Peer-To-Peer-Based File-Sharing Beyond the Dichotomy of 'Downloading Is Theft' Vs. 'Information Wants to Be Free': How Swedish File-Sharers Motivate Their Action

Total Page:16

File Type:pdf, Size:1020Kb

Peer-To-Peer-Based File-Sharing Beyond the Dichotomy of 'Downloading Is Theft' Vs. 'Information Wants to Be Free': How Swedish File-Sharers Motivate Their Action Peer-to-peer-based file-sharing beyond the dichotomy of 'downloading is theft' vs. 'information wants to be free': How Swedish file-sharers motivate their action Jonas Andersson Goldsmiths, University of London for the degree of PhD in Media & Communications 1 (346) Abstract Peer-to-peer-based file-sharing beyond the dichotomy of 'downloading is theft' vs. 'information wants to be free': How Swedish file-sharers motivate their action This thesis aims to offer a comprehensive analysis ofpeer-to-peer-basedJile-sharing by focusing on the discourses about use, agency and motivation involved, and how they interrelate with the infrastructural propelties of file-sharing. Peer-to-peer-based file-sharing is here defined as the unrestricted duplication of digitised media content between autonomous end-nodes on the Internet. It has become an extremely popular pastime, largely involving music, film, games and other media which is copied without the permission of the copyright holders. Due to its illegality, the popular understanding of the phenomenon tends to overstate its conflictual elements, framing it within a legalistic 'copyfight'. This is most markedly manifested in the dichotomised image of file-sharers as 'pirates' allegedly opposed to the enteltainment industry. The thesis is an attempt to counter this dichotomy by using a more heterodox synthesis of perspectives, aiming to assimilate the phenomenon's complex intermingling of technological, infrastructural, economic and political factors. The geographic context of this study is Sweden, a country characterised by early broadband penetration and subsequently widespread unrestricted file-sharing, paralleled by a lively and well-informed public debate. This gives geographic specificity and further context to the file-sharers' own justificatory discourses, serving to highlight and problematise some principal assumptions about the phenomenon. The thesis thus serves as a geographically contained case study which will have analytical implications outside of its immediate local context, and as an inquiry into two aspects of file-sharer argumentation: the ontological understandings of digital technology and the notion of agency. These, in turn, relate to particular forms of sociality in late modernity. Although the agencies and normative forces involved are innumerable, controversies about agency tend to order themselves in a more comprehensive way, as they are appropriated discursively. The invocation to agency that is found in the justificatory discourses - both in the public debate and among individual respondents - thus allows for a more productive and critically attentive understanding of the phenomenon than previously. Keywords: Internet, file-sharing, p2p, peer-to-peer, copyfight, copyright, piracy, Sweden, The Pirate Bay, discourse, technological agency, ontopolitics, technological determinism, justification, motivation, morality, convergence, actor-network theory, infrastructure, convenience, activism, opportunism 3 (346) Abstract. ................................•.....................................................................................•................................ 3 Chapter 1: Introduction .............................................................................................................................. 6 1.1. Introduction .........................................................................................................................................................................6 1.2. Topic of study and geographic context ............................................................................................................................... 7 1.3. Research question: What is p2p·based file-sharing? ......................................................................................................... 8 1.4. Structure, epistemology, methodology and overall approach ........................................................................................... 10 Chapter 2: literature review ..................................................................................................................... 22 2.1. Introduction .......................................................................................................................................................................22 2.2. Outlining the dichotomy: Is there a 'copyfight: and how is it constituted? ........................................................................ 26 2.2.1. The 'copyleft' appraisal .......................................................................................................................................... 31 2.2.2. New technology as facilitator of activist media uses .............................................................................................. 40 2.3. 'Piracy' and gift economies ............................................................................................................................................... 50 2.3.1. Ontological presuppositions underpinning the notion of 'gift economies' .............................................................. 53 2.4. Critiques of the main 'copyleft' standpoints ....................................................................................................................... 57 2.5. Conclusion ........................................................................................................................................................................63 Chapter 3: Method .........................................................................................................................