Your SlideShare is downloading. ×
0
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

The Commons - Networked Politics & Technology Seminar

3,761

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
3,761
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. <ul><ul><li>Networked Politics & Technology Seminar </li></ul></ul><ul><ul><li>Berkeley </li></ul></ul><ul><ul><li>2008-12-06 </li></ul></ul><ul><ul><li>The Battle Over Bits </li></ul></ul><ul><ul><li>The Commons: A Culture for Healthy Techno-Politics </li></ul></ul><ul><ul><li>Mike Linksvayer </li></ul></ul><ul><ul><li>Creative Commons </li></ul></ul>Photo by asadal · Licensed under CC Attribution-ShareAlike 2.0 · http://flickr.com/photos/68242677@N00/2117153416/
  • 2. Original photo by Brooke Novak · Licensed under CC BY · http://flickr.com/photos/brookenovak/337889974/ I AM NOT A
  • 3. ... and this is a little far afield from a normal CC presentation. The most important (and CC-relevant) takeaway is that building the commons now is critical to the future of techno-politics turning out well ... as opposed to Orwell!
  • 4. “Napster politics are brutally boring” Lucas Gonze
  • 5. So let’s talk about a crusade for the soul of techno-politics, not a battle over bits.
  • 6. Example threats and fears
  • 7. Cyber terrorism
  • 8. Cyber terrorism (Cyber terror war on)
  • 9. Cyber terrorism (Cyber terror war on) Privacy breaches
  • 10. Cyber terrorism (Cyber terror war on) Privacy breaches Loss of Generativity
  • 11. Cyber terrorism (Cyber terror war on) Privacy breaches Loss of Generativity Lock-in
  • 12. Cyber terrorism (Cyber terror war on) Privacy breaches Loss of Generativity Lock-in Surveillance
  • 13. Cyber terrorism (Cyber terror war on) Privacy breaches Loss of Generativity Lock-in Surveillance DRM
  • 14. Cyber terrorism (Cyber terror war on) Privacy breaches Loss of Generativity Lock-in Surveillance DRM Censorship
  • 15. Cyber terrorism (Cyber terror war on) Privacy breaches Loss of Generativity Lock-in Surveillance DRM Censorship Suppression of innovation
  • 16. Cyber terrorism (Cyber terror war on) Privacy breaches Loss of Generativity Lock-in Surveillance DRM Censorship Suppression of innovation Electoral fraud
  • 17. Threat categories <ul><li>Legitimate security issues </li></ul><ul><li>Protectionism </li></ul><ul><li>Politics and power </li></ul><ul><li>Security theater and fear-based responses (driven by all of above, not just legitimate security issues) </li></ul>
  • 18. Healthy techno-politics <ul><li>Keep same rights online/digitally that we (should anyway) have offline/IRL </li></ul><ul><li>Permit innovation and participation enabled by digital world even if not possible before </li></ul><ul><li>Take advantage of (2) like crazy! </li></ul>
  • 19. How building the commons (free software, free culture, and friends) helps
  • 20. Security <ul><li>Data shows FLOSS is more secure </li></ul><ul><li>Security through obscurity doesn’t work </li></ul><ul><li>FLOSS encourages a heterogeneous computing environment </li></ul><ul><li>Free software and free culture both allergic to DRM and other mechanisms that sacrifice security to other goals </li></ul>
  • 21. Protectionism <ul><li>Peer production undermines policy arguments for protecting knowledge industries </li></ul><ul><li>Free software and free culture both allergic to DRM </li></ul>
  • 22. Politics and power <ul><li>Free software and culture improve transparency </li></ul><ul><li>... and the ability of all to participate </li></ul><ul><li>Peer production works against concentrated power — doesn’t require concentrated production structures and lowers barriers to entry </li></ul>
  • 23. Security theater and fear <ul><li>Access to facts mitigates fear and allows rational evaluation of responses </li></ul><ul><li>Commons work against three previous threats that drive security theater and fear </li></ul>
  • 24. What about network services? The Commons Lost ? <ul><li>No access to source code of web applications ( none of the four freedoms!) </li></ul><ul><li>Application, data, content, even identifiers, all available at the whim of service provider </li></ul><ul><li>Non-transparent, security through obscurity </li></ul><ul><li>Subject to centralized failure, state meddling </li></ul>
  • 25. Autonomy in a network services environment <ul><li>Network application providers should publish source code of running application under a free license </li></ul><ul><li>Collaboratively created content should be available under a free license </li></ul><ul><li>Private data should be available for on-demand export </li></ul><ul><li>Possibly most explicit linkage of free software and free culture yet </li></ul>
  • 26. Network services freedom: early efforts <ul><li>AGPL </li></ul><ul><li>Franklin Street Declaration </li></ul><ul><li>Open Software Service Definition </li></ul><ul><li>Example compliant applications: </li></ul><ul><ul><li>Wikipedia (!) </li></ul></ul><ul><ul><li>Identi.ca </li></ul></ul><ul><li>See http://autonomo.us for ongoing discussion </li></ul>
  • 27. Some network services open issues <ul><li>Governance of centralized services? </li></ul><ul><li>To what extent are completely decentralized services required to maintain freedom? </li></ul><ul><li>Much more experience is required! </li></ul>
  • 28. Photo by RocketRaccoon · Licensed under CC BY · http://flickr.com/photos/rocketraccoon/227241974/
  • 29. Nagging question relevant to the development of techno-politics over last ~10 years: To what extent has the attempt to suppress P2P negatively impacted the development of completely decentralized applications, shaped “Web 2.0”, and added to the network services challenge?
  • 30. Can the success of the (digital) commons alter how we view freedom and power generally?
  • 31. <ul><li>“The gate that has held the movements for equalization of human beings strictly in a dilemma between ineffectiveness and violence has now been opened. The reason is that we have shifted to a zero marginal cost world. As steel is replaced by software, more and more of the value in society becomes non-rivalrous: it can be held by many without costing anybody more than if it is held by a few.” </li></ul><ul><li>Eben Moglen </li></ul>
  • 32. <ul><li>“If we don’t want to live in a jungle, we must change our attitudes. We must start sending the message that a good citizen is one who cooperates when appropriate, not one who is successful at taking from others.” </li></ul><ul><li>Richard Stallman </li></ul>
  • 33.  
  • 34. What is the future of techno-politics? <ul><li>I don’t know </li></ul><ul><li>Have a good idea of what we need to do to make it a good future </li></ul><ul><li>It is truly wonderful that creating free software and free culture has a side effect of facilitating healthy techno-political outcomes </li></ul>
  • 35. So Create! (and learn/experience so you can teach/recommend free software and free culture when appropriate)
  • 36. Building the commons is key to the future of healthy network politics <ul><li>Politicians and corporations are unimaginative ... they need to see solutions, or they react in fear </li></ul><ul><li>A dominant commons makes many closed net scenarios much less likely </li></ul><ul><li>Presentation Lic ense ... http://creativecommons.org/licenses/by-sa/3.0/ </li></ul><ul><li>Attribution ... Author: Mike Linksvayer; Link: http://creativecommons.org </li></ul><ul><li>Questions? ... ml@creativecommons.org </li></ul>

×