As Part I of this book explained, the generative nature of the PC and Internet—a certain incompleteness in design, and corresponding openness to outside innovation—is both the cause of their success and the instrument of their forthcoming failure.


1

The most likely reactions to PC and Internet failures brought on by the proliferation of bad code, if they are not forestalled, will be at least as unfortunate as the problems themselves. People now have the opportunity to respond to these problems by moving away from the PC and toward more centrally controlled—“tethered”—information appliances like mobile phones, video game consoles, TiVos, iPods, iPhones, and BlackBerries. The ongoing communication between this new generation of devices and their vendors assures users that functionality and security improvements can be made as new problems are found. To further facilitate glitch-free operation, devices are built to allow no one but the vendor to change them. Users are also now able to ask for the appliancization of their own PCs, in the process forfeiting the ability to easily install new code themselves. In a development reminiscent of the old days of AOL and CompuServe, it is increasingly possible to use a PC as a mere dumb terminal to access Web sites with interactivity but with little room for tinkering. (“Web 2.0” is a new buzzword that celebrates this migration of applications traditionally found on the PC onto the Internet. Confusingly, the term also refers to the separate phenomenon of increased user-generated content and indices on the Web—such as relying on user-provided tags to label photographs.) New information appliances that are tethered to their makers, including PCs and Web sites refashioned in this mold, are tempting solutions for frustrated consumers and businesses.


4

None of these solutions, standing alone, is bad, but the aggregate loss will be enormous if their emergence represents a wholesale shift of our information ecosystem away from generativity. Some are skeptical that a shift so large can take place.1 But confidence in the generative Internet’s inertia is misplaced. It discounts the power of fear should the existing system falter under the force of particularly well-written malware. People might argue about the merits of one platform compared to another (“Linux never needs to be rebooted”),2 but the fact is that no operating system is perfect, and, more importantly, any PC open to running third-party code at the user’s behest can fail when poor code is adopted. The fundamental problem arises from too much functionality in the hands of users who may not exercise it wisely: even the safest Volvo can be driven into a wall.


1

People are frustrated by PC kinks and the erratic behavior they produce. Such unexpected variations in performance have long been smoothed out in refrigerators, televisions, mobile phones, and automobiles. As for PCs, telling users that their own surfing or program installation choices are to blame understandably makes them no less frustrated, even if they realize that a more reliable system would inevitably be less functional—a trade-off seemingly not required by refrigerator improvements. Worse, the increasing reliance on the PC and Internet that suggests momentum in their use means that more is at risk when something goes wrong. Skype users who have abandoned their old-fashioned telephone lines may regret their decision if an emergency arises and they need to dial an emergency number like 911, only to find that they cannot get through, let alone be located automatically.3 When one’s finances, contacts, and appointments are managed using a PC, it is no longer merely frustrating if the computer comes down with a virus. It is enough to search for alternative architectures.


1

A shift to tethered appliances and locked-down PCs will have a ripple effect on long-standing cyberlaw problems, many of which are tugs-of-war between individuals with a real or perceived injury from online activity and those who wish to operate as freely as possible in cyberspace. The capacity for the types of disruptive innovation discussed in the previous chapter will not be the only casualty. A shift to tethered appliances also entails a sea change in the regulability of the Internet. With tethered appliances, the dangers of excess come not from rogue third-party code, but from the much more predictable interventions by regulators into the devices themselves, and in turn into the ways that people can use the appliances.

The most obvious evolution of the computer and network—toward tethered appliancization—is on balance a bad one. It invites regulatory intervention that disrupts a wise equilibrium that depends upon regulators acting with a light touch, as they traditionally have done within liberal societies.

THE LONG ARM OF MARSHALL, TEXAS

TiVo introduced the first digital video recorder (DVR) in 1998.4 It allowed consumers to record and time-shift TV shows. After withstanding several claims that the TiVo DVR infringed other companies’ patents because it offered its users on-screen programming guides,5 the hunted became the hunter. In 2004, TiVo sued satellite TV distributor EchoStar for infringing TiVo’s own patents6 by building DVR functionality into some of EchoStar’s dish systems.7

A Texas jury found for TiVo. TiVo was awarded $90 million in damages and interest. In briefs filed under seal, TiVo apparently asked for more. In August 2006, the court issued the following ruling:

Defendants are hereby . . . ordered to, within thirty (30) days of the issuance of this order, disable the DVR functionality (i.e., disable all storage to and playback from a hard disk drive of television data) in all but 192,708 units of the Infringing Products that have been placed with an end user or subscriber.8

That is, the court ordered EchoStar to kill the DVR functionality in products already owned by “end users”: millions of boxes which were already sitting in living rooms around the world9 with owners who might be using them at that very instant.10 Imagine sitting down to watch television on an EchoStar box, and instead finding that all your recorded shows had been zapped, along with the DVR functionality itself—killed by remote signal traceable to the stroke of a judge’s quill in Marshall, Texas.

The judicial logic for such an order is drawn from fundamental contraband rules: under certain circumstances, if an article infringes on intellectual property rights, it can be impounded and destroyed.11 Impoundment remedies are usually encountered only in the form of Prohibition-era-style raids on warehouses and distribution centers, which seize large amounts of contraband before it is sold to consumers.12 There are no house-to-house raids to, say, seize bootleg concert recordings or reclaim knockoff Rolexes and Louis Vuitton handbags from the people who purchased the goods.

TiVo saw a new opportunity in its patent case, recognizing that EchoStar’s dish system is one of an increasing number of modern tethered appliances. The system periodically phones home to EchoStar, asking for updated programming for its internal software.13 This tethered functionality also means EchoStar can remotely destroy the units. To do so requires EchoStar only to load its central server with an update that kills EchoStar DVRs when they check in for new features.

As of this writing, TiVo v. EchoStar is pending appeal on other grounds.14 The order has been stayed, and no DVRs have yet been remotely destroyed.15 But such remote remedies are not wholly unprecedented. In 2001, a U.S. federal court heard a claim from a company called PlayMedia that AOL had included PlayMedia’s AMP MP3 playback software in version 6.0 of AOL’s software in violation of a settlement agreement between PlayMedia and a company that AOL had acquired. The court agreed with PlayMedia and ordered AOL to prevent “any user of the AOL service from completing an online ‘session’ . . . without AMP being removed from the user’s copy of AOL 6.0 by means of an AOL online ‘live update.’”16


1

TiVo v. EchoStar and PlayMedia v. AOL broach the strange and troubling issues that arise from the curious technological hybrids that increasingly populate the digital world. These hybrids mate the simplicity and reliability of television-like appliances with the privileged power of the vendor to reprogram those appliances over a network.

