INTERNET DAEMONS: DIGITAL COMMUNICATIONS POSSESSED Fenwick Mckelvey

Total Page:16

File Type:pdf, Size:1020Kb

INTERNET DAEMONS: DIGITAL COMMUNICATIONS POSSESSED Fenwick Mckelvey INTERNET DAEMONS ELECTRONIC MEDIATIONS Series Editors: N. Katherine Hayles, Peter Krapp, Rita Raley, and Samuel Weber Founding Editor: Mark Poster 56 INTERNET DAEMONS: DIGITAL COMMUNICATIONS POSSESSED Fenwick McKelvey 55 WHAT IS INFORMATION? Peter Janich 54 DECONSTRUCTION MACHINES: WRITING IN THE AGE OF CYBERWAR Justin Joque 53 METAGAMING: PLAYING, COMPETING, SPECTATING, CHEATING, TRADING, MAKING, AND BREAKING VIDEOGAMES Stephanie Boluk and Patrick LeMieux 52 THE PERVERSITY OF THINGS: HUGO GERNSBACK ON MEDIA, TINKERING, AND SCIENTIFICTION Hugo Gernsback, Edited by Grant Wythoff 51 THE PARTICIPATORY CONDITION IN THE DIGITAL AGE Darin Barney, Gabriella Coleman, Christine Ross, Jonathan Sterne, and Tamar Tembeck, Editors 50 MIXED REALISM: VIDEOGAMES AND THE VIOLENCE OF FICTION Timothy J. Welsh 49 PROGRAM EARTH: ENVIRONMENTAL SENSING TECHNOLOGY AND THE MAKING OF A COMPUTATIONAL PLANET Jennifer Gabrys 48 ON THE EXISTENCE OF DIGITAL OBJECTS Yuk Hui 47 HOW TO TALK ABOUT VIDEOGAMES Ian Bogost 46 A GEOLOGY OF MEDIA Jussi Parikka 45 WORLD PROJECTS: GLOBAL INFORMATION BEFORE WORLD WAR I Markus Krajewski 44 READING WRITING INTERFACES: FROM THE DIGITAL TO THE BOOKBOUND Lori Emerson 43 NAUMAN REITERATED Janet Kraynak 42 COMPARATIVE TEXTUAL MEDIA: TRANSFORMING THE HUMANITIES IN THE POSTPRINT ERA N. Katherine Hayles and Jessica Pressman, Editors (continued on page 321) INTERNET DAEMONS Digital Communications Possessed FENWICK McKELVEY Electronic Mediations 56 University of Minnesota Press Minneapolis London The University of Minnesota Press gratefully acknowledges the generous assis- tance provided for the open access version of this book by the Concordia Open Access Author Fund. Portions of chapter 7 were published in a different form in “Algorithmic Media Need Democratic Methods: Why Publics Matter,” Canadian Journal of Com- munication 39, no. 4 (2014): 597– 613. Copyright 2018 by the Regents of the University of Minnesota All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Published by the University of Minnesota Press 111 Third Avenue South, Suite 290 Minneapolis, MN 55401- 2520 http://www.upress.umn.edu Printed in the United States of America on acid- free paper The University of Minnesota is an equal- opportunity educator and employer. Library of Congress Cataloging-in-Publication Data Names: McKelvey, Fenwick, author. Title: Internet daemons : digital communications possessed / Fenwick McKelvey. Description: Minneapolis : University of Minnesota Press, [2018] Series: Electronic mediations ; 56 | Includes bibliographical references and index. Identifiers: LCCN 2018001934 (print) | ISBN 978-1-5179-0153-0 (hc) | ISBN 978-1-5179-0154-7 (pb) Subjects: LCSH: Internet programming. Classification: LCC QA76.625 .M3825 2018 (print) | DDC 006.7/6–c23 LC record available at https://lccn.loc.gov/2018001934 UMP BMB CONTENTS Abbreviations and Technical Terms vii Introduction 1 1 The Devil We Know: Maxwell’s Demon, Cyborg Sciences, and Flow Control 23 2 Possessing Infrastructure: Nonsynchronous Communication, IMPs, and Optimization 45 3 IMPs, OLIVERs, and Gateways: Internetworking before the Internet 71 4 Pandaemonium: The Internet as Daemons 93 5 Suffering from Buffering? Affects of Flow Control 135 6 The Disoptimized: The Ambiguous Tactics of The Pirate Bay 161 7 A Crescendo of Online Interactive Debugging? Gamers, Publics, and Daemons 185 Conclusion 209 Acknowledgments 229 Appendix: Internet Measurement and Mediators 233 Notes 239 Bibliography 267 Index 309 This page intentionally left blank ABBREVIATIONS AND TECHNICAL TERMS 3GPP Third Generation Partnership Project ACE Application Control Engine ACK Shorthand