•........... 67 3.1. Introduction .......................................................................................................................................................................67 3.2. Not a traditional ethnographic method .............................................................................................................................. 67 3.3. Methodology - from theoretical standpoint to practical implementation ........................................................................... 71 3.3.1. The notion of agency, and how justificatory discourses relate to it ........................................................................ 71 3.3.2. Prescriptive formations and material alliances ...................................................................................................... 77 3.3.3. To infer general claims from situated particularities, and the reliance on pre-existing accounts ........................... 83 3.3.4. Reflexivity: the researcher's own account of other people's accounts of the world ............................................... 89 3.3.5. World-views of subjective respondents versus world-views implicit in normative formations ................................ 92 3.4. The actual fieldwork: development and motivation ........................................................................................................... 94 3.4.1. The specificity of discourse-based fieldwork on the Internet ................................................................................. 97 3.4.2. Sampling ................................................................................................................................................................99 3.4.3. Email as a context and interview tool, and 'long interview'l'expert interview' as a concept.. ............................... 100 3.4.4. Sequence and ordering of questions ................................................................................................................... 105 3.5. Conclusion ...................................................................................................................................................................... 108 Chapter 4: Historical and technical conditions .................................................................................... 109 4.1. Introduction ..................................................................................................................................................................... 109 4.2. Writing technological history: some initial considerations ............................................................................................... 111 4.3. Peer-to-peer as architecture ........................................................................................................................................... 120 4.4. File-sharing nation: a phenomenon "gaining ground" ..................................................................................................... 125 4.4.1. Gnutella ............................................................................................................................................................... 126 4.4.2. FastTrack ............................................................................................................................................................. 127 4.4.3. BitTorrent ............................................................................................................................................................. 129 4.5. Prevalent metaphors: 'pyramids' and 'darknets' ............................................................................................................. 134 4.6. Rapid historical change, delineated into alleged 'phases" of system design .................................................................. 138 4.7. The
Recommended publications
  • Romanian Political Science Review Vol. XXI, No. 1 2021
    Romanian Political Science Review vol. XXI, no. 1 2021 The end of the Cold War, and the extinction of communism both as an ideology and a practice of government, not only have made possible an unparalleled experiment in building a democratic order in Central and Eastern Europe, but have opened up a most extraordinary intellectual opportunity: to understand, compare and eventually appraise what had previously been neither understandable nor comparable. Studia Politica. Romanian Political Science Review was established in the realization that the problems and concerns of both new and old democracies are beginning to converge. The journal fosters the work of the first generations of Romanian political scientists permeated by a sense of critical engagement with European and American intellectual and political traditions that inspired and explained the modern notions of democracy, pluralism, political liberty, individual freedom, and civil rights. Believing that ideas do matter, the Editors share a common commitment as intellectuals and scholars to try to shed light on the major political problems facing Romania, a country that has recently undergone unprecedented political and social changes. They think of Studia Politica. Romanian Political Science Review as a challenge and a mandate to be involved in scholarly issues of fundamental importance, related not only to the democratization of Romanian polity and politics, to the “great transformation” that is taking place in Central and Eastern Europe, but also to the make-over of the assumptions and prospects of their discipline. They hope to be joined in by those scholars in other countries who feel that the demise of communism calls for a new political science able to reassess the very foundations of democratic ideals and procedures.
