Archive for the ‘Uncategorized’ Category

Arrington’s Email Address Unusable in Andromeda Galaxy?

May 16, 2008

Super interesting Gillmore Group podcast today, if a little hot-headed at times. This has to be my new favorite podcast. Link.

At one point, about 45 minutes in, the group starts talking about the now famous(?) incident-turned-thought-experiment where Robert Scoble had used Plaxo to scrape an email address off one of his friend’s Facebook profile (Michael Arrington’s).

The basic problem is this: If Arrington had his way, Scoble would be able to enter Arrington’s secret email address into Gmail, because Arrington trusts Gmail. But Scoble wouldn’t be able to enter the secret email address into Plaxo, because Arrington doesn’t trust Plaxo.

To achieve this programmatically, we’d want a data-sharing framework set up whereby the secret email address would be wrapped a protective permissions blanket that would automatically prevent unwanted people from seeing it and using it. Only too bad the Gillmor Group didn’t talk about how this permission system would work, because I think the devil is in the details. Such a system would be an example of Digital Rights Management (“Code is Law!”); and through this system Arrington avoids having to take Scoble to court because the secret email address manages itself. Don’t we all love DRM?

So what might the DRM permission system look like? I was thinking about one straw man proposal and it got me cringing: What if it were a white-list. Then Arrington could block Plaxo? But how would it work when Scoble wants to enter Arrington’s secret email address into some completely new web system that Arrington doesn’t know whether he trusts or not? ((i.e. Can he play his dvd on linux? no.)) It doesn’t work.

Worse, take the white-list straw man into the future with an analogy for distributed computer systems: What happens if Scoble leaves the galaxy with Arrington’s protected secret, and meets an alien email system that purports to be able to send email privately AND faster than light. Scoble trusts it, and boy, what a great way to call home! But is he allowed to enter Arrington’s secret address? Or does he have to wait 22 million light years to get an updated permission set from Arrington? The white-list straw man doesn’t scale, and it impedes progress.

Hopefully the Gillmor Group will be telling us about DRM that does work soon.

Seems to me that the most useful permission system would allow for a sort of weighted transitive trust network. Returning finally to the original incident about the facebook-scraped email, here are my two cents: If someone provides you with their email address, the typical understanding is one of transitive trust: “Here’s my email address, I want you to have it. Use whatever software you use, but protect my data like you’d protect your own.” In this light at least, Scoble wasn’t wrong; he was just using his address book software.

Privacy == Can of worms.

Larry Lessig for Congress

February 20, 2008

New Year’s Resolution

January 7, 2008

I think my sister-in-law was joking when she suggested it, but I sort of like it, and with an iPhone it should be easy: My new year’s resolution for 2008 is to spend more time on the internet.