for “acknowledgment,” often used in packet switching ACM Association for Computing Machinery ANS Advanced Network Services ARPA Advanced Research Projects Agency ARPANET A packet- switching digital communication system by Advanced Research Projects Agency ASN Autonomous Systems Numbers AUTOVON A secure telephone system designed by AT&T for the American military. BBN Bolt, Beranek, and Newman Inc. BBS Bulletin Board System BE Best Efforts delivery guarantee BEREC Body of European Regulators of Electronic Communications BGP Border Gateway Protocol BIRD An internet protocol– routing project targeting Linux and UNIX- like systems. Its acronym stands for “BIRD Internet Routing Daemon,” a nod to GNU standing for “GNU Is Not UNIX.” BSD Berkeley Software Distribution, an operating system derived from UNIX CAIDA Cooperative Association for Internet Data Analysis CAIP The Canadian Association of Internet Providers CBC Canadian Broadcasting Corporation CDN Content Distribution Networks . vii CGO Canadian Gamers Organization CIDR Classless Inter- Domain Routing, a standard that includes a notation method for IP addresses CMTS Cable Modem Termination System CRTC Canadian Radio- Television and Telecommunications Commission CSEC Communications Security Establishment of Canada CTSS Compatible Time- Sharing System, one of the first time- sharing operating systems CYCLADES French packet- switching project developed in the 1970s DAEMON A computer program running in the background of a computer system as an automated process rather than being under the direct command of a user DARPA Defense Advanced Research Projects Agency, what Advanced Research Projects Agency (ARPA) is now called DASH Dynamic Adaptive Streaming over HTTP DDoS Distributed Denial of Service attack DHT Distributed Hash Tables DNS Domain Name System DOCSIS Data Over Cable Service Interface Specification (enable broadband over coaxial cable) DPI Deep Packet Inspection DRM Digital Rights Management DSLAM Digital Subscriber Line Access Multiplexer E2E End- to- End principle eBGP External Border Gateway Protocol EFF Electronic Frontier Foundation FCC Federal Communications Commission FIDONET A worldwide communication network between electronic Bulletin Board Systems FTP File Transfer Protocol GATEWAY Generic term to describe hardware that interconnects different systems. The core internet requires gateways to interconnect autonomous systems. HCI Human– Computer Interaction HOST A device connected to the internet HSIS High- Speed Internet Service HSPA High- Speed Packet Access viii . Abbreviations and Technical Terms HTML HyperText Markup Language HTTP HyperText Transfer Protocol Hub Obsolete piece of network infrastructure that interconnected computers and forwarded packets. Hubs forwarded packets to all ports, unlike their successor, switches. I2P The Invisible Internet Project IANA Internet Assigned Numbers Authority iBGP Internal Border Gateway Protocol ICANN Internet Corporation for Assigned Names and Numbers IEEE Institute of Electrical and Electronics Engineers IETF Internet Engineering Task Force IMP Interface Message Processor IoT Internet of Things IP Internet Protocol address IPRED Intellectual Property Rights Enforcement Directive IPSec Internet Protocol Security IPTO Information Processing Techniques Office, part of the Advanced Research Projects Agency IRC Internet Relay Chat IRE Institute of Radio Engineers, predecessor to the Institute of Electrical and Electronics Engineers (IEEE) ISP Internet Service Provider ITMP Internet Traffic Management Practices, a term used by the Canadian Radio- Television and Telecommunications Commission ITU International Telecommunications Union LTE Long- Term Evolution MIT Massachusetts Institute of Technology M- Lab Measurement Lab, an open platform for internet measurement Modem