X-Vine: Secure and Pseudonymous Routing Using Social Networks

Total Page:16

File Type:pdf, Size:1020Kb

X-Vine: Secure and Pseudonymous Routing Using Social Networks X-Vine: Secure and Pseudonymous Routing Using Social Networks Prateek Mittal Matthew Caesar Nikita Borisov Dept. of ECE Dept. of CS Dept. of ECE University of Illinois University of Illinois University of Illinois [email protected] [email protected] [email protected] ABSTRACT limiting the growth of the P2P user base, and at the same Distributed hash tables suffer from several security and pri- time does not fully address the problem of Sybil attacks. vacy vulnerabilities, including the problem of Sybil attacks. To address this, recent research proposes to use social net- Existing social network-based solutions to mitigate the Sybil work trust relationships to mitigate Sybil attacks [19,64,65]. attacks in DHT routing have a high state requirement and However, these systems share some key shortcomings: do not provide an adequate level of privacy. For instance, High control overhead: These systems rely on flooding or such techniques require a user to reveal their social network large numbers of repeated lookups to maintain state. For contacts. We design X-Vine, a protection mechanism for example, Whanau [30] is the state-of-art design that secures distributed hash tables that operates entirely by communi- routing in DHTs, but it is built upon a one-hop DHT rout- cating over social network links. As with traditional peer-to- ing mechanism, and has high overheads: state and control peer systems, X-Vine provides robustness, scalability, and a overhead increases with O(√n log n), where n is the number platform for innovation. The use of social network links for of participants in the social network. As networked systems communication helps protect participant privacy and adds become increasingly deployed at scale (e.g., in the wide area, a new dimension of trust absent from previous designs. X- across service providers), in high-churn environments (e.g., Vine is resilient to denial of service via Sybil attacks, and in developing regions, wireless, mobile social networks [36]), fact is the first Sybil defense that requires only a logarithmic and for applications with stronger demands on correctness amount of state per node, making it suitable for large-scale and availability (e.g., online storage, content voting, reputa- and dynamic settings. X-Vine also helps protect the privacy tion systems) the problem of high overhead in existing works of users social network contacts and keeps their IP addresses stands to become increasingly serious; multi-hop DHT rout- hidden from those outside of their social circle, providing ing mechanisms are going to be necessary. a basis for pseudonymous communication. We first evalu- Lack of privacy: These systems require a user to reveal social ate our design with analysis and simulations, using several contact information (friend lists). Some of these schemes re- real world large-scale social networking topologies. We show quire global distribution of this contact information. This is that the constraints of X-Vine allow the insertion of only a unfortunate, as social contacts are considered to be private logarithmic number of Sybil identities per attack edge; we information: leading real-world systems like Facebook [3] show this mitigates the impact of malicious attacks while and LiveJournal [4] provide users with a functionality to not affecting the performance of honest nodes. Moreover, limit access to this information. Forcing users to reveal our algorithms are efficient, maintain low stretch, and avoid this private information could greatly hinder the adoption hot spots in the network. We validate our design with a of these technologies. PlanetLab implementation and a Facebook plugin. A second privacy concern, common to both traditional arXiv:1109.0971v1 [cs.CR] 5 Sep 2011 DHTs and ones that use social networking information, is 1. INTRODUCTION that users must communicate directly with random peers, revealing their IP addresses. This provides an opportunity Peer-to-peer (P2P) networks have, in a short time, rev- for the attacker to perform traffic analysis and compromise olutionized communication on the Internet. One key fea- user privacy [9,31]. Prior work [38,61]has demonstrated that ture of P2P networks is their ability to scale to millions of a colluding adversary can associate a DHT lookup with its users without requiring any centralized infrastructure sup- lookup initiator, and thus infer the activities of a user. A port. The best scalability and performance is offered by pseudonymous routing mechanism can defend against such multi-hop distributed hash tables (DHTs), which offer a attacks, and would be especially beneficial for privacy sen- structured approach to organizing peers [33,48,52,55]. Multi- sitive DHT applications [17,39]. hop DHTs are the subject of much research and are also used To address these shortcomings, we propose X-Vine, a pro- in several mainstream systems [2,7,23]. tection mechanism for large-scale distributed systems that