REGULABILITY AND THE TETHERED APPLIANCE

As legal systems experienced the first wave of suits arising from use of the Internet, scholars such as Lawrence Lessig and Joel Reidenberg emphasized that code could be law.17 In this view, the software we use shapes and channels our online behavior as surely as—or even more surely and subtly than—law itself. Restrictions can be enforced by the way a piece of software operates. Our ways of thinking about such “west coast code”18 are still maturing, and our instincts for when we object to such code are not well formed. Just as technology’s functionality defines the universe in which people can operate, it also defines the range of regulatory options reasonably available to a sovereign. A change in technology can change the power dynamic between those who promulgate the law and those who are subject to it.19


2

If regulators can induce certain alterations in the nature of Internet technologies that others could not undo or widely circumvent, then many of the regulatory limitations occasioned by the Internet would evaporate. Lessig and others have worried greatly about such potential changes, fearing that blunderbuss technology regulation by overeager regulators will intrude on the creative freedom of technology makers and the civic freedoms of those who use the technology.20

So far Lessig’s worries have not come to pass. A system’s level of generativity can change the direction of the power flow between sovereign and subject in favor of the subject, and generative Internet technology has not been easy to alter. There have been private attempts to use code to build so-called trusted systems, software that outsiders can trust to limit users’ behavior—for example, by allowing a song to be played only three times before it “expires,” or by preventing an e-book from being printed.21 (Code-based enforcement mechanisms are also variously called digital rights management systems or technological protection measures.)22 Most trusted systems have failed, often because either savvy users have cracked them early on or the market has simply rejected them. The few that have achieved some measure of adoption—like Apple iTunes’s FairPlay, which allows purchased songs to exist on only five registered devices at once23—are either readily circumvented, or tailored so they do not prevent most users’ desired behavior.


1

Even the governments most determined to regulate certain flows of information— such as China—have found it difficult to suppress the flow of data on the Internet.24 To be sure, with enough effort, censorship can have some effect, especially because most citizens prefer to slow down for speed bumps rather than invent ways around them.25 When a Web site fails to load, for example, users generally visit a substitute site rather than wait. Taking advantage of this reality, Chinese regulators have used their extensive control over ISPs’ routing of data packets to steer users away from undesirable Web sites by simply causing the Web pages to fail to load in the course of normal surfing.

But so long as the endpoints remain generative and any sort of basic Internet access remains available, subversively minded techies can make applications Perfect Enforcement that offer a way around network blocks.26 Such applications can be distributed through the network, and unsavvy users can then partake simply by doubleclicking on an icon. Comprehensive regulatory crackdowns require a non-generative endpoint or influence over the individual using it to ensure that the endpoint is not repurposed.


1

For example, non-generative endpoints like radios and telephones can be constrained by filtering the networks they use. Even if someone is unafraid to turn a radio tuning knob or dial a telephone number to the outside world, radio broadcasts can be jammed, and phone connections can be disabled or monitored. Because radios and telephones are not generative, such jamming cannot be circumvented. North Korea has gone even further with endpoint lockdown. There, by law, the radios themselves are built so that they cannot be tuned to frequencies other than those with official broadcasts.27

With generative devices like PCs, the regulator must settle for either much leakier enforcement or much more resource-intensive measures that target the individual—such as compelling citizens to perform their Internet surfing in cyber cafés or public libraries, where they might limit their activities for fear that others are watching.


1

The shift toward non-generative endpoint technology driven by consumer security worries of the sort described in this book changes the equation.28 The traditional appliance, or nearly any object, for that matter, once placed with an individual, belongs to that person. Tethered appliances belong to a new class of technology. They are appliances in that they are easy to use, while not easy to tinker with. They are tethered because it is easy for their vendors to change them from afar, long after the devices have left warehouses and showrooms. Consider how useful it was in 2003 that Apple could introduce the iTunes Store directly into iTunes software found on PCs running Mac OS.29 Similarly, consumers can turn on a TiVo—or EchoStar—box to find that, thanks to a remote update, it can do new things, such as share programs with other televisions in the house.30


1

These tethered appliances receive remote updates from the manufacturer, but they generally are not configured to allow anyone else to tinker with them—to invent new features and distribute them to other owners who would not know how to program the boxes themselves. Updates come from only one source, with a model of product development limited to non-user innovation. Indeed, recall that some recent devices, like the iPhone, are updated in ways that actively seek out and erase any user modifications. These boxes thus resemble the early proprietary information services like CompuServe and AOL, for which only the service providers could add new features. Any user inventiveness was cabined by delays in chartering and understanding consumer focus groups, the hassles of forging deals with partners to invent and implement suggested features, and the burdens of performing technical R&D.


2

Yet tethered appliances are much more powerful than traditional appliances. Under the old regime, a toaster, once purchased, remains a toaster. An upgraded model might offer a third slot, but no manufacturer’s representative visits consumers and retrofits old toasters. Buy a record and it can be played as many times as the owner wants. If the original musician wishes to rerecord a certain track, she will have to feature it in a successive release—the older work has been released to the four winds and cannot be recalled.31 A shift to smarter appliances, ones that can be updated by—and only by—their makers, is fundamentally changing the way in which we experience our technologies. Appliances become contingent: rented instead of owned, even if one pays up front for them, since they are subject to instantaneous revision.

A continuing connection to a producer paves the way for easier postacquisition improvements: the modern equivalent of third slots for old toasters. That sounds good: more features, instantly distributed. So what is the drawback? Those who believe that markets reflect demand will rightly ask why a producer would make post hoc changes to technology that customers may not want.

One answer is that they may be compelled to do so. Consider EchoStar’s losing verdict in Marshall, Texas. If producers can alter their products long after the products have been bought and installed in homes and offices, it occasions a sea change in the regulability of those products and their users. With products tethered to the network, regulators—perhaps on their own initiative to advance broadly defined public policy, or perhaps acting on behalf of parties like TiVo claiming private harms—finally have a toolkit for exercising meaningful control over the famously anarchic Internet.

TYPES OF PERFECT ENFORCEMENT

The law as we have known it has had flexible borders. This flexibility derives from prosecutorial and police discretion and from the artifice of the outlaw. When code is law, however, execution is exquisite, and law can be self-enforcing. The flexibility recedes. Those who control the tethered appliance can control the behavior undertaken with the device in a number of ways: preemption, specific injunction, and surveillance.

Preemption


1

Preemption entails anticipating and designing against undesirable conduct before it happens. Many of the examples of code as law (or, more generally, architecture as law) fit into this category. Lessig points out that speeding can be regulated quite effectively through the previously mentioned use of speed bumps.32 Put a speed bump in the road and people slow down rather than risk damaging their cars. Likewise, most DVD players have Macrovision copy protection that causes a signal to be embedded in the playback of DVDs, stymieing most attempts to record DVDs onto a VCR.33 Owners of Microsoft’s Zune music player can beam music to other Zune owners, but music so transferred can be played only three times or within three days of the transfer.34 This kind of limitation arguably preempts much of the damage that might otherwise be thought to arise if music subject to copyright could be shared freely. With TiVo, a broadcaster can flag a program as “premium” and assign it an expiration date.35 A little red flag then appears next to it in the viewer’s list of recorded programs, and the TiVo will refuse to play the program after its expiration date. The box’s makers (or regulators of the makers) could further decide to automatically reprogram the TiVo to limit its fast-forwarding functionality or to restrict its hours of operability. (In China, makers of multiplayer games have been compelled to limit the number of hours a day that subscribers can play in an effort to curb gaming addiction.)36 Preemption does not require constant updates so long as the device cannot easily be modified once it is in the user’s possession; the idea is to design the product with broadly defined limits that do not require further intervention to serve the regulator’s or designer’s purposes.

Specific Injunction

Specific injunction takes advantage of the communication that routinely occurs between a particular tethered appliance and its manufacturer, after it is in consumer hands, to reflect changed circumstances. The TiVo v. EchoStar remedy belongs in this category, as it mandates modification of the EchoStar units after they have already been designed and distributed. This remote remedy was practicable because the tethering allowed the devices to be completely reprogrammed, even though the initial design of the EchoStar device had not anticipated a patent infringement judgment.