Modulator- Demodulator, device used to send digital signals over analog lines MP3 MPEG- 2 Audio Layer III, a coding format for digital audio MPAA Motion Picture Association of America MPLS Multi- Protocol Label Switching NAC Network Analysis Corporation NCC Network Control Center at BBN NCP Network Control Program at University of California, Los Angeles Abbreviations and Technical Terms . ix NMC Network Measurement Center NNTP Network News Transfer Protocol NPL National Physical Laboratory NSA U.S. National Security Agency NSFNET National Science Foundation Network OLIVER On- Line Interactive Vicarious Expediter and Responder OSPF Open Shortest Path First routing protocol P2P Peer- to- Peer PBE Priority Best Efforts delivery guarantee PCC Policy and Charging Control architecture PPPoE Point- to- Point Protocol over Ethernet PPTP Point- to- Point Tunneling Protocol PTS Policy Traffic Switch QoS Quality of Service RAND The Research ANd Development corporation RFC Request for Comments RFNM Request for Next Message RFQ Request for Quotations Router Generic term to refer to hardware capable of maintaining routing tables and forwarding packets between networks RSVP Resource reSerVation Protocol SABRE Semi- Automated Business Research Environment SAGE Semi- Automatic Ground Environment SCE Service Control Engine SDN Software- Defined Networking SNMP Simple Network Management Protocol SRT System Response Time Switch Generic term to refer to hardware that forwards packets between devices in a local area network. Switches are intelligent enough to send packets only to the appropriate port for the packet to reach its destination, unlike its predecessor hubs. TCP Transmission Control Protocol TCP/IP The Internet Protocol Suite (Transmission Control Protocol and Internet Protocol) TOR The Onion Router TPB The Pirate Bay UDP User Datagram Protocol x . Abbreviations and Technical
Recommended publications
  • Sistemas Distribuidos
    + Sistemas P2P Debate Rodrigo Santamaría + 2 Introducción Los sistemas P2P tienen una historia cruzada en la que se mezcla Informática Derecho Economía Política … Filosofía? + 3 P2P y Derecho Aspectos relevantes Primera generación P2P -> Juicio a Napster (1999) Culpable de ‘colaboración ilegal en la distribución de material con derechos de copia’ ‘La copia de productos comprados legalmente es ilegal si se realiza en masa/con ánimo de lucro’ Segunda generación P2P -> Juicio a Pirate Bay (2008) Culpable de ‘colaboración legal en la distribución de material con derechos de copia’ Casos tangenciales -> Megaupload (2012) Procesos legislativos -> Ley Sinde, ACTA, SOPA, PIPA + 4 P2P y Derecho Actualidad legal Directiva europea sobre derechos de copia1 – Art 15, “impuesto por enlace”: se impone un impuesto a los enlaces a contenidos con derecho de copia2 ● Antecedentes: tasa Google en España – Art 17, “filtro de subida” o “prohibición de memes”: se obliga a los servidores de implementar filtros para detectar infracciones del derecho de copia3, 4 Licencias con libertad de copia (copyleft): – Creative Commons, GPL 3.05 1 https://en.wikipedia.org/wiki/Directive_on_Copyright_in_the_Digital_Single_Market 3 Carta abierta a Axel Voss sobre el art. 15 (inicialmente 11): http://vis.usal.es/rodrigo/documentos/sisdis/seminarios/openLetterArt11.pdf 2 Opinión de Jaime Altozano (Youtuber) https://www.youtube.com/watch?v=ilEsBgbm7Fo 3 Carta abierta de Berners Lee et al. sobre el art. 17 (inicialmente 13): http://vis.usal.es/rodrigo/documentos/sisdis/seminarios/openLetterArt13.pdf 5 Declaración de Richard Stallman sobre GPL3.0 https://www.gnu.org/licenses/rms-why-gplv3.html + 5 P2P y Derecho Preguntas ¿Debe primar el derecho de copia/propiedad intelectual o el derecho de información/expresión? ¿Qué efectos tiene sobre ambos derechos la directiva sobre copyright de la UE (esp.