    [Show full text]
  • Foxx Street Gossip Zip File Download Avtok V.1.0
    foxx street gossip zip file download AvtoK v.1.0. AvtoK - multi autoclicker. Software for recording and playback of action with a keyboard and mouse, which can be repeated in autoclicker. Despite the apparent simplicity of the main window is quite powerful in its class. Scope: In games and sites that require routine activities. To automate tedious and repetitive actions on the computer. By setting the control points can analyze the image on the screen and organize complex actions. Features. Read more. Rate: License: Freeware Category: Automation Tools Developer: Ocean games Downloads: 319 Size: 1.63 Mb Price: Free. To free download a trial version of AvtoK, click here To visit developer homepage of AvtoK, click here. Screen Shot. Click on a thumbnail for the larger image. System Requirements. AvtoK requires Win2000, Win7 x32, Win7 x64, Win98, WinServer, WinVista, WinVista x64, WinXP. Buzzer v.1.1.0.0. A massive red button that plays a sound of your choice from the config menu allowing you to have a game show style buzzer. Cockerel sound Smelly bottom sound Joke drum roll sound French tart sound Door bell sound Horny horn sound Bloke who’s trapped his figure in the car boot sound Wolf whistle sound Some nifty piece of. Read more. Rate: Release Date: 09/13/2012 License: Freeware Category: Recreation Developer: FluxedDev.com Downloads: 26 Size: 6 Mb Price: Free. To free download a trial version of Buzzer, click here To visit developer homepage of Buzzer, click here. Screen Shot. Click on a thumbnail for the larger image. System Requirements.
    [Show full text]
  • Verksamhetsberättelse 2008
    ANNUAL REPORT 2008 Photo: Johan Schiff, CC-BY-SA-3.0 Photo: Fluff, CC-BY-SA-3.0 Photo: David Castor, Public domain Introduction Wikipedia, the free encyclopedia, is one of the world's ten most visited websites. The site is run by the Wikimedia Foundation, a non-profit foundation, which also operates several other free sites. Wikimedia Sverige is a local chapter of Wikimedia Foundation. The objective of the Wikimedia Sverige, a non-profit organization, is to make knowledge freely available to all people, especially by supporting the Wikimedia Foundation projects. Wikimedia Sverige was founded on October 20, 2007 so 2008 is the first complete year of operation of the association. During the year, the number of members doubled and the assets have increased by a factor of twenty. The board has during the year participated in four major events, held 12 lectures for different groups, participated in 21 local meetups and have had 19 Board meetings and an annual meeting. During the year we have also developed marketing materials, created a book on birds from material from Wikipedia and Wikimedia Commons, and provided support for Lennart Guldbrandssons popular book "This is how Wikipedia works". Internationally, the board participated in several events and developed personal contacts with other local chapters of the Wikimedia Foundation. In a short time we have been recognized as an active and effective organization. We feel a very positive feedback from various groups in the Swedish society and can with pleasure notice that Wikipedia has become increasingly more reliable and accepted for use in schools and by media.
    [Show full text]
  • The Wealth of Networks How Social Production Transforms Markets and Freedom
    Name /yal05/27282_u00 01/27/06 10:25AM Plate # 0-Composite pg 3 # 3 The Wealth of Networks How Social Production Transforms Markets and Freedom Yochai Benkler Yale University Press Ϫ1 New Haven and London 0 ϩ1 Name /yal05/27282_u00 01/27/06 10:25AM Plate # 0-Composite pg 4 # 4 Copyright ᭧ 2006 by Yochai Benkler. All rights reserved. Subject to the exception immediately following, this book may not be repro- duced, in whole or in part, including illustrations, in any form (beyond that copy- ing permitted by Sections 107 and 108 of the U.S. Copyright Law and except by reviewers for the public press), without written permission from the publishers. The author has made an online version of the book available under a Creative Commons Noncommercial Sharealike license; it can be accessed through the author’s website at http://www.benkler.org. Printed in the United States of America. Library of Congress Cataloging-in-Publication Data Benkler, Yochai. The wealth of networks : how social production transforms markets and freedom / Yochai Benkler. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-300-11056-2 (alk. paper) ISBN-10: 0-300-11056-1 (alk. paper) 1. Information society. 2. Information networks. 3. Computer networks—Social aspects. 4. Computer networks—Economic aspects. I. Title. HM851.B457 2006 303.48'33—dc22 2005028316 A catalogue record for this book is available from the British Library. The paper in this book meets the guidelines for permanence and durability of the Committee on Production Guidelines for Book Longevity of the Council on Library Resources.