Securing DHTs has always been a challenging task [14,53, leverages social network trust relationships. X-Vine has sev- 59], especially in the face of a Sybil attack [20], where one eral unique properties. X-Vine protects privacy of social re- node can pretend to have multiple identities and thus inter- lationships, by ensuring that a user’s relationship informa- fere with routing operations. Traditional solutions to this tion is revealed only to the user’s immediate friends. At the attack require participants to obtain certificates [14], prove same time, X-Vine also protects correctness of DHT routing, possession of a unique IP address [39, 42], or perform some by mitigating Sybil attacks while requiring only logarithmic computation [11]. This creates a barrier to participation, 1 state and control overhead. To the best of our knowledge, these networks. X-Vine is the first system to provide both properties, which Applications like Coral [23], Adeona [50], and Van- may serve to make it a useful building block in construct- • ing the next generation of social network based distributed ish [25] are built on top of DHTs. The security prop- systems. Finally, X-Vine also provides a basis for pseudony- erties of these applications can often be compromised mous communication; a user’s IP address is revealed only to by exploiting vulnerabilities in the DHT. As an exam- his/her trusted social network contacts. ple, the security of Vanish was recently compromised X-Vine achieves these properties by incorporating social by a low-cost Sybil attack on the Vuze network [63]. network trust relationships in the DHT design. Unlike tra- Our proposed techniques protect these applications by ditional DHTs, which route directly between overlay partic- bounding the number of Sybil identities in the DHT. ipants (e.g., [30]), X-Vine embeds the DHT directly into the Decentralized P2P anonymous communication systems social fabric, allowing communication through the DHT to • like Tarzan [24], Salsa [42] and ShadowWalker [39] as- leverage trust relationships implied by social network links. sume an external Sybil defense mechanism. X-Vine is This is done by using mechanisms similar to network layer particularly suitable for designing Sybil-resilient P2P DHTs like VRR [12]. We leverage this structure for two anonymous communication systems, since it provides purposes. First, communication in X-Vine is carried out secure as well as pseudonymous routing. entirely across social-network links.The use of social net- work links enables pseudonymous communication; while the Freenet [17] is a widely used censorship resistant over- • recipient may know the opaque identifier (pseudonym) for lay network, but its routing algorithm has been shown the source, the IP address of the source is revealed only to to be extremely vulnerable in presence of even a few his/her friends. Second, recent work has shown that social malicious nodes [21]. X-Vine can enable peers to resist networks can be used to detect Sybil attacks by identify- censorship by securely and pseudonymously retrieving ing a bottleneck cut that connects the Sybil identities to data objects from the Freenet network. the rest of the network [19, 64, 65]. X-Vine enables com- Membership concealing overlay networks (MCONs) [57] parable Sybil resilience by bounding the number of DHT • relationships that can traverse a particular edge. With this hide the identities of the peers participating in a net- multi-hop approach, we can limit the number of Sybil iden- work (different from pseudonymity). Our proposed tities per attack edge (attack edges illustrated in Figure 1) techniques can provide a substrate for designing fully to logarithmic in the size of the network with logarithmic decentralized membership concealing networks. control and routing state, a dramatic reduction from previ- Roadmap: The rest of the paper describes and evaluates ous Sybil defense approaches. This allows X-Vine to scale X-Vine. We start by giving a high-level overview of the prob- to large user bases and high-churn environments. lem we address and our approach (Section 2), followed by We evaluate X-Vine both analytically and experimentally a detailed description of our routing algorithm (Section 3) using large scale real-world social network topologies. Since and its security mechanisms (Section 4). We then describe recent work [58, 62] has advocated the use of interaction networks as a more secure realization of social trust, we our experimental results (Section 5). Finally, we summa- rize related work (Section 6), discuss X-Vine’s limitations also demonstrate the performance of X-Vine on interaction (Section 7), and conclude (Section 8). graphs. From our evaluation, we find that X-Vine is able to route using 10–15 hops (comparable to other DHTs) in topologies with 100 000 nodes while using only O(log n) rout- 2. X-VINE OVERVIEW ing state. In particular, we show that the overhead of X-Vine is two orders of magnitude smaller than Whanau. With re- 2.1 Design Goals spect to Sybil resistance, we found that honest nodes are We start by defining the goals for our design.