    [Show full text]
  • World of Warcraft Online Manual
    Game Experience May Change During Online Play WOWz 9/11/04 4:02 PM Page 2 Copyright ©2004 by Blizzard Entertainment. All rights reserved. The use of this software product is subject to the terms of the enclosed End User License Agreement. You must accept the End User License Agreement before you can use the product. Use of World of Warcraft, is subject to your acceptance of the World of Warcraft® Terms of Use Agreement. World of Warcraft, Warcraft and Blizzard Entertainment are trademarks or registered trademarks of Blizzard Entertainment in the U.S. and/or other countries.Windows and DirectX are trademarks or registered trademarks of Microsoft Corporation in the U.S. and/or other countries. Pentium is a registered trademark of Intel Corporation. Power Macintosh is a registered trademark of Apple Computer, Inc. Dolby and the double-D symbol are trademarks of Dolby Laboratory. Monotype is a trademark of Agfa Monotype Limited registered in the U.S. Patent and Trademark ® Office and certain other jurisdictions. Arial is a trademark of The Monotype Corporation registered in the U.S. Patent and Trademark Office and certain other jurisdictions. ITC Friz Quadrata is a trademark of The International Typeface Corporation which may be registered in certain jurisdictions. All other trademarks are the property of their respective owners. Uses high-quality DivX® Video. DivX® and the DivX® Video logo are trademarks of DivXNetworks, Inc. and are used under license. All rights reserved. AMD, the AMD logo, and combinations thereof are trademarks of Advanced Micro Devices, Inc All ATI product and product feature names and logos, including ATI, the ATI Logo, and RADEON are trademarks and / or registered trademarks of ATI Technologies Inc.
    [Show full text]
  • The New England College of Optometry Peer to Peer (P2P) Policy
    The New England College of Optometry Peer To Peer (P2P) Policy Created in Compliance with the Higher Education Opportunity Act (HEOA) Peer-to-Peer File Sharing Requirements Overview: Peer-to-peer (P2P) file sharing applications are used to connect a computer directly to other computers in order to transfer files between the systems. Sometimes these applications are used to transfer copyrighted materials such as music and movies. Examples of P2P applications are BitTorrent, Gnutella, eMule, Ares Galaxy, Megaupload, Azureus, PPStream, Pando, Ares, Fileguri, Kugoo. Of these applications, BitTorrent has value in the scientific community. For purposes of this policy, The New England College of Optometry (College) refers to the College and its affiliate New England Eye Institute, Inc. Compliance: In order to comply with both the intent of the College’s Copyright Policy, the Digital Millennium Copyright Act (DMCA) and with the Higher Education Opportunity Act’s (HEOA) file sharing requirements, all P2P file sharing applications are to be blocked at the firewall to prevent illegal downloading as well as to preserve the network bandwidth so that the College internet access is neither compromised nor diminished. Starting in September 2010, the College IT Department will block all well-known P2P ports on the firewall at the application level. If your work requires the use of BitTorrent or another program, an exception may be made as outlined below. The College will audit network usage/activity reports to determine if there is unauthorized P2P activity; the IT Department does random spot checks for new P2P programs every 72 hours and immediately blocks new and emerging P2P networks at the firewall.
    [Show full text]
  • Étude De La Pratique Du Téléchargement Légal Et Illégal Sur Internet
    Étude de la pratique du téléchargement légal et illégal sur Internet Travail de Bachelor réalisé en vue de l’obtention du Bachelor HES par : Julien MARIETHOZ Conseiller au travail de Bachelor : (David Billard, Professeur HES) Genève, le 12 mai 2010 Haute École de Gestion de Genève (HEG-GE) Informatique de Gestion Déclaration Ce travail de Bachelor est réalisé dans le cadre de l’examen final de la Haute école de gestion de Genève, en vue de l’obtention du titre d’ « informaticien de gestion ». L’étudiant accepte, le cas échéant, la clause de confidentialité. L'utilisation des conclusions et recommandations formulées dans le travail de Bachelor, sans préjuger de leur valeur, n'engage ni la responsabilité de l'auteur, ni celle du conseiller au travail de Bachelor, du juré et de la HEG. « J’atteste avoir réalisé seul le présent travail, sans avoir utilisé des sources autres que celles citées dans la bibliographie. » Fait à Genève, le 12 mai 2010 Julien MARIETHOZ Étude de la pratique du téléchargement légal et illégal sur Internet MARIETHOZ, Julien iv Remerciements Dans le cadre de la réalisation de ce travail, je tiens à remercier tous ceux qui ont pu y contribuer directement ou indirectement : M. David Billard pour son encadrement et ses conseils. Carole, ma femme, qui a pris le temps de s’occuper de notre petit qui est né le jour après la date de début officiel, me permettant de me concentrer sur ce travail. Tous ceux qui ont pris le temps de répondre à mon questionnaire, en me fournissant les données nécessaires à ce rapport.