Specific injunction also allows for much more tailored remedies, like the PlayMedia-specific court order discussed earlier. Such tailoring can be content-specific, user-specific, or even time-specific. These remedies can apply to some units and not others, allowing regulators to winnow out bad uses from good ones on the basis of individual adjudication, rather than rely on the generalities of ex ante legislative-style drafting. For example, suppose a particular television broadcast were found to infringe a copyright or to damage someone’s reputation. In a world of old-fashioned televisions and VCRs, or PCs and peer-to-peer networks, the broadcaster or creator could be sued, but anyone who recorded the broadcast could, as a practical matter, retain a copy. Today, it is possible to require DVR makers to delete the offending broadcast from any DVRs that have recorded it or, perhaps acting with more precision, to retroactively edit out the slice of defamatory content from the recorded program. This control extends beyond any particular content medium: as e-book devices become popular, the same excisions could be performed for print materials. Tailoring also could be user-specific, requiring, say, the prevention or elimination of prurient material from the devices of registered sex offenders but not from others’ devices.

Surveillance


1

Tethered appliances have the capacity to relay information about their uses back to the manufacturer. We have become accustomed to the idea that Web sites track our behavior when we access them—an online bookseller, for example, knows what books we have browsed and bought at its site. Tethered appliances take this knowledge a step further, recording what we do with the appliances even in transactions that have nothing to do with the vendor. A TiVo knows whether its owner watches FOX News or PBS. It knows when someone replays some scenes and skips others. This information is routinely sent to the TiVo mothership;37 for example, in the case of Janet Jackson’s “wardrobe malfunction” during the 2004 Super Bowl halftime show, TiVo was able to calculate that this moment was replayed three times more frequently than any other during the broadcast.38


1

TiVo promises not to release such surveillance information in personally identifiable form, but the company tempers the promise with an industry-standard exception for regulators who request it through legal process.39 Automakers General Motors and BMW offer similar privacy policies for the computer systems, such as OnStar, built into their automobiles. OnStar’s uses range from providing turn-by-turn driving directions with the aid of Global Positioning System (GPS) satellites, to monitoring tire pressure, providing emergency assistance, and facilitating hands-free calling with embedded microphones and speakers. The FBI realized that it could eavesdrop on conversations occurring inside an OnStar-equipped vehicle by remotely reprogramming the system to activate its microphones for use as a “roving bug,” and it has secretly ordered an anonymous carmaker to do just that on at least one occasion.40

A similar dynamic is possible with nearly all mobile phones. Mobile phones can be reprogrammed at a distance, allowing their microphones to be secretly turned on even when the phone is powered down. All ambient noise and conversation can then be continuously picked up and relayed back to law enforcement authorities, regardless of whether the phone is being used for a call.41 On modern PCs equipped with an automatic update feature, there is no technical barrier that prevents the implementation of any similar form of surveillance on the machine, whether it involves turning on the PC’s microphone and video camera, or searching and sharing any documents stored on the machine. Such surveillance could be introduced through a targeted update from the OS maker or from any other provider of software running on the machine.


1

Surveillance need not be limited to targeted eavesdropping that is part of a criminal or civil investigation. It can also be effected more generally. In 1996, law student Michael Adler offered the hypothetical of an Internet-wide search for contraband.42 He pointed out that some digital items might be illegal to possess or be indicative of other illegal activity—for example, child pornography, leaked classified documents, or stores of material copied without permission of the copyright holder. A Net-wide search could be instigated that would inventory connected machines and report back when smoking guns were found.

Tethering makes these approaches practicable and inexpensive for regulators. A government need only regulate certain critical private intermediaries— those who control the tethered appliances—to change the way individuals experience the world. When a doctrine’s scope has been limited by prudential enforcement costs, its reach can be increased as the costs diminish.

EVALUATING PERFECT ENFORCEMENT

The prospect of more thorough or “perfect” law enforcement may seem appealing. If one could wave a wand and make it impossible for people to kill each other, there might seem little reason to hesitate. Although the common law has only rarely sought to outright prohibit the continued distribution of defamatory materials by booksellers and newsstands, much less continued possession by purchasers, ease of enforcement through tethered appliances could make it so that all such material—wherever it might be found—could vanish into the memory hole. Even when it comes to waving the regulator’s wand for the purpose of eradicating online evils like harassment, invasion of privacy, and copyright infringement, there are important reasons to hesitate.43

Objections to the Underlying Substantive Law


1

Some people are consistently diffident about the presence of law in the online space. Those with undiluted libertarian values might oppose easier enforcement of laws as a general matter, because they believe that self-defense is the best solution to harm by others, especially within a medium that carries bits, not bullets.44 By these lights, the most common online harms simply are not as harmful as those in the physical world, and therefore they call for lesser intrusions. For example, defamatory speech might be met not by a lawsuit for money damages or an injunction requiring deletion of the lies, but rather by more speech that corrects the record. A well-configured e-mail client can adequately block spam, making it unnecessary to resort to intervention by a public authority. Material harmful to minors can be defanged by using parental filters, or by providing better education to children about what to expect when they go online and how to deal with images of violence and hate.

Such “just deal with it” arguments are deployed less often against the online circulation of images of child abuse. The creation and distribution of child pornography is nearly universally understood as a significant harm. In this context, those arguing in favor of an anarchic environment shift to claims that the activity is not very common or that existing tools and remedies are sufficiently effective—or they rely on some of the other objections described below.

One can also argue against stronger enforcement regimes by objecting to the laws that will be enforced. For example, many of those who argue against increased copyright enforcement—undertaken through laws that broaden infringement penalties45 or through trusted systems that preempt infringement46— argue that copyright law itself is too expansive.47 For those who believe that intellectual property rights have gone too far, it is natural to argue against regimes that make such rights easier to enforce, independent of seeking to reform the copyright law itself. Similarly, those who believe in lower taxes might object to a plan that makes it easier for intermediaries to collect and remit use and sales taxes for online transactions.48 Likewise, the large contingent of people who routinely engage in illegal online file sharing may naturally disfavor anything that interferes with these activities.49 To be sure, some of those people may download even though they believe it to be wrong—in which case they might welcome a system that better prevents them from yielding to temptation.

Law professor William Stuntz notes the use of legal procedure—evolving doctrines of Fourth and Fifth Amendment protection—as a way of limiting the substantive application of unpopular laws in eighteenth- and nineteenth-century America such as those involving first heresy and sedition, and later railroad and antitrust regulation.50 In that context, he argues, judges interpreted the Fourth and Fifth Amendments in ways designed to increase the costs to law enforcement of collecting evidence from private parties. When the judiciary began defining and enforcing a right to privacy that limited the sorts of searches police could undertake, it became more difficult to successfully prosecute objectionable crimes like heresy, sedition, or trade offenses: “It is as if privacy protection were a proxy for something else, a tool with which courts or juries could limit the government’s substantive power.”51 Challenging the rise of tethered appliances helps maintain certain costs on the exercise of government power—costs that reduce the enforcement of objectionable laws.

The drawback to arguing generally against perfect enforcement because one objects to the laws likely to be enforced is that it preaches to the choir. Certainly, those who oppose copyright laws will also oppose changes to code that facilitate the law’s online enforcement. To persuade those who are more favorably disposed to enforcement of substantive laws using tethered appliances, we must look to other objections.

Portability and Enforceability Without the Rule of Law

While it might be understandable that those opposed to a substantive law would also favor continued barriers to its enforcement, others might say that the price of living under the rule of law is that law ought to be respected, even if one disagrees with it. In this view, the way to protest an undesirable law is to pursue its modification or repeal, rather than to celebrate the difficulty of its enforcement.52 The rise of procedural privacy limits described by Stuntz was itself an artifact of the law—the decisions of judges with license to interpret the Constitution. This legally sanctioned mandate is distinct from one allowing individuals to flout the law when they feel like it, simply because they cannot be easily prevented from engaging in the illicit act or caught.