Recommended publications
  • 2014 INTIX Instagram, Pinterest, Vine and Tumblr, Oh
    Instagram, Pinterest, Vine and Tumblr, Oh My! • Kyle Kelly, Assistant Director of Athletic Communications, Central Michigan University • Russell Sauve, E-Commerce and Social Media Manager, Fox Theatre • Craig Ricks, Vice President of Marketing, Paciolan • Dave Brooks, Managing Editor, Venues Today Magazine • Doug Meffley, Director of Athletics Digital & Social Communications, Northwestern University • Michael Nabasny, Head of Enterprise Sales, Wildfire at Google SOCIAL MEDIA PLATFORMS BY THE NUMBERS 80 % of online adults who use the social media sites by year 71 70 67 60 50 40 2012 2013 30 20 22 21 20 16 18 17 15 13 10 0 Facebook LinkedIn Pinterest Twitter Instagram *Pew Research SOCIAL MEDIA PLATFORMS BY THE NUMBERS 64 Facebook 22 14 58 Instagram 20 22 Frequency of 47 Social Media Site Use Twitter 21 32 24 Daily Pinterest 31 Weekly 45 Less Often 14 LinkedIn 34 52 0 10 20 30 40 50 60 70 *Pew Research MILESTONE CAMPAIGNS TICKETPOP – DATA ACQUISITION GREAT SOCIAL ENGAGEMENT EXAMPLES COCA COLA BOTTLE RUMOR GOOGLE STREET VIEW GOOGLE SPOTIFY ENGAGEMENT PINTEREST ENGAGEMENT PIN IT TO WIN IT SPORTS STREAM FRONT PAGE ASK AND YOU SHALL RECEIVE “GAMEDAY FAN VOTE” CMU Football Day after Thanksgiving - Value customer’s opinion - Drive attendance - Voting entered fans in a contest to win sideline passes/upgraded seats - Allowed to build data base of fans for email marketing - Fans could vote on - Jerseys - Kickoff time - Kickoff song MOBILE AND SOCIAL STATS 61% of adults 874 million 65% of time During the and 78% of users check spent on holidays 17%
    [Show full text]
  • Systematic Scoping Review on Social Media Monitoring Methods and Interventions Relating to Vaccine Hesitancy
    TECHNICAL REPORT Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy www.ecdc.europa.eu ECDC TECHNICAL REPORT Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy This report was commissioned by the European Centre for Disease Prevention and Control (ECDC) and coordinated by Kate Olsson with the support of Judit Takács. The scoping review was performed by researchers from the Vaccine Confidence Project, at the London School of Hygiene & Tropical Medicine (contract number ECD8894). Authors: Emilie Karafillakis, Clarissa Simas, Sam Martin, Sara Dada, Heidi Larson. Acknowledgements ECDC would like to acknowledge contributions to the project from the expert reviewers: Dan Arthus, University College London; Maged N Kamel Boulos, University of the Highlands and Islands, Sandra Alexiu, GP Association Bucharest and Franklin Apfel and Sabrina Cecconi, World Health Communication Associates. ECDC would also like to acknowledge ECDC colleagues who reviewed and contributed to the document: John Kinsman, Andrea Würz and Marybelle Stryk. Suggested citation: European Centre for Disease Prevention and Control. Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy. Stockholm: ECDC; 2020. Stockholm, February 2020 ISBN 978-92-9498-452-4 doi: 10.2900/260624 Catalogue number TQ-04-20-076-EN-N © European Centre for Disease Prevention and Control, 2020 Reproduction is authorised, provided the
    [Show full text]
  • Cachet: a Decentralized Architecture for Privacy Preserving Social Networking with Caching