    [Show full text]
  • Doctor Who 4 Ep.18.GOLD.SCW
    DOCTOR WHO 4.18 by Russell T Davies Shooting Script GOLDENROD ??th April 2009 Prep: 23rd February Shoot: 30th March Tale Writer's The Doctor Who 4 Episode 18 SHOOTING SCRIPT 20/03/09 page 1. 1 OMITTED 1 2 FX SHOT. GALLIFREY - DAY 2 FX: LONG FX SHOT, craning up to reveal the mountains of Gallifrey, as Ep.3.12 sc.40. But now transformed; the mountains are burning, a landscape of flame. The valley's a pit of fire, cradling the hulks of broken spaceships. Keep craning up to see, beyond; the Citadel of the Time Lords. The glass dome now cracked and open. CUT TO: 3 INT. CITADEL - DAY 3 FX: DMP WIDE SHOT, an ancient hallway, once beautiful, high vaults of stone & metal. But the roof is now broken, open to the dark orange sky, the edges burning. Bottom of frame, a walkway, along which walk THE NARRATOR, with staff, and 2 TIME LORDS, the latter pair in ceremonial collars. FX: NEW ANGLE, LONG SHOT, the WALKWAY curves round, Narrator & Time Lords now following the curve, heading towards TWO HUGE, CARVED DOORS, already open. A Black Void beyond. Tale CUT TO: 4 INT. BLACK VOID 4 FX: OTHER SIDE OF THE HUGE DOORS, NARRATOR & 2 TIME LORDS striding through. The Time Lords stay by the doors, on guard; lose them, and the doors, as the Narrator walks on. FX: WIDE SHOT of the Black Void - like Superman's Krypton, the courtroom/Phantom Zone scenes - deep black, starkly lit from above. Centre of the Void: a long table, with 5 TIME LORDS in robes Writer's(no collars) seated.
    [Show full text]
  • AOL Offers Video Chat with No Log-In, Download 13 May 2011, by RACHEL METZ , AP Technology Writer
    AOL offers video chat with no log-in, download 13 May 2011, By RACHEL METZ , AP Technology Writer In a move to become more competitive in the fast- AV's release comes two days after Microsoft Corp. growing field of video chat, the team behind AOL said it would pay $8.5 billion for popular Internet Inc.'s AIM instant messenger rolled out the first phone service Skype, which allows people to make version of a free video chat service on Thursday free and cheap voice and video calls. that doesn't require users to log in or download any software. ©2011 The Associated Press. All rights reserved. This material may not be published, broadcast, Called AV, the service was created as a way to rewritten or redistributed. have quick, easy video chats, Jason Shellen, a leader of the AIM team, said. Though there are plenty of other voice and video chat offerings available for computers and smartphones, AV is unlike many with its decision to eschew both logins and software downloads. In order to start a chat, a user gets a unique link from AV and sends it to friends. Once a friend with a webcam clicks on the link, a chat window will pop up on the screen and show live video of the user who started the chat session and any other participants. Up to four people can be involved in a chat at once, Shellen said. The service has several features, such as the ability to type messages to individual users while video chatting - to send a link to a webpage, for example.
    [Show full text]
  • You Are Not Welcome Among Us: Pirates and the State
    International Journal of Communication 9(2015), 890–908 1932–8036/20150005 You Are Not Welcome Among Us: Pirates and the State JESSICA L. BEYER University of Washington, USA FENWICK MCKELVEY1 Concordia University, Canada In a historical review focused on digital piracy, we explore the relationship between hacker politics and the state. We distinguish between two core aspects of piracy—the challenge to property rights and the challenge to state power—and argue that digital piracy should be considered more broadly as a challenge to the authority of the state. We trace generations of peer-to-peer networking, showing that digital piracy is a key component in the development of a political platform that advocates for a set of ideals grounded in collaborative culture, nonhierarchical organization, and a reliance on the network. We assert that this politics expresses itself in a philosophy that was formed together with the development of the state-evading forms of communication that perpetuate unmanageable networks. Keywords: pirates, information politics, intellectual property, state networks Introduction Digital piracy is most frequently framed as a challenge to property rights or as theft. This framing is not incorrect, but it overemphasizes intellectual property regimes and, in doing so, underemphasizes the broader political challenge posed by digital pirates. In fact, digital pirates and broader “hacker culture” are part of a political challenge to the state, as well as a challenge to property rights regimes. This challenge is articulated in terms of contributory culture, in contrast to the commodification and enclosures of capitalist culture; as nonhierarchical, in contrast to the strict hierarchies of the modern state; and as faith in the potential of a seemingly uncontrollable communication technology that makes all of this possible, in contrast to a fear of the potential chaos that unsurveilled spaces can bring.