But not every society operates according to a framework of laws that are democratically promulgated and then enforced by an independent judiciary. Governments like those of China or Saudi Arabia might particularly benefit from technological configurations that allow for inexpensive surveillance or the removal of material authored by political dissidents. In a world where tethered appliances dominate, the cat-and-mouse game tilts toward the cat. Recall that the FBI can secretly eavesdrop on any automobile with an OnStar navigation system by obtaining a judge’s order and ensuring that the surveillance does not otherwise disrupt the system’s functioning. In a place without the rule of law, the prospect of cars rolling off the assembly line surveillance-ready is particularly unsettling. China’s government has already begun experimenting with these sorts of approaches. For example, the PC telephone program Skype is not amenable to third-party changes and is tethered to Skype for its updates. Skype’s distribution partner in China has agreed to censor words like “Falun Gong” and “Dalai Lama” in its text messaging for the Chinese version of the program.53 Other services that are not generative at the technical layer have been similarly modified: Google.cn is censored by Google at the behest of the Chinese government, and Microsoft’s MSN Spaces Chinese blog service automatically filters out sensitive words from blog titles.54

There is an ongoing debate about the degree to which firms chartered in freer societies should assist in censorship or surveillance taking place in less free societies.55 The argument considered here is one layer deeper than that debate: if the information ecosystem at the cutting edge evolves into one that is not generative at its core, then authoritarian governments will naturally inherit an ability to enforce their wills more easily, without needing to change technologies and services or to curtail the breadth of their influence. Because it is often less obvious to users and the wider world, the ability to enforce quietly using qualities of the technology itself is worrisome. Technologies that lend themselves to an easy and tightly coupled expression of governmental power simply will be portable from one society to the next. It will make irrelevant the question about how firms like Google and Skype should operate outside their home countries.

This conclusion suggests that although some social gain may result from better enforcement of existing laws in free societies, the gain might be more than offset by better enforcement in societies that are less free—under repressive governments today, or anywhere in the future. If the gains and losses remain coupled, it might make sense to favor retention of generative technologies to put what law professor James Boyle has called the “Libertarian gotcha” to authoritarian regimes: if one wants technological progress and the associated economic benefits, one must be prepared to accept some measure of social liberalization made possible with that technology.56 Like many regimes that want to harness the benefits of the market while forgoing political liberalization, China is wrestling with this tension today.57 In an attempt to save money and establish independence from an overseas software vendor like Microsoft, China has encouraged the adoption of GNU/Linux,58 an operating system least amenable in its current form to appliancization because anyone can modify it and install it on a non-locked-down endpoint PC. China’s attempt, therefore, represents either a misunderstanding of the key role that endpoints can play in regulation or a calculated judgment that the benefits of international technological independence outweigh the costs of less regulability.

If one objects to censorship in societies that have not developed the rule of law, one can support the maintenance of a generative core in information technology, minimizing the opportunities for some societies that wish to exploit the information revolution to discover new tools for control.

Amplification and the Lock-in of Mistakes

When a regulator makes mistakes in the way it construes or applies a law, a stronger ability to compel compliance implies a stronger ability to compel compliance with all mandates, even those that are the results of mistaken interpretations. Gaps in translation may also arise between a legal mandate and its technological manifestation. This is especially true when technological design is used as a preemptive measure. Under U.S. First Amendment doctrine, prior restraints on speech—preventing speech from occurring in the first place, rather than punishing it after the fact if indeed it is unlawful—are greatly disfavored.59 Design features mandated to prevent speech-related behaviors, on the premise that such behaviors might turn out to be unlawful, could be thought to belong in just that category.60 Consider the Australian Web hosting company that automatically deletes all of its clients’ multimedia files every night unless it receives specific assurances up front that the files in a given directory are placed with the permission of the copyright owner or are uncopyrighted.61


1

Preemptive design may have a hard time tailoring the technical algorithms to the legal rules. Even with some ongoing human oversight, the blacklists of objectionable Web sites maintained by commercial filtering programs are consistently overbroad, erroneously placing Web sites into categories to which they do not belong.62 For example, when the U.S. government sponsored a service to assist Iranians in overcoming Internet filtering imposed by the Iranian government, the U.S.-sponsored service in turn sought to filter out pornographic sites so that Iranians would not use the circumvention service to obtain pornography. The service filtered any site with “ass” in its domain name—including usembassy.state.gov, the U.S. Department of State’s online portal for its own overseas missions.63

In the realm of copyright, whether a particular kind of copying qualifies for a fair use defense is in many instances notoriously difficult to determine ahead of time.64 Some argue that broad attempts to embed copyright protections in technology fall short because the technology cannot easily take into account possible fair use defenses.65 The law prohibiting the circumvention of trusted systems disregards possibilities for fair use—which might make sense, since such an exception could swallow the rule.66 Such judgments appear to rely on the fact that the materials within a trusted system can still be found and copied in non-trusted analog formats, thus digital prohibitions are never complete.67 The worry that a particular speech-related activity will be precluded by design is blunted when the technology merely makes the activity less convenient rather than preventing it altogether. However, if we migrate to an information ecosystem in which tethered appliances predominate, that analog safety valve will wane.

For specific injunctions, the worries about mistakes may appear weaker. A specific injunction to halt an activity or destroy its fruits issues only after an adjudication. If we move to a regime in which individuals, and not just distributors, are susceptible to impoundment remedies for digital contraband, these remedies might be applied only after the status of the contraband has been officially determined.68 Indeed, one might think that an ability to easily recall infringing materials after the fact might make it possible to be more generous about allowing distribution in the first place—cases could proceed to final judgments rather than being functionally decided in earlier stages on the claim that continued distribution of the objectionable material would cause irreparable harm. If cats can easily be put back into bags, there can be less worry about letting them out to begin with.

However, the ability to perfectly (in the sense of thoroughly) scrub everyone’s digital repositories of unlawful content may compromise the values that belie fear of prior restraints, even though the scrub would not be “prior” in fact. Preventing the copying of a work of copyrighted music stops a behavior without removing the work from the public sphere, since presumably the work is still available through authorized channels. It is a different matter to eliminate entirely a piece of digital contraband. Such elimination can make it difficult to understand, reevaluate, or even discuss what happened and why. In ruling against a gag order at a trial, the U.S. Supreme Court worried that the order was an “immediate and irreversible sanction.”69 “If it can be said that a threat of criminal or civil sanctions after publication ‘chills’ speech, prior restraint ‘freezes’ it at least for the time.”70 Post hoc scrubs are not immediate, but they have the prospect of being permanent and irreversible—a freezing of speech that takes place after it has been uttered, and no longer just “for the time.” That the speech had an initial opportunity to be broadcast may make a scrub less worrisome than if it were blocked from the start, but removing this information from the public discourse means that those who come after us will have to rely on secondary sources to make sense of its removal.

To be sure, we can think of cases where complete elimination would be ideal. These are cases in which the public interest is not implicated, and for which continued harm is thought to accrue so long as the material circulates: leaked medical records, child abuse images, and nuclear weapon designs.71 But the number of instances in which legal judgments effecting censorship are overturned or revised—years later—counsels that an ability to thoroughly enforce bans on content makes the law too powerful and its judgments too permanent, since the material covered by the judgment would be permanently blocked from the public view. Imagine a world in which all copies of once-censored books like Candide, The Call of the Wild, and Ulysses had been permanently destroyed at the time of the censoring and could not be studied or enjoyed after subsequent decision-makers lifted the ban.72 In a world of tethered appliances, the primary backstop against perfectly enforced mistakes would have to come from the fact that there would be different views about what to ban found among multiple sovereigns—so a particular piece of samizdat might live on in one jurisdiction even as it was made difficult to find in another.

