Effects (according to?)

Anti-circumvention (1201) aspects of DMCA




Prevents legitimate back-up/archive
Fair use “under siege”
Inhibits free speech
Impedes innovation, science, invention, …



Despite research exceptions
What happens on violation or threat of?
Review and comments every three years
• Why Library of Congress?
Compsci 182s, Spring 2011 Overview
overview.45
DMCA: Safe Harbor


DMCA saved the web (2.0)
Safe harbor provision (512) is indispensable





No knowledge of offense!
Take down notices
Counter notice
Eligible for safe-harbor?
If I post a video to YouTube that infringes…

Who gets in trouble?
Compsci 182s, Spring 2011 Overview
overview.46
DMCA and chilling effects

Dmitry Sklyarov, Elcomsoft, 2001


Ed Felten, SDMI, 2001




Arrested? Conference?
RIAA urges reconsideration
Princeton Profs anti-circumvention song
Alex Halderman, Sony rootkit
Ben Edelman and CIPA (children’s internet
protection act)

Research, tools, distribution, “just sue”
Compsci 182s, Spring 2011 Overview
overview.47
Jon Lech Johansen (DVD Jon)

DeCSS




How does DVD encryption work?
What is GPL issue with original code?
Brute force attack on 40-bit key beyond DeCSS
Apple, iTunes, Fairplay, DRM



Digital Rights Management
iPhone
Hacker Jon
Compsci 182s, Spring 2011 Overview
overview.48
Copyright infringement in a nutshell

Vicarious infringement



Contributory infringement



Ability to control users, financial benefit
Liability without knowledge, Napster?
You know it, you did it (abet piracy)
Host forum for others to post
What about DMCA safe harbor provisions?
Compsci 182s, Spring 2011 Overview
overview.49
Questions
Compsci 182s, Spring 2011 Overview
overview.50
Background on Bits

Bit is a “binary” “digit”



What’s binary? What’s a digit?
It’s all zeros and ones in computers on Internet?
What about MP4, MP3, .aac, .jpg, .pdf, …
Compsci 182s, Spring 2011 Overview
overview.51
Scale and Bits: Binary Digits

Number of IPv4, 32-bit addresses?


If you use a 32-bit encryption key, and
computers can test one billion keys/second




How many 33-bit addresses?
# seconds to break with brute force?
If we add 1 bit, how many seconds?
# seconds for 128-bit encryption key?
Skype uses 256-bit encryption key!?
Compsci 182s, Spring 2011 Overview
overview.52
Can we double every two years?

Explaining Moore’s Law:


http://www.youtube.com/watch?v=bLSMn0cNWAw
http://www.youtube.com/watch?v=D3dKbq5AXz8
Compsci 182s, Spring 2011 Overview
overview.53
Moore’s Law meets Hurley's Law


See Wikipedia entry for complete Info
 http://en.wikipedia.org/wiki/Moore's_law
All things digital, Sept 16, 2008: “Hurley’s Law:
Like Moore’s Law, but With Doltish Video Clips”
 http://tinyurl.com/6n7kqv 13 hrs/min in 2008
 http://bit.ly/cw9DNy 35 hrs/min in 2010
“Over the next decade, people will be at the center of
their video and media experience. More and more
consumers will become creators. We will continue
to help give people unlimited options and access to
information, and the world will be a smaller place.”
http://googleblog.blogspot.com/2008/09/future-of-online-video.html
Compsci 182s, Spring 2011 Overview
overview.54
Questions
Compsci 182s, Spring 2011 Overview
overview.55
Compsci 182s, Spring 2011 Overview
overview.56
Internet Censorship
Compsci 182s, Spring 2011 Overview
overview.57
Skype, TOM-Skype, China

http://skype.com
http://skype.tom.com

http://www.nartv.org/2008/10/01/breaching-trust-tom-skype/


Our investigation reveals troubling security
and privacy breaches affecting TOMSkype—the Chinese version of the popular
voice and text chat software Skype. It also
raises troubling questions regarding how
these practices are related to the
Government of China’s censorship and
surveillance policies.
Compsci 182s, Spring 2011 Overview
overview.58
Internet (and other) Censorship

What is censorship? Does venue matter?


Cigarette commercials on TV, profanity, military
and national-security documents, Google Earth
images, Super Bowl commercials,
What about Internet censorship?



Nationwide: where and why
School-wide: where and why
Family-wide: where and why
Compsci 182s, Spring 2011 Overview
overview.59
“Censorship” Internet laws in the US

Communications Decency Act: ACLU v Reno




“offensive” material off-limits to minors
1997 SCOTUS, unanimously unconstitutional.
Section 230 survives: blogger/ISP immunity
Children’s Internet Protection Act: CIPA


Schools, libraries must install and use filtering
software (e-rate: Duke? Durham?...)
Affirmed by SCOTUS in 2003, filters must be
“disableable”, though not by minors
Compsci 182s, Spring 2011 Overview
overview.60
Censorship in Australia (Denmark,…)

Blacklists for ISPs at the
country level



Domain name censorship
Wikileaks hosts site, threatened with fines
Started with good intentions (perhaps), but …

How does a domain name get on the list? Off?
Compsci 182s, Spring 2011 Overview
overview.61
Internet/Web Censorship

Blacklists, client, ISP, country, other?




How are these implemented?
Possible to bypass with 79.141.34.22
Counteract with whitelist?
Can we block, filter, or examine IP address?

Where is the IP address?
• ISP-wide, bottlenecks, technologically feasible?