    [Show full text]
  • Introduction Points
    Introduction Points Ahmia.fi - Clearnet search engine for Tor Hidden Services (allows you to add new sites to its database) TORLINKS Directory for .onion sites, moderated. Core.onion - Simple onion bootstrapping Deepsearch - Another search engine. DuckDuckGo - A Hidden Service that searches the clearnet. TORCH - Tor Search Engine. Claims to index around 1.1 Million pages. Welcome, We've been expecting you! - Links to basic encryption guides. Onion Mail - SMTP/IMAP/POP3. ***@onionmail.in address. URSSMail - Anonymous and, most important, SECURE! Located in 3 different servers from across the globe. Hidden Wiki Mirror - Good mirror of the Hidden Wiki, in the case of downtime. Where's pedophilia? I WANT IT! Keep calm and see this. Enter at your own risk. Site with gore content is well below. Discover it! Financial Services Currencies, banks, money markets, clearing houses, exchangers. The Green Machine Forum type marketplace for CCs, Paypals, etc.... Some very good vendors here!!!! Paypal-Coins - Buy a paypal account and receive the balance in your bitcoin wallet. Acrimonious2 - Oldest escrowprovider in onionland. BitBond - 5% return per week on Bitcoin Bonds. OnionBC Anonymous Bitcoin eWallet, mixing service and Escrow system. Nice site with many features. The PaypalDome Live Paypal accounts with good balances - buy some, and fix your financial situation for awhile. EasyCoin - Bitcoin Wallet with free Bitcoin Mixer. WeBuyBitcoins - Sell your Bitcoins for Cash (USD), ACH, WU/MG, LR, PayPal and more. Cheap Euros - 20€ Counterfeit bills. Unbeatable prices!! OnionWallet - Anonymous Bitcoin Wallet and Bitcoin Laundry. BestPal BestPal is your Best Pal, if you need money fast. Sells stolen PP accounts.
    [Show full text]
  • Computer-Supported Cooperative Work: History and Focus
    Computer-Supported Cooperative Work: Historv and Focus d Jonathan Grudin, University of California, Irvine en years ago, hen Greif of MIT and Paul Cashman of Digital Equipment Corporation organized a workshop that had far-reaching effects. Twenty people from different fields -but with a shared interest in how people work -gathered to explore technology’s role in the work environment and coined the term “computer-supported cooperative work” to describe it. Since then, thousands of researchers and developers have responded to this ini- tiative. Although the first CSCW conferences were held in the United States, the topic was picked up immediately in Europe and Asia, where related work and seri- ous interest already existed. This article describes the people and the work found under the CSCW umbrella. Why i984? An earlier approach to group support, called “office automation,” had run out of steam by 1984. OA’s primary problem was not technical, although technical chal- lenges certainly existed; it was in understanding system requirements. In the mid- CSCW and groupware 1960s, tasks such as filling seats on airplane flights or printing payroll checks had emerged in the 1980s been translated into requirements that resulted (with some trial and error) in suc- cessful mainframe systems. In the mid-l970s, minicomputers promised to support from shared interests groups and organizations in more sophisticated, interactive ways, and OA was born. OA tried to extend and integrate single-user applications, such as word processors and among product spreadsheets, to support groups and departments. But what were the precise re- developers and quirements for such systems? Building technology was not enough.