    Cachet: A Decentralized Architecture for Privacy Preserving Social Networking with Caching Shirin Nilizadeh Sonia Jahid Prateek Mittal Indiana University University of Illinois at University of California, Bloomington Urbana-Champaign Berkeley [email protected] [email protected] [email protected] Nikita Borisov Apu Kapadia University of Illinois at Indiana University Urbana-Champaign Bloomington [email protected] [email protected] ABSTRACT and (b) use of social contacts for object caching results in Online social networks (OSNs) such as Facebook and significant performance improvements. Google+ have transformed the way our society communi- cates. However, this success has come at the cost of user Categories and Subject Descriptors privacy; in today's OSNs, users are not in control of their C.2.4 [Computer-Communication Networks]: Dis- own data, and depend on OSN operators to enforce access tributed Systems|Distributed Applications; K.6.m control policies. A multitude of privacy breaches has spurred [Management of Computing and Information research into privacy-preserving alternatives for social net- Systems]: Miscellaneous|Security working, exploring a number of techniques for storing, dis- seminating, and controlling access to data in a decentral- ized fashion. In this paper, we argue that a combination General Terms of techniques is necessary to efficiently support the complex Algorithms, Security functionality requirements of OSNs. We propose Cachet, an architecture that provides strong Keywords security and privacy guarantees while preserving the main functionality of online social networks. In particular, Cachet privacy, peer-to-peer systems, social networking, caching protects the confidentiality, integrity and availability of user content, as well as the privacy of user relationships.
    [Show full text]
  • Archival Circulation on the Web: the Vine-Tweets Dataset
    Archival Circulation on the Web: The Vine-Tweets Dataset Ed Summers and Amy Wickner 06.04.19 Peer-Reviewed By: Anon. Clusters: Data Article DOI: 10.22148/16.040 Journal ISSN: 2371-4549 Cite: Ed Summers and Amy Wickner, “Archival Circulation on the Web: The Vine- Tweets Dataset,”Journal of Cultural Analytics. May 4, 2019. At Ethics and Archiving the Web, a conference convened in March 2018 at the New Museum in New York City, a group of artists, archivists, activists and re- searchers met to critically examine the ethical implications of our ability to col- lect and archive content from the web. In a session focused on the ethics of digital folklore, Frances Corry asked the audience to consider, ”What’s the right way to shut down a social networking site?” (Figure 1). Corry specifically discussed the closure of Vine, a social media service designed for sharing six-second video clips. She highlighted how, despite Vine’s best in- tentions to sunset their service “the right way,” mistakes were made regarding missing content and leaked personal information in users’ archives.2 Despite these difficulties, Vine’s effort remains noteworthy because of how it mobilizes the concept of an archive in dismantling its online service. Vine’s commitment to preserving content with user consent stands in stark contrast to the way many web platforms have shuttered their windows, barricaded their doors, and pulled vast amounts of content offline in the process. 1Christine A George, “Frances Corry provides a ‘burning yellow’ background for a burning ethical question,” Twitter, March 23, 2017.