    [Show full text]
  • UC Riverside UC Riverside Electronic Theses and Dissertations
    UC Riverside UC Riverside Electronic Theses and Dissertations Title Sonic Retro-Futures: Musical Nostalgia as Revolution in Post-1960s American Literature, Film and Technoculture Permalink https://escholarship.org/uc/item/65f2825x Author Young, Mark Thomas Publication Date 2015 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA RIVERSIDE Sonic Retro-Futures: Musical Nostalgia as Revolution in Post-1960s American Literature, Film and Technoculture A Dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in English by Mark Thomas Young June 2015 Dissertation Committee: Dr. Sherryl Vint, Chairperson Dr. Steven Gould Axelrod Dr. Tom Lutz Copyright by Mark Thomas Young 2015 The Dissertation of Mark Thomas Young is approved: Committee Chairperson University of California, Riverside ACKNOWLEDGEMENTS As there are many midwives to an “individual” success, I’d like to thank the various mentors, colleagues, organizations, friends, and family members who have supported me through the stages of conception, drafting, revision, and completion of this project. Perhaps the most important influences on my early thinking about this topic came from Paweł Frelik and Larry McCaffery, with whom I shared a rousing desert hike in the foothills of Borrego Springs. After an evening of food, drink, and lively exchange, I had the long-overdue epiphany to channel my training in musical performance more directly into my academic pursuits. The early support, friendship, and collegiality of these two had a tremendously positive effect on the arc of my scholarship; knowing they believed in the project helped me pencil its first sketchy contours—and ultimately see it through to the end.
    [Show full text]
  • Nokia in 2010 Review by the Board of Directors and Nokia Annual Accounts 2010
    Nokia in 2010 Review by the Board of Directors and Nokia Annual Accounts 2010 Key data ........................................................................................................................................................................... 2 Review by the Board of Directors 2010 ................................................................................................................ 3 Annual Accounts 2010 Consolidated income statements, IFRS ................................................................................................................ 16 Consolidated statements of comprehensive income, IFRS ............................................................................. 17 Consolidated statements of financial position, IFRS ........................................................................................ 18 Consolidated statements of cash flows, IFRS ..................................................................................................... 19 Consolidated statements of changes in shareholders’ equity, IFRS ............................................................. 20 Notes to the consolidated financial statements ................................................................................................ 22 Income statements, parent company, FAS .......................................................................................................... 66 Balance sheets, parent company, FAS ..................................................................................................................
    [Show full text]
  • Nokia E5–00 User Guide
    Nokia E5–00 User Guide Issue 1.3 2Contents Contents Calendar 35 Clock 38 Multitasking 40 Safety 6 Flashlight 40 About your device 7 Network services 8 Make calls 40 About Digital Rights Management 9 Voice calls 40 Battery removing 10 During a call 41 Voice mail 42 Get started 11 Answer or decline a call 43 Keys and parts 11 Make a conference call 43 Insert the SIM card and battery 13 1-touch dial a phone number 44 Insert the memory card 16 Call waiting 44 Remove the memory card 17 Call forward 45 Wrist strap 17 Call restrictions 46 Charge the battery 17 Voice dialing 47 Lock or unlock the keyboard 19 Make a video call 48 Connect a compatible headset 19 During a video call 49 Switch the device on and off 20 Answer or decline a video call 50 Antenna locations 20 Video sharing 50 Nokia Switch 21 Log 54 Nokia Ovi Suite 24 Ovi by Nokia 25 