    [Show full text]
  • Whitepaper May Be Mailed to [email protected]
    Managing unmanaged home devices Reducing IoT security risks with open source CPE software Introduction Contents This white paper explores the security and 1 Management summary 3 privacy issues involved with the evolving 2 A Sea of unmanaged devices 4 Internet of Things (IoT), which is expected to 3 Impact 5 comprise a large portion of unmanaged, insecure 4 Security risks 6 home devices. The solution presented here is 5 A shared shoke point 6 SPIN, short for Security and Privacy for In-home 6 Proposition 7 Networks. It is open-source software that brings 7 SPIN: an overview 8 IoT security to the residential gateway as new 8 SPIN advantages 9 added-value functionality for the end user, and 9 The Traffic Monitor 10 allows access providers to bring IoT devices and 10 Track record 11 traffic flows at their customers’ premises under 11 Conclusion 12 direct central management. SPIN mitigates 12 About SIDN 12 security risks related to the IoT network, while 13 We all win 13 keeping privacy-sensitive data in the user 14 SPIN features 14 domain. 15 More information 15 16 Footnotes 15 Colophon 16 SPIN | Managing unmanaged home devices 2/16 1 Management summary The evolving Internet of Things (IoT) will soon comprise many tens of CPE manufacturers can use the native interfaces of their operating billions of networked devices, of which a large portion will be unmanaged systems to easily integrate the software into their gateways. machine-to-machine (M2M) home devices. SPIN adheres strongly to international, open standards for IoT security and It is expected that a large number of these home devices either will never privacy, so as to ensure the highest level of interoperability and regulatory be updated at all, or will stop receiving software updates long before they compliance.
    [Show full text]
  • Social Computing-Driven Activism in Youth Empowerment Organizations: Challenges and Opportunities Farnaz Irannejad Bisafar1, Lina Itzel Martinez2, Andrea G
    Social Computing-Driven Activism in Youth Empowerment Organizations: Challenges and Opportunities Farnaz Irannejad Bisafar1, Lina Itzel Martinez2, Andrea G. Parker1,2 1College of Computer and Information Science 2Bouvé College of Health Sciences Northeastern University 360 Huntington Ave. Boston, MA 02115 Boston, United States [email protected], [email protected], [email protected] ABSTRACT significantly higher rates of health problems (e.g., diabetes) Throughout the world, organizations empower youth to than more affluent communities [17,29,44]. Previous work participate in civic engagement to impact social change, has examined how youth-led activism can be effective in and adult-youth collaborations are instrumental to the addressing these challenges and affecting social change success of such initiatives. However, little is known about [9,47]. In fact, throughout the world, many organizations how technology supports this activism work, despite the have created youth-led programs with the goals of solving fact that tools such as Social Networking Applications community problems and empowering youth to educate (SNAs) are increasingly being leveraged in such contexts. their peers about issues of concern [33]. These We report results from a qualitative study of SNA use organizations provide youth with resources needed to run within a youth empowerment organization. Using the social action initiatives (e.g., support for collective analytical lens of object-oriented publics, our findings organizing). As adult staff work together with youth, they reveal opportunities and challenges that youth and staff face create an environment that nurtures youth’s confidence that when they use SNAs. We describe the illegibility of youth they can take on social problems.
    [Show full text]
  • Review Der Linux Kernel Sourcen Von 4.9 Auf 4.10
    Review der Linux Kernel Sourcen von 4.9 auf 4.10 Reviewed by: Tested by: stecan stecan Period of Review: Period of Test: From: Thursday, 11 January 2018 07:26:18 o'clock +01: From: Thursday, 11 January 2018 07:26:18 o'clock +01: To: Thursday, 11 January 2018 07:44:27 o'clock +01: To: Thursday, 11 January 2018 07:44:27 o'clock +01: Report automatically generated with: LxrDifferenceTable, V0.9.2.548 Provided by: Certified by: Approved by: Account: stecan Name / Department: Date: Friday, 4 May 2018 13:43:07 o'clock CEST Signature: Review_4.10_0_to_1000.pdf Page 1 of 793 May 04, 2018 Review der Linux Kernel Sourcen von 4.9 auf 4.10 Line Link NR. Descriptions 1 .mailmap#0140 Repo: 9ebf73b275f0 Stephen Tue Jan 10 16:57:57 2017 -0800 Description: mailmap: add codeaurora.org names for nameless email commits ----------- Some codeaurora.org emails have crept in but the names don't exist for them. Add the names for the emails so git can match everyone up. Link: http://lkml.kernel.org/r/[email protected] 2 .mailmap#0154 3 .mailmap#0160 4 CREDITS#2481 Repo: 0c59d28121b9 Arnaldo Mon Feb 13 14:15:44 2017 -0300 Description: MAINTAINERS: Remove old e-mail address ----------- The ghostprotocols.net domain is not working, remove it from CREDITS and MAINTAINERS, and change the status to "Odd fixes", and since I haven't been maintaining those, remove my address from there. CREDITS: Remove outdated address information ----------- This address hasn't been accurate for several years now.
    [Show full text]