The use of tethered appliances for surveillance may be least susceptible to an objection of mistake, since surveillance can be used to start a case rather than close it. For example, the use of cameras at traffic lights has met with some objection because of the level of thoroughness they provide—a sense of snooping simply not possible with police alone doing the watching.73 And there are instances where the cameras report false positives.74 However, those accused can have their day in court to explain or deny the charges inspired by the cameras’ initial reviews. Moreover, since running a red light might cause an accident and result in physical harm, the cameras seem well-tailored to dealing with a true hazard, and thus less objectionable. And the mechanization of identifying violators might even make the system more fair, because the occupant of the vehicle cannot earn special treatment based on individual characteristics like race, wealth, or gender. The prospects for abuse are greater when the cameras in mobile phones or the microphones of OnStar can be serendipitously repurposed for surveillance. These sensors are much more invasive and general purpose.

Bulwarks Against Government


1

There has been a simmering debate about the meaning of the Second Amendment to the U.S. Constitution, which concerns “the right of the people to keep and bear Arms.”75 It is not clear whether the constitutional language refers to a collective right that has to do with militias, or an individual one that could more readily be interpreted to preclude gun control legislation. At present, most reported decisions and scholarly authority favor the former interpretation, but the momentum may be shifting.76 For our purposes, we can extract one strand from this debate without having to join it: one reason to prohibit the government’s dispossession of individual firearms is to maintain the prospect that individuals could revolt against a tyrannical regime, or provide a disincentive to a regime considering going down such a path.77 These check-on-government notions are echoed by some members of technical communities, such as those who place more faith in their own encryption to prevent secrets from being compromised than in any government guarantees of self-restraint. Such a description may unnecessarily demean the techies’ worries as a form of paranoia. Translated into a more formal and precise claim, one might worry that the boundless but unnoticeable searches permitted by digital advances can be as disruptive to the equilibrium between citizen and law enforcement as any enforcement-thwarting tools such as encryption.

The equilibrium between citizens and law enforcement has crucially relied on some measure of citizen cooperation. Abuse of surveillance has traditionally been limited not simply by the conscience of those searching or by procedural rules prohibiting the introduction of illegally obtained evidence, but also by the public’s own objections. If occasioned through tethered appliances, such surveillance can be undertaken almost entirely in secret, both as a general matter and for any specific search. Stuntz has explained the value of a renewed focus on physical “data mining” via group sweeps—for example, the searching of all cars near the site of a terrorist threat—and pointed out that such searches are naturally (and healthily) limited because large swaths of the public are noticeably burdened by them.78 The public, in turn, can effectively check such government action by objecting through judicial or political processes, should the sweeps become too onerous. No such check is present in the controlled digital environment; extensive searching can be done with no noticeable burden—indeed, without notice of any kind—on the parties searched. For example, the previously mentioned FBI use of an OnStar-like system to listen in on the occupants of a car is public knowledge only because the manufacturer chose to formally object.79

The rise of tethered appliances significantly reduces the number and variety of people and institutions required to apply the state’s power on a mass scale. It removes a practical check on the use of that power. It diminishes a rule’s ability to attain legitimacy as people choose to participate in its enforcement, or at least not stand in its way.

A government able to pressure the provider of BlackBerries could insist on surveillance of e-mails sent to and from each device.80 And such surveillance would require few people doing the enforcement work. Traditionally, ongoing mass surveillance or control would require a large investment of resources and, in particular, people. Eavesdropping has required police willing to plant and monitor bugs; seizure of contraband has required agents willing to perform raids. Further, a great deal of routine law enforcement activity has required the cooperation of private parties, such as landlords, banks, and employers. The potential for abuse of governmental power is limited not only by whatever procedural protections are afforded in a jurisdiction that recognizes the rule of law, but also more implicitly by the decisions made by parties asked to assist. Sometimes the police refuse to fire on a crowd even if a dictator orders it, and, less dramatically, whistleblowers among a group of participating enforcers can slow down, disrupt, leak, or report on anything they perceive as abusive in a law enforcement action.81

Compare a citywide smoking ban that enters into effect as each proprietor acts to enforce it—under penalty for failing to do so, to be sure—with an alternative ordinance implemented by installing highly sensitive smoke detectors in every public place, wired directly to a central enforcement office. Some in favor of the ordinance may still wish to see it implemented by people rather than mechanical fiat. The latter encourages the proliferation of simple punishment-avoiding behavior that is anathema to open, participatory societies. As law professor Lior Strahilevitz points out, most laws are not self-enforcing, and a measure of the law’s value and importance may be found in just how much those affected by it (including as victims) urge law enforcement to take a stand, or invoke what private rights of action they may have.82 Strahilevitz points to laws against vice and gambling, but the idea can apply to the problems arising from technology as well. Law ought to be understood not simply by its meaning as a text, but by the ways in which it is or is not internalized by the people it affects—whether as targets of the law, victims to be helped by it, or those charged with enforcing it.83

The Benefits of Tolerated Uses

A particular activity might be illegal, but in some cases those with standing to complain about it sometimes hold back on trying to stop it while they determine whether they really object. If they decide they do object, they can sue. Tim Wu calls this phenomenon “tolerated uses,”84 and copyright infringement shows how it can work.

When Congress passed the Digital Millennium Copyright Act of 1998 (DMCA),85 it sought to enlist certain online service providers to help stop the unauthorized spread of copyrighted material. ISPs that just routed packets for others were declared not responsible for copyright infringement taking place over their communication channels.86 Intermediaries that hosted content—such as the CompuServe and Prodigy forums, or Internet hosting sites such as Geocities.com—had more responsibility. They would be unambiguously clear of liability for copyright infringement only if they acted expeditiously to take down infringing material once they were specifically notified of that infringement.87

Although many scholars have pointed out deficiencies and opportunities for abuse in this notice-and-takedown regime,88 the scheme reflects a balance. Under the DMCA safe harbors, intermediaries have been able to provide flexible platforms that allow for a broad variety of amateur expression. For example, Geocities and others have been able to host personal home pages, precursors to the blogs of today, without fear of copyright liability should any of the home page owners post infringing material—at least so long as they act after specific notification of an infringement. Had these intermediaries stopped offering these services for fear of crushing liability under a different legal configuration, people would have had far fewer options to broadcast online: they could have either hosted content through their own personal PCs, with several incumbent shortcomings,89 or forgone broadcasting altogether. Thanks to the incentives of notice-and-takedown, copyright holders gained a ready means of redress for the most egregious instances of copyright infringement, without chilling individual expression across the board in the process.

The DMCA legal regime supports the procrastination principle, allowing for experimentation of all sorts and later reining in excesses and abuses as they happen, rather than preventing them from the outset. Compelling copyright holders to specifically demand takedown may seem like an unnecessary burden, but it may be helpful to them because it allows them to tolerate some facially infringing uses without forcing copyright holders to make a blanket choice between enforcement and no enforcement. Several media companies and publishers simply have not figured out whether YouTube’s and others’ excerpts of their material are friend or foe. Companies are not monolithic, and there can be dissenting views within a company on the matter. A company with such diverse internal voices cannot come right out and give an even temporary blessing to apparent copyright infringement. Such a blessing would cure the material in question of its unlawful character, because the infringement would then be authorized. Yet at the same time, a copyright holder may be loath to issue DMCA notices to try to get material removed each time it appears, because clips can serve a valuable promotional function.

