• 4 Posts
  • 637 Comments
Joined 2 years ago
cake
Cake day: June 11th, 2023

help-circle



  • As someone in the software/networking space, I have a hard time with the author’s lack of attribution of the control/evasion characteristics of networks to people (developers of protocols, network operators, and users). Yeah, he admits the MPAA exists, but dude doesn’t mention Bram Cohen.

    Describing files as “artificial life” in

    Because peer-to-peer networks on which all files replicate are unpredictable complex systems, the files themselves can be seen as a form of nonorganic life. The reproduction of files can be described with a family tree in the same way that genetic family trees show the relationships between biological relatives.

    is tortured.

    Yeah, control/evasion is an arms race, but it isn’t meaningfully described as interactions within file sharing networks. It’s interactions between people, institutions, laws, legislators, courts, and software owned by different actors.


  • Generally speaking, no programmable networked device is guaranteed to be under your control.

    You can make strong arguments about certain types of hardware and software, but it is always possible that it contains a backdoor from the manufacturer, and it is almost guaranteed that it has multiple vulnerabilities that would give a remote attacker full control.

    Related

    Edit: Generally, I agree with the sentiment that things shouldn’t be this way, but that’s the world we live in. Given how we build software and hardware, we need to be able to update our devices to fix vulnerabilities. As long as that requirement exists, no device can be considered trustworthy.