    [Show full text]
  • Diaspora Knowledge Flows in the Global Economy
    E-Leader Budapest 2010 Diaspora Knowledge Flows in the Global Economy Dr. Martin Grossman Bridgewater State College Department of Management Bridgewater, MA, USA Abstract Globalization has fostered greater rates of mobility and an increasing reliance on transnational networks for commerce, social interaction, and the transfer of knowledge. This is particularly true among diaspora groups who have left their homelands in search of better economic and political environments. Unlike those of the past, today’s migrants stay connected via information and communications technology (ICT). Digital diaspora networks have the potential to reverse brain drain (the flight of human capital resulting from emigration) by facilitating knowledge sharing and technology transfer between the diaspora and the homeland. This paper explores the role that ICT-enabled diasporic networks are playing in reversing brain drain and stimulating brain gain and brain circulation. International development initiatives as well as empirical studies revolving around this concept are reviewed. The case of China is presented as an example of a country that has successfully leveraged its diaspora by implementing a number of strategies, including those based on ICT. A proposed research project, involving the Cape Verdean diaspora in Massachusetts, is also discussed. Introduction In today’s global economy intellectual capital has become the most important factor of production, underlying a nation’s ability to innovate and remain competitive (Stewart, 2007). Knowledge workers have become highly mobile, enabling them to seek out education and employment opportunities in other countries. While this might constitute a net gain for the country on the receiving end, it may also represent a serious loss of talent and ‘know-how’ from the home country.
    [Show full text]
  • Case 3:16-Cv-00764-N Document 86 Filed 04/06/17 Page 1 of 10 Pageid 1859
    Case 3:16-cv-00764-N Document 86 Filed 04/06/17 Page 1 of 10 PageID 1859 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF TEXAS DALLAS DIVISION YOUTOO TECHNOLOGIES, LLC, § § Plaintiff, § § Civil Action No. 3:16-cv-00764-N v. § § TWITTER, INC., § § Defendants. § AMENDED COMPLAINT Plaintiff, Youtoo Technologies, LLC (“Youtoo”), for its Amended Complaint for Patent Infringement against Twitter, Inc. (“Twitter” or “Defendant”), alleges the following: NATURE OF THE SUIT 1. This is an action for patent infringement arising under the patent laws of the United States, Title 35 of the United States Code to prevent and enjoin Defendant from infringing and profiting from, in an unlawful and unauthorized manner U.S. Patent No. 8,464,304 (the “’304 patent”), U.S. Patent No. 8,601,506 (the “’506 patent”), and U.S. Patent No. 9,083,997 (also known as U.S. Application No. 13/674,768, the “’768 Application,” filed November 12, 2012), pursuant to 35 U.S.C. § 271. Youtoo also seeks to recover damages, attorneys’ fees, and costs. PARTIES 2. Youtoo Technologies, LLC is a Texas limited liability company having its principal place of business at 6565 N. MacArthur Boulevard, Suite 400, Las Colinas, Texas 75039. 3. In mid-2008, Youtoo inventors recognized that the intersection of broadcast Case 3:16-cv-00764-N Document 86 Filed 04/06/17 Page 2 of 10 PageID 1860 television and Social Networking was the next great horizon with respect to technology and communication. In order meet the growing public and corporate demand for a user- and network-friendly, reliable interactive television experience, Youtoo invested millions of dollars into the creation, design, and testing of its pioneering technology.
    [Show full text]
  • Teen-Social-Media-Addiction.Docx
    1 Table of Contents: Introduction 3 Dominant Characteristics of Social Media Addiction in Teens 3 Statistics on Teen Social Media Addiction 3 Causes of Teenage Social Media Addiction 4 Is Social Media Addiction the Sign of a Disorder? 4 How Social Media Addiction Affects the Adolescent Brain 4 How Does Social Media Addiction Affect Teens 5 Treatment for Social Media Addiction in Teens 5 Additional Resources 6 2 Introduction Teenage social media addiction can be described as preoccupation and obsession. A teenager with a social media addiction has become so engrossed in the virtual world that it has impacted the real world, causing harmful effects. While many teens engage in social media through platforms such as Facebook, Twitter, YouTube, Vine, Snapchat, and others, teens who are addicted to social media see a negative impact on their real life relationships and responsibilities. Dominant Characteristics of Social Media Addiction in Teens Paradigm Malibu explains that social media addiction most often entails two distinct characteristics ​ of addiction: the extensive amount of time spent on social media and the underlying reasons why they’re engaged online. A teen with a social media addiction has an overwhelming desire to participate in the virtual world. The teen will feel internal pressure to check their updates, add new statuses, post a photo, or engage in other online activity. A teen addicted to social media will prefer the virtual connections and relationships to those in real life. As the teenage years are a pivotal time for social growth in teens, this desire can be harmful as the teen may not develop healthy or appropriate social skills.