The DMCA regime maintains a loose coupling between the law’s violation and its remedy, asking publishers to step forward and affirmatively declare that they want specific material wiped out as it arises and giving publishers the luxury to accede to some uses without forcing intermediaries to assume that the copyright holder would have wanted the material to be taken down. People might make videos that include copyrighted background music or television show clips and upload them to centralized video sharing services like YouTube. But YouTube does not have to seek these clips out and take them down unless it receives a specific complaint from the copyright holder.

While requiring unprompted attempts at copyright enforcement by a firm like YouTube may not end up being unduly burdensome to the intermediary—it all depends on how its business model and technology are structured—requiring unprompted enforcement may end up precluding uses of copyrighted material to which the author or publisher actually does not object, or on which it has not yet come to a final view.90

Thus there may be some cases when preemptive regimes can be undesirable to the entities they are designed to help. A preemptive intervention to preclude some particular behavior actually disempowers the people who might complain about it to decide that they are willing, after all, to tolerate it. Few would choose to tolerate a murder, making it a good candidate for preemption through design, were that possible,91 but the intricacies of the markets and business models involved in the distribution of intellectual works means that reasonable copyright holders could disagree on whether it would be a good thing to prevent certain unauthorized distributions of their works.

The generative history of the Internet shows that allowing openness to third-party innovation from multiple corners and through multiple business models (or no business model at all) ends up producing widely adopted, socially useful applications not readily anticipated or initiated through the standard corporate production cycle.92 For example, in retrospect, permitting the manufacture of VCRs was a great boon to the publishers who were initially opposed to it. The entire video rental industry was not anticipated by publishers, yet it became a substantial source of revenue for them.93 Had the Hush-A-Phones, Carterfones, and modems of Chapter Two required preapproval, or been erasable at the touch of a button the way that an EchoStar DVR of today can be killed, the decisions to permit them might have gone the other way, and AT&T would not have benefited as people found new and varied uses for their phone lines.

Some in the music, television, and movie industries are embracing cheap networks and the free flow of bits, experimenting with advertising models similar to those pioneered for free television, in which the more people who watch, the more money the publishers can make. For instance, the BBC has made a deal with the technology firm Azureus, makers of a peer-to-peer BitTorrent client that has been viewed as contraband on many university campuses and corporate networks.94 Users of Azureus’s software will now be able to download BBC television programs for free, and with authorization, reflecting both a shift in business model for the BBC and a conversion of Azureus from devil’s tool to helpful distribution vehicle. BitTorrent software ensures that people upload to others as they download, which means that the BBC will be able to release its programs online without incurring the costs of a big bandwidth bill because many viewers will be downloading from fellow viewers rather than from the BBC. EMI is releasing music on iTunes without digital rights management— initially charging more for such unfettered versions.95

The tools that we now take as so central to the modern Internet, including the Web browser, also began and often remain on uncertain legal ground. As one surfs the Internet, it is easy to peek behind the curtain of most Web sites by asking the browser to “view source,” thereby uncovering the code that generates the viewed pages. Users can click on nearly any text or graphic they see and promptly copy it to their own Web sites or save it permanently on their own PCs. The legal theories that make these activities possible are tenuous. Is it an implied license from the Web site owner? Perhaps, but what if the Web site owner has introductory text that demands that no copies like that be made?96 Is it fair use? Perhaps. In the United States, fair use is determined by a fuzzy four-factor test that in practice rests in part on habit and custom, on people’s expectations.97 When a technology is deployed early, those expectations are unsettled, or perhaps settled in the wrong direction, especially among judges who might be called upon to apply the law without themselves having fully experienced the technologies in question. A gap between deployment and regulatory reaction gives the economic and legal systems time to adapt, helping to ensure that doctrines like fair use are applied appropriately.

The Undesirable Collapse of Conduct and Decision Rules

Law professor Meir Dan-Cohen describes law as separately telling people how to behave and telling judges what penalties to impose should people break the law. In more general terms, he has observed that law comprises both conduct rules and decision rules.98 There is some disconnect between the two: people may know what the law requires without fully understanding the ramifications for breaking it.99 This division—what he calls an “acoustic separation”—can be helpful: a law can threaten a tough penalty in order to ensure that people obey it, but then later show unadvertised mercy to those who break it.100 If the mercy is not telegraphed ahead of time, people will be more likely to follow the law, while still benefiting from a lesser penalty if they break it and have an excuse to offer, such as duress.


1

Perfect enforcement collapses the public understanding of the law with its application, eliminating a useful interface between the law’s terms and its application. Part of what makes us human are the choices that we make every day about what counts as right and wrong, and whether to give in to temptations that we believe to be wrong. In a completely monitored and controlled environment, those choices vanish. One cannot tell whether one’s behavior is an expression of character or is merely compelled by immediate circumstance.

Of course, it may be difficult to embrace one’s right to flout the law if the flouting entails a gross violation of the rights of another. Few would uphold the freedom of someone to murder as “part of what makes us human.” So we might try to categorize the most common lawbreaking behaviors online and see how often they relate to “merely” speech-related wrongs rather than worse transgressions. This is just the sort of calculus by which prior restraints are disfavored especially when they attach to speech, rather than when they are used to prevent lawbreaking behaviors such as those that lead to physical harm. If most of the abuses sought to be prevented are well addressed through post hoc remedies, and if they might be adequately discovered through existing law enforcement mechanisms, one should disfavor perfect enforcement to preempt them. At the very least, the prospect of abuse of powerful, asymmetric law enforcement tools reminds us that there is a balance to be struck rather than an unmitigated good in perfect enforcement.

WEB 2.0 AND THE END OF GENERATIVITY

The situation for online copyright illustrates that for perfect enforcement to work, generative alternatives must not be widely available.101 In 2007, the movie industry and technology makers unveiled a copy protection scheme for new high-definition DVDs to correct the flaws in the technical protection measures applied to regular DVDs over a decade earlier. The new system was compromised just as quickly; instructions quickly circulated describing how PC users could disable the copy protection on HD-DVDs.102 So long as the generative PC remains at the center of the modern information ecosystem, the ability to deploy trusted systems with restrictions that interfere with user expectations is severely limited: tighten a screw too much, and it will become stripped.