Messaging 56 About Ovi Store 26 Messaging folders 57 Organize messages 57 Access codes 26 E-mail 58 Nokia Messaging 63 Basic use 27 Ovi Contacts 64 Home screen 27 Message reader 73 One-touch keys 29 Speech 73 Write text 30 Text and multimedia messages 74 Contacts 32 Special message types 79 Contents 3 Cell broadcast 80 File manager 108 Messaging settings 81 Quickoffice 109 About Chat 84 Converter 109 Set up Office Communicator 85 Zip manager 111 PDF reader 111 Connectivity 85 Printing 111 Data connections and access Dictionary 114 points 85 Notes 115 Network settings 86 Wi-Fi/WLAN connection 87 Positioning (GPS) 115 Active data connections 90 About GPS 115 Synchronization 90 Assisted GPS (A-GPS) 116 Bluetooth
    [Show full text]
  • OPEN SOURCE Software Enter the World Of
    OPEN SOURCE Software http://www.bacula.org http://eraser.heidi.ie Eraser is a secure data Bacula is a set removal tool for Win- of computer programs that permit manag- dows. It completely removes sensitive data ing backup, recovery, and verification of from your hard drive by overwriting it several computer data across a network of com- times with carefully selected patterns. Eraser puters of different kinds. Based on Source is currently supported under Windows XP Forge downloads, Bacula is the most popu- lar Open Source backup program. (with Service Pack 3), Windows Server 2003 (with Service Pack 2), Windows Vista, Win- dows Server 2008, Windows 7 and Windows Server 2008 R2. http://www.emule-project.net e M u l e is a filesharing client which is based on http://shareaza.sourceforge.net/ the eDonkey2000 network but offers more features than the standard client. Shareaza is a very powerful multi-network eMule is one of the biggest and most peer-to-peer ( P2P ) file-sharing client sup- reliable peer-to-peer file sharing clients porting Gnutella² ( G2 ), Gnutella ( G1 ), around the world. eDonkey2000 ( eMule ), DC++, HTTP, FTP and BitTorrent protocols for Windows (or Wine). It allows you to download any file-type For more OSS, visit sourceforge found on several popular P2P networks. Shareaza is FREE & contains NO Spyware or third-party products. http://www.scintilla.org Scintilla is a free source code editing compo- nent which includes useful features such as syntax styling, error indicators, folding, code completion and call tips. The project includes SciTE (SCIntilla based Text Editor).
    [Show full text]
  • The Edonkey File-Sharing Network
    The eDonkey File-Sharing Network Oliver Heckmann, Axel Bock, Andreas Mauthe, Ralf Steinmetz Multimedia Kommunikation (KOM) Technische Universitat¨ Darmstadt Merckstr. 25, 64293 Darmstadt (heckmann, bock, mauthe, steinmetz)@kom.tu-darmstadt.de Abstract: The eDonkey 2000 file-sharing network is one of the most successful peer- to-peer file-sharing applications, especially in Germany. The network itself is a hybrid peer-to-peer network with client applications running on the end-system that are con- nected to a distributed network of dedicated servers. In this paper we describe the eDonkey protocol and measurement results on network/transport layer and application layer that were made with the client software and with an open-source eDonkey server we extended for these measurements. 1 Motivation and Introduction Most of the traffic in the network of access and backbone Internet service providers (ISPs) is generated by peer-to-peer (P2P) file-sharing applications [San03]. These applications are typically bandwidth greedy and generate more long-lived TCP flows than the WWW traffic that was dominating the Internet traffic before the P2P applications. To understand the influence of these applications and the characteristics of the traffic they produce and their impact on network design, capacity expansion, traffic engineering and shaping, it is important to empirically analyse the dominant file-sharing applications. The eDonkey file-sharing protocol is one of these file-sharing protocols. It is imple- mented by the original eDonkey2000 client [eDonkey] and additionally by some open- source clients like mldonkey [mlDonkey] and eMule [eMule]. According to [San03] it is with 52% of the generated file-sharing traffic the most successful P2P file-sharing net- work in Germany, even more successful than the FastTrack protocol used by the P2P client KaZaa [KaZaa] that comes to 44% of the traffic.