    [Show full text]
  • Listen Well on Twitter
    ★★★★★★★ ★★★★★★★ round 4: listen well on twitteR • • Launched: March 2006 • • The company’s logo, a little blue • • As of December 2012, there were bird, is officially named Larry, after more than 100 million users in the Larry Bird, the former player for the United States, 500 million world- Boston Celtics. wide. • • JetBlue was one of the first com- • • The Twitter concept evolved out of panies to start using Twitter for a brainstorming session that took marketing research and customer place at the top of a slide on a San s e r v i c e . Francisco playground. • • Users post 750 tweets per second. talk about Twitter with almost the same affection as I talk about my children. i It’s had that much of an impact on my life since I started using it to reach out to customers in 2007. As an extrovert who can get to know a room full of people in just a few hours, I felt at home in Twitter’s 140 -­word cocktail party environ­ ment. It was the platform that came most naturally to me, because it was per ­ fectly suited for small bursts of quick-­fire conversation and idea exchanges. If the only platform I’d had at my disposal in early 2006, when I first started trying to storytell about my family business, Wine Library, had demanded long-­form 83 Jab Jab Jab right Hook writing, like a magazine column or a written blog, the business would not be what it is today. Twitter’s restrictions played directly to my strengths.
    [Show full text]
  • How to Use Vine
    How to Use Vine 1. Vine is a phone application. It works on iPhones and Android phones. You need to download the application before you can sign up. 2. When you open Vine for the first time, you will see two options: “Sign in with Twitter” and “Sign up with Email”. a. If you have a Twitter account already, then perfect! You’re almost done! Here’s how to Sign in with Twitter: i. Type in: 1. Username or email 2. Password b. If you don’t own a Twitter account, don’t fear! Signing up with Email is easy, too: i. Type in your full name (or a variation of your name, up to you) ii. Click on the hot air balloon icon to upload a profile picture. 1. Choose a photo that is already saved on your phone. It looks best if you upload a photo that is square-shaped. 2. Vine will ask for permission to access your photos. Click “OK.” 3. Once you have selected your photo, you can trim it so that the square aligns with the part of your photo that you want your icon to be. 4. Click “Choose.” 5. Your icon is all set! iii. Click “Next.” iv. Enter your: 1. Email 2. Password (make sure it’s strong) 3. Phone number (this is optional) v. Click “Done.” Congratulations! You’ve completed signing in! Now, let’s get started on building your profile. 1. Click the small house icon on the top left corner of your Vine timeline. A dropdown menu will appear.