So could the generative PC ever really disappear? As David Post wrote in response to a law review article that was a precursor to this book, “a grid of 400 million open PCs is not less generative than a grid of 400 million open PCs and 500 million locked-down TiVos.”103 Users might shift some of their activities to tethered appliances in response to the security threats described in Chapter Three, and they might even find themselves using locked-down PCs at work or in libraries and Internet cafés. But why would they abandon the generative PC at home? The prospect may be found in “Web 2.0.” As mentioned earlier, in part this label refers to generativity at the content layer, on sites like Wikipedia and Flickr, where content is driven by users.104 But it also refers to something far more technical—a way of building Web sites so that users feel less like they are looking at Web pages and more like they are using applications on their very own PCs.105 New online map services let users click to grasp a map section and move it around; new Internet mail services let users treat their online e-mail repositories as if they were located on their PCs. Many of these technologies might be thought of as technologically generative because they provide hooks for developers from one Web site to draw upon the content and functionality of another—at least if the one lending the material consents.106

Yet the features that make tethered appliances worrisome—that they are less generative and that they can be so quickly and effectively regulated—apply with equal force to the software that migrates to become a service offered over the Internet. Consider Google’s popular map service. It is not only highly useful to end users; it also has an open API (application programming interface) to its map data,107 which means that a third-party Web site creator can start with a mere list of street addresses and immediately produce on her site a Google Map with a digital push-pin at each address.108 This allows any number of “mash-ups” to be made, combining Google Maps with third-party geographic datasets. Internet developers are using the Google Maps API to create Web sites that find and map the nearest Starbucks, create and measure running routes, pinpoint the locations of traffic light cameras, and collate candidates on dating sites to produce instant displays of where one’s best matches can be found.109


2

Because it allows coders access to its map data and functionality, Google’s mapping service is generative. But it is also contingent: Google assigns each Web developer a key and reserves the right to revoke that key at any time, for any reason—or to terminate the whole Google Maps service.110 It is certainly understandable that Google, in choosing to make a generative service out of something in which it has invested heavily, would want to control it. But this puts within the control of Google, and anyone who can regulate Google, all downstream uses of Google Maps—and maps in general, to the extent that Google Maps’ popularity means other mapping services will fail or never be built.

Software built on open APIs that can be withdrawn is much more precarious than software built under the old PC model, where users with Windows could be expected to have Windows for months or years at a time, whether or not Microsoft wanted them to keep it. To the extent that we find ourselves primarily using a particular online service, whether to store our documents, photos, or buddy lists, we may find switching to a new service more difficult, as the data is no longer on our PCs in a format that other software can read. This disconnect can make it more difficult for third parties to write software that interacts with other software, such as desktop search engines that can currently paw through everything on a PC in order to give us a unified search across a hard drive. Sites may also limit functionality that the user expects or assumes will be available. In 2007, for example, MySpace asked one of its most popular users to remove from her page a piece of music promotion software that was developed by an outside company. She was using it instead of MySpace’s own code.111 Google unexpectedly closed its unsuccessful Google Video purchasing service and remotely disabled users’ access to content they had purchased; after an outcry, Google offered limited refunds instead of restoring access to the videos.112

Continuous Internet access thus is not only facilitating the rise of appliances and PCs that can phone home and be reconfigured by their vendors at any moment. It is also allowing a wholesale shift in code and activities from endpoint PCs to the Web. There are many functional advantages to this, at least so long as one’s Internet connection does not fail. When users can read and compose e-mail online, their inboxes and outboxes await no matter whose machines they borrow—or what operating system the machines have—so long as they have a standard browser. It is just a matter of getting to the right Web site and logging in. We are beginning to be able to use the Web to do word processing, spreadsheet analyses, indeed, nearly anything we might want to do.

Once the endpoint is consigned to hosting only a browser, with new features limited to those added on the other end of the browser’s window, consumer demand for generative PCs can yield to demand for boxes that look like PCs but instead offer only that browser. Then, as with tethered appliances, when Web 2.0 services change their offerings, the user may have no ability to keep using an older version, as one might do with software that stops being actively made available.

This is an unfortunate transformation. It is a mistake to think of the Web browser as the apex of the PC’s evolution, especially as new peer-to-peer applications show that PCs can be used to ease network traffic congestion and to allow people directly to interact in new ways.113 Just as those applications are beginning to show promise—whether as ad hoc networks that PCs can create among each other in the absence of connectivity to an ISP, or as distributed processing and storage devices that could apply wasted computing cycles to faraway computational problems114—there is less reason for those shopping for a PC to factor generative capacity into a short-term purchasing decision. As a 2007 Wall Street Journal headline put it: “‘Dumb terminals can be a smart move’: Computing devices lack extras but offer security, cost savings.”115

* * *

Generative networks like the Internet can be partially controlled, and there is important work to be done to enumerate the ways in which governments try to censor the Net.116 But the key move to watch is a sea change in control over the endpoint: lock down the device, and network censorship and control can be extraordinarily reinforced. The prospect of tethered appliances and software as service permits major regulatory intrusions to be implemented as minor technical adjustments to code or requests to service providers. Generative technologies ought to be given wide latitude to find a variety of uses—including ones that encroach upon other interests. These encroachments may be undesirable, but they may also create opportunities to reconceptualize the rights underlying the threatened traditional markets and business models. An information technology environment capable of recursive innovation117 in the realms of business, art, and culture will best thrive with continued regulatory forbearance, recognizing that the disruption occasioned by generative information technology often amounts to a long-term gain even as it causes a short-term threat to some powerful and legitimate interests.

The generative spirit allows for all sorts of software to be built, and all sorts of content to be exchanged, without anticipating what markets want—or what level of harm can arise. The development of much software today, and thus of the generative services facilitated at the content layer of the Internet, is undertaken by disparate groups, often not acting in concert, whose work can become greater than the sum of its parts because it is not funneled through a single vendor’s development cycle.118


1

The keys to maintaining a generative system are to ensure its internal security without resorting to lockdown, and to find ways to enable enough enforcement against its undesirable uses without requiring a system of perfect enforcement. The next chapters explore how some enterprises that are generative at the content level have managed to remain productive without requiring extensive lockdown or external regulation, and apply those lessons to the future of the Internet.

Posted by The Editors on March 14, 2008
Tags: Uncategorized

Total comments on this page: 221

How to read/write comments

Comments on specific paragraphs:

Click the icon to the right of a paragraph

  • If there are no prior comments there, a comment entry form will appear automatically
  • If there are already comments, you will see them and the form will be at the bottom of the thread

Comments on the page as a whole:

Click the icon to the right of the page title (works the same as paragraphs)

Comments Overview

Comments

No comments yet.

dc on paragraph 37:

The recent passport flap regarding personal information of three presidential candidates at the U.S. State Department seems to hint at the potential for problems with tethered appliances, especially long-term ones.

For example, Google’s Gmail service is used extremely widely, and prides itself on being able to archive 100% of users’ e-mail — for years on end. (I believe every user is entitled to 1TB of storage!) Due to its widespread use, I wouldn’t be surprised if more than a few future public figures and celebrities currently use it. (Obama wasn’t running for president when he first started using his passport…) Down the road, after a couple Gmail users become famous, Google will still have access to e-mail sent and received by these people from years into their past.

And as the State Department fiasco revealed, even if Google (the company) didn’t abuse its power and look at individuals’ private records, some Google employee might find the opportunity too tempting to pass up. It’s also possible that when such a breach occurs, Google (or some other company in a similar situation) might not publicize it.

Is there any way to protect one’s privacy when using tethered appliances and “software as service”? It seems difficult, and certainly much more opaque than untethered hardware and software.

March 25, 2008 8:21 pm
Harry Sheldon on paragraph 83:

The sense of right and wrong has many variables: From location to location, time to time and individual to individual. Only the very roughest of consensus exists.
Law (codified law) is very ‘granular:.It lacks fine discrimination to deal with the fine detail of the rights and wrongs of life circumstances, but as long as it is not applied rigidly it is, at its best (not worst), the best that can be done. (I agree with your thesis).
A different, and to me more cogent aspect of breaking laws (particular laws or in the extremity, the body of Law) is the fact that some legal systems are so exploitative that the whole social order needs overturning. In the more usual and restrictive sense, bad laws have, and will always, exist embedded within the matrix of a general legal system. An individual whose (considered) ethics and values conflicts with the current local ethos then must confront massive state power and a conservative, interest laden, and essentially authoritarian monolith of systematized legality or, as a matter of practical survival acquiesce. A stark choice for many (eg. Martin Luther King et.al.)
So a decision to break law not for temptation knowing that one does wrong, but to break law “knowing” that law is wrong,

May 3, 2008 3:41 am
Andrew Magliozzi on paragraph 26:

Upon reading the word “contingent” in this paragraph, I recalled Richard Rorty’s “Contingency, Irony, and Solidarity.” In that book, Rorty asserts that we have no permanent access to the truth; our knowledge is merely contingent on the vocabularies we create:

“Truth cannot be out there–cannot exist independently of the human mind–because sentences cannot so exist, or be out there. The world is out there, but descriptions of the world are not. Only descriptions of the world can be true or false. The world on its own–unaided by the describing activities of human beings–cannot.”