    [Show full text]
  • Swedish Film New Docs #3 2012
    Swedish Film NEW DOCS FALL 2012 / WINTER 2013 After You The Clip Colombianos Dare Remember Days of Maremma Everyone Is Older Than I Am Fanny, Alexander & I For You Naked Give Us the Money Le manque The Man Behind the Throne Martha & Niki No Burqas Behind Bars Palme The Sarnos She Male Snails She’s Staging It Sing, Sing Louder Storm In the Andes The Stripper TPB AFK Tzvetanka The Weather War The Wild Ones Welcome to the world of Swedish docs! This year has been a real success, starting at the Sundance Film Festival where Big Boys Gone Bananas!* by Fredrik Gertten and Searching for Sugar Man by Malik Bendjelloul competed and Sugar Man got both the Audience Award and the Jury Special Prize. These two titles are now up for the Oscar nomination run. Domestically we’ve had the best year in the cinemas for Swedish docs since 1979. Titles like Palme by Kristina Lindström and Maud Nycander with an audience over 150.000, and still growing, Searching for Sugar Man, For You Naked by Sara Broos and She Male Snails by Ester Martin Bergsmark have all attracted large audiences. The film critics are also overwhelmed; of all Swedish films that premiered during 2012 so far, five docs are at the top! And more is to come, you now hold in your hands the new issue of Swedish Film with 24 new feature documentaries, ready to hit international festivals and markets such as DOK Leipzig, CPH:DOX and IDFA. Please visit our website www.sfi.se for updated information on Swedish features, documentaries and shorts.
    [Show full text]
  • The Syntheist Movement and Creating God in the Internet Age
    1 I Sing the Body Electric: The Syntheist Movement and Creating God in the Internet Age Melodi H. Dincer Senior Thesis Brown University Department of Religious Studies Adviser: Paul Nahme Second Reader: Daniel Vaca Providence, Rhode Island April 15, 20 2 Table of Contents Acknowledgments. 3 Introduction: Making the Internet Holy. .4 Chapter (1) A Technophilic Genealogy: Piracy and Syntheism as Cybernetic Offspring. .12 Chapter (2) The Atheist Theology of Syntheism . 49 Chapter (3) Enacted Syntheisms: An Ethics of Active Virtuality and Virtual Activity. 96 (In)Conclusions. 138 Works Cited. 144 3 Acknowledgments I would briefly like to thank anyone who has had a hand—actually, even the slightest brush of a finger in making this project materialize outside of the confines of my own brain matter. I would first like to thank Kerri Heffernan and my Royce Fellowship cohort for supporting my initial research on the Church of Kopimism. My time in Berlin and Stockholm on behalf of the Royce made an indelible mark on my entire academic career thus far, without which this thesis would definitely not be as out-of-the-box as it is proud to be. I would also like to thank a few professors in the Religious Studies department who, whether they were aware of it or not, encouraged my confidence in this area of study and shaped how I approached the religious communities this project concerns. Specifically, thank you to Prof. Denzey-Lewis, who taught my first religious studies course at Brown and graciously sponsored my Royce research amidst her own travels. Also, infinite thanks and blessings to Fannie Bialek, who so deftly modeled all that is good in this discipline, and all that is most noble in the often confusing, frustrating, and stressful task of teaching “hard” topics.
    [Show full text]
  • Forescout Counteract® Endpoint Support Compatibility Matrix Updated: October 2018
    ForeScout CounterACT® Endpoint Support Compatibility Matrix Updated: October 2018 ForeScout CounterACT Endpoint Support Compatibility Matrix 2 Table of Contents About Endpoint Support Compatibility ......................................................... 3 Operating Systems ....................................................................................... 3 Microsoft Windows (32 & 64 BIT Versions) ...................................................... 3 MAC OS X / MACOS ...................................................................................... 5 Linux .......................................................................................................... 6 Web Browsers .............................................................................................. 8 Microsoft Windows Applications ...................................................................... 9 Antivirus ................................................................................................. 9 Peer-to-Peer .......................................................................................... 25 Instant Messaging .................................................................................. 31 Anti-Spyware ......................................................................................... 34 Personal Firewall .................................................................................... 36 Hard Drive Encryption ............................................................................. 38 Cloud Sync ...........................................................................................
    [Show full text]