What about “deep packet inspection”?
Compsci 182s, Spring 2011 Overview
overview.62
Firewalls and Proxies

Golden Shield



Personal/Corporate Firewall




Great Firewall of China
Atlantic on firewall.cn
IP packet layer, Application layer
Stop or allow, based on …
Port numbers used for granularity
Proxy server

For firewall, for content, for
censorship?
Compsci 182s, Spring 2011 Overview
overview.63
Software filters, what do they do?

(2002) Peacefire, open access for net
gen.http://www.religioustolerance.org/cyberpat3.htm
http://www.peacefire.org/BaitAndSwitch/


Does where a message comes from affect the
status of whether it’s ok?
China: Green Dam/Youth Escort


Uproar 7/09-8/09!: all laptops in China must have
filtering software installed!
preliminary Green Dam analysis
Compsci 182s, Spring 2011 Overview
overview.64
http://opennet.net
Straightforward state regulation of speech
without technological components can, of
course, result in censorship; our work here
is designed to focus on regulation that,
when implemented through code, seems
more a force of nature than an exercise of
political or physical power.
Thus it is entirely possible that a state that does not
require or inspire technical filtering can possess a set of
regulations or social norms or market factors that render
its information environment less free than a state with
fairly extensive technical filtering.
Compsci 182s, Spring 2011 Overview
overview.65
Cyber-dissidents and Bloggers
Unlike some hosting companies which become
accomplices to governments in repressive countries by
surrendering their bloggers’ personal data, we
undertake never to provide any
information about your identity as
long as all you are doing is
exercise your right to free
expression.
Reporters sans
Frontièreshttp://www.rsf.org/
Compsci 182s, Spring 2011 Overview
overview.66
Laws in Other Countries
Compsci 182s, Spring 2011 Overview
overview.67
Yahoo!, France, Nazi Memorabilia

Ligue contre le racisme et l'antisémitisme et Union
des étudiants juifs de France c. Yahoo! Inc. et
Société Yahoo! France (LICRA v. Yahoo!)
http://en.wikipedia.org/wiki/LICRA_v._Yahoo!
http://www.lapres.net/yahweb.html

French student groups sue Yahoo!



Sue in US, take down material
Violation of French law, but what about US First
Amendment rights?
Court case complicated by “ripeness”
Compsci 182s, Spring 2011 Overview
overview.68
Turkey, YouTube, Ataturk

YouTube hosts videos deemed “insulting”,
so Turkey orders their removal



Remove in Turkey
Remove worldwide
Ban YouTube in Turkey
http://arama.hurriyet.com.tr/arsivnews.aspx?id=10441126

Other countries and YouTube

Why? How?
Compsci 182s, Spring 2011 Overview
overview.69
Adnan Oktar



Adnan Oktar is a prominent Turkish intellectual.
Completely devoted to moral values and dedicated
to communicating the sacred values he cherishes to
other people, http://www.harunyahya.com/theauthor.php
A Muslim creationist has
succeeded in having Richard
Dawkins’s website banned in
Turkey, after complaining that its
atheist content was blasphemous.
(2008) http://tinyurl.com/5d6bv5
Boston Globe, October 2009
Compsci 182s, Spring 2011 Overview
overview.70
What’s wrong with this picture?
Compsci 182s, Spring 2011 Overview
overview.71
Google buys …

Postini: web, email security, malware filters



DoubleClick: online advertising, rich media


2008/$3.1B advertising juggernaut?
On2: video codecs, Theora, others


2007/$625M, malware filtering by Google
Oct 2009, Postini Fails
2009/$106M, video is everywhere?
Recaptcha: web security? OCR?
Compsci 182s, Spring 2011 Overview
overview.72
Does Google Have Too Much Power?

Google's Gatekeepers

Nicole Wong


The Decider
Google as Monopoly

Harbinger?
Compsci 182s, Spring 2011 Overview
overview.73
www.globalnetworkinitiative.org




EFF, Berkman Center, CDT, Human Rights Watch
Google, Microsoft, Yahoo
kld.com, domini.com, bostoncommonasset.com,…
Who are these stakeholders? What are their goals?
…a multi-stakeholder group of companies, civil
society organizations (including human rights and
press freedom groups), investors and academics
spent two years negotiating and creating a
collaborative approach to protect and advance
freedom of expression and privacy in the ICT
sector, and have formed an Initiative to take this
work forward.
Compsci 182s, Spring 2011 Overview
overview.74
Legal v Technical: Courts of Law

Perfect 10 v everyone


Blizzard v BNETD and MDY


Mostly copyright: fair-use, infringement
Copyright, licensing, section 117
Blumenthal v Drudge and AOL

Who is liable for libel online?
Compsci 182s, Spring 2011 Overview
overview.75
Perfect 10 v Google (and others)

Thumbnails “transformative”


History of Perfect 10


Anatomy of Google results
Who is sued and why?
Who files Amicus Briefs?
Compsci 182s, Spring 2011 Overview
overview.76
Blizzard v BNETD and MDY

Blizzard: $100Million/month on WOW




MMO, how is it played? Licensed? Purchased
Network and updates (currently Bittorrent!)
BNETD, open source, network alternative
MDY, “Glider”, autoplayer


Warden as either spyware or protection
Tremendous implications if Blizzard wins
Compsci 182s, Spring 2011 Overview
overview.77
Blumenthal v Drudge and AOL

Drudge alleges spousal abuse


Blumenthal sues both


Retracts “immediately”
Why is AOL dismissed?
What recourse here?

Good Samaritan clause
• Section 230 of CDA
Compsci 182s, Spring 2011 Overview
overview.78
Download