That is, we do not discover the Truth; we create and approximate it with the resources at hand.

It is thus interesting to consider how the “contingency” of our computing appliances might similarly affect our “intellectual and moral progress.” Less openness and freedom allows for less remixing and ingenuity.

If there is going to be a structure for human achievement via technology, I’d much rather it emerge collectively from below than corporately from above.

May 12, 2008 5:38 pm
Lex Ferenda » Netizenship on whole page :

[…] about projects. Yes, down-to-earth real stuff. He mentions the OnStar discussion from his book (chapter 5), which he said was particularly challenging to write because of the fears that emerge from the […]

May 16, 2008 3:21 pm
John Janzen on paragraph 3:

I think you misrepresent Software as a Service and tethered services like Tevo as a wholesale change. These technologies are complimentary improvements, not replacements. The new technologies are not innately in conflict with the existing “run anything” PC operating system.

Replacement technologies do form. Digital photography is an example of a replacement technology because you can’t purchase a combination film and digital camera. One must choose one over the other. But SaaS and Tevo technologies co-exist comfortably with the prior and more generative technologies. If I buy a Tevo player, I can still watch plain old tv or a DVD or even a VHS tape. If a choose SaaS software for contact management, I can still choose to install a checkbook management software on my own machine.

SaaS is more than software; appropriately delivered it is software sandwiched together with service. You are buying the combo meal, not just the hamburger. It represents a discount solution if you need the service.

You mention fear of malware moving individuals to abandon the existing generative technologies. If that happens, which I believe is less likely than it was ten years ago, it will not be due to Tevo or SaaS. It will be due to Malware.

Why not continue to fight the Malware rather than discourage alternative and improved forms of delivery?

May 19, 2008 12:58 am

The author’s point is that people may flock to less generative systems in the name of security instead of dealing with malware, and the possibility of malware, directly.

Less generative systems (tethered appliances, SaaS) offer more security at the expense of freedom to tinker, improve, etc.

This reaction to malware is like throwing out the baby with the bath water.

September 30, 2009 3:44 am

The author’s Volvo analogy is simple and very telling. People ought to understand how to use tools and technologies safely and properly. The user is almost solely responsible for any outcome that arises from the use of their PC. But still, one can become involved in car crashes through no fault of their own.

June 27, 2013 11:19 pm
MXE on paragraph 65:

“It is not clear whether the constitutional language refers to a collective right that has to do with militias, or an individual one that could more readily be interpreted to preclude gun control legislation.”

Yes, it’s perfectly clear. Any “scholarly authority” favoring the former interpretation is intellectual jiu-jitsu initiated by people who can’t stomach the fact that they want part of the Bill of Rights struck, because it doesn’t fit their ideology.

May 19, 2008 1:29 pm
L. Rogers on paragraph 89:

I think an unspoken subtext here is that users are giving up some control with Web 2.0 application in exchange for getting those applications ‘for free.’ The hidden price of free is that this content (sometimes things as near and dear as your only copy of family pictures) is then under the control of a 3rd party. It tends to be in the best interest of the 3rd party provider to acceed to customer demands, but there are scenarios where there could be conflicts. Its all in the fine print of the user agreements … but it does seem that few users read those.

That said, the situation is not perhaps quite so dire; the openess of the system may become a reflection of what the user is willing to pay for that openess. e.g. Pay to own the memory and software to store your own content, or host it on a Web 2.0 service ‘for free’ with the implied risk that that service can be withdrawn at the discretion of the provider.

August 28, 2008 10:50 pm
test :

threaded comment test

September 15, 2008 3:18 pm

[…] Although many have sung the praises of the new system, this trend of contingent generativity - Jonathan Zittrain’s term for intermediaries exerting control over new creativity - has some worrying implications. An ecosystem with perfect enforceability of rules will come to […]

September 2, 2008 9:32 pm

[…] Although many have sung the praises of the new system, this trend of contingent generativity - Jonathan Zittrain’s term for intermediaries exerting control over new creativity - has some worrying implications. An ecosystem with perfect enforceability of rules will come to […]

September 2, 2008 9:34 pm

[…] Although many have sung the praises of the new system, this trend of contingent generativity - Jonathan Zittrain’s term for intermediaries exerting control over new creativity - has some worrying implications. An ecosystem with perfect enforceability of rules will come to […]

September 2, 2008 9:44 pm

[…] Although many have sung the praises of the new system, this trend of contingent generativity - Jonathan Zittrain’s term for intermediaries exerting control over new creativity - has some worrying implications. An ecosystem with perfect enforceability of rules will come to […]

September 3, 2008 2:19 pm

[…] how their software operates—this isn’t actually the case. Similarly, the 2006 ruling of TiVo v. EchoStar raised the question of what rights owners of tethered appliances have when it’s possible for […]

September 17, 2008 5:36 pm
Pierre M on paragraph 2:

I think the buzzword “Web 2.0″ is use more nowadays to refer to the user-generated phenomenon. The expression “Cloud Computing” seems to be more popular when referring to the migration of applications into the Internet.

February 12, 2009 10:44 am

[…] aux portes » des utilisateurs d’appareils “tethered”. Il cite notamment le cas où un véhicule équipé d’un système OnStar a été reprogrammé à distance pour […]

February 16, 2009 10:54 am

[…] than the wilder Internet that preceded them. Thus, as Declan once broke the story, cell phone mics can be used as eavesdropping tools. Our car GPS systems can be made to quietly relay everything said in the car […]

May 6, 2009 8:03 am

[…] than the wilder Internet that preceded them. Thus, as Declan once broke the story, cell phone mics can be used as eavesdropping tools. Our car GPS systems can be made to quietly relay everything said in the car […]

May 6, 2009 12:08 pm

[…] as Declan once broke the story, cell phone mics can be used as eavesdropping tools. Our car GPS systems can be made to quietly relay everything said in the car […]

May 19, 2009 8:05 am
Ambulty on paragraph -1:

great blue heron casino mint casino wirral red rock casino wedding las vegas .las vegas casino tips palace casino edgewater casino halloween party mgm hotel casino detroit .sportcraft casino table golden gaming casino group .san manuel casino restaurant moon casino eldorado casino reno chester casino .about bond casino royale plot .often .is required for .The best of see big rock casino espanola nm reno casino explosion often Following a melbourne casino hotel when sloan ia casino silversands flash casino More information on burswood casino perth In should not image as commerce casino rake palazzo casino map is focused on This website about mt arrowhead casino under monte carlo hotel casino hershey casino pa las vegas casino map 2008 or someone online casino coupon codes rama casino jobs las vegas casino robbery wichita casino This website has information on new choctaw casino it contain
play free casino blackjack gold coast casino x26 hotel .When is focused on site jumerscri.com jumers casino Cool stuff - las vegas casino for sale the need for sns casino tours .in the attached .