    [Show full text]
  • Enrollment Management Marketing and New Media in the Era of Big Data
    Enrollment Management Marketing and New Media in the Era of Big Data AACRAO Webinar Jim Bouse University of Oregon March 31, 2015 What We Will Cover • Marketing and Communications • Viral and Personalized Video’s • Big Data • Social Media • CRM • Predictive Analytics • Mobile Call Me A Duck Videos helping expand brand awareness BYU New Spice Study Like a Scholar Perls of Knowledge Location, Location, Location Big Data “Linking data from disparate sources to answer questions you didn’t even know to ask.” Kent Kuo Oregon State, Dir. Ent. Computing Big Data “Sifting through the sea of information in search of trends and truths.” - Andrew Barbour, Campus Technology Big Data •The original V’s: Volume and Velocity •The 3 V’s •Volume •Velocity •Variety Graphic credit - Diya Soubra Big Data Graphic Credit: IBM Big Data • Many V’s • The most important V’s? • Volume • Veracity • Velocity • Visualization • Variety • Value • Variability • Veracity • Visualization • Value Photo credit: Slate.com Big Data: Analytics, Tracking, Prediction • Target pregnancy ads • RFID. Prism consortium. • Big Brother is here and he is us. Walmart infrared. Video tracking • Amazon to Facebook example “Free” internet. We are not the customer, we are the product. Social Media Perls of Knowledge The Insider (Check out Harvey’s eyes at the end) Listen and Monitor There are more channels than ever. • Facebook (1.23B +, 76% Mobile) • Google (24+ PB/day) • Twitter (500M+, 284M active) • College Confidential (Hobsons) • Instagram (200M) • YikYak • Google Maps, Apple iOS, review your campus Where are Teens on Social? Changes from January 2013 to February 2015 Teen Survey (sentiments) Gary Tan (founder of Posterous ), Jan.
    [Show full text]
  • Social Media and Democracy : the State of the Field, Prospects for Reform
    Downloaded from https://www.cambridge.org/core. IP address: 170.106.33.19, on 26 Sep 2021 at 08:20:02, subject to the Cambridge Core terms of use, available at https://www.cambridge.org/core/terms. https://www.cambridge.org/core/product/E79E2BBF03C18C3A56A5CC393698F117 Downloaded from https://www.cambridge.org/core. IP address: 170.106.33.19, on 26 Sep 2021 at 08:20:02, subject to the Cambridge Core terms of use, available at https://www.cambridge.org/core/terms. https://www.cambridge.org/core/product/E79E2BBF03C18C3A56A5CC393698F117 Social Media and Democracy Over the last five years, widespread concern about the effects of social media on democracy has led to an explosion in research from different disciplines and corners of academia. This book is the first of its kind to take stock of this emerging multi-disciplinary field by synthesizing what we know, identifying what we do not know and obstacles to future research, and charting a course for the future inquiry. Chapters by leading scholars cover major topics – from disinformation to hate speech to political advertising – and situate recent developments in the context of key policy questions. In addition, the book canvasses existing reform proposals in order to address widely perceived threats that social media poses to democracy. This title is also available as Open Access on Cambridge Core. Nathaniel Persily is the James B. McClatchy Professor of Law at Stanford Law School and the Co-Director of the Stanford Cyber Policy Center and Stanford Project on Democracy and the Internet. His scholarship focuses on the law and technology of democracy.
    [Show full text]
  • The Clash Between Terrestrial and Digital Radio: Pinned by the Music Modernization Act
    The Clash between Terrestrial and Digital Radio: Pinned by the Music Modernization Act Dianlyn Cenidoza* ABSTRACT Copyright law, specifically music licensing, has long been outdated due to changes in the way people listen to music. With the proliferation of technology, listeners can now enjoy music via channels that did not exist just a few decades ago. As a consequence, music creators have faced years of economic inequality.1 Songwriters, artists, and musicians have fought a long, and often fruitless, battle for justice—legislation that would change music law for the better has continuously been struck down.2 However, in 2018, the Music Modernization Act (MMA) was signed into law, representing a battle won for music creators.3 This Comment will explore the new and updated laws that make up the MMA, with a specific focus on the difference in treatment of terrestrial radio and digital radio under modern music law and how this division has caused tension in the making of the MMA. INTRODUCTION Until recently, owners of pre-1972 sound recordings did not receive royalties for their musical creations; however, a change arose when the Orrin G. Hatch–Bob Goodlatte Music Modernization Act, commonly * J.D. Candidate, Seattle University School of Law. It was inevitable for me to grow up loving music when music and singing were constant in my home. Therefore, thank you to all musicians and artists who have brought me joy with their music; you inspire this Comment. I would also like to thank my faculty advisor and all those who have provided me with thoughtful feedback, especially the Law Review team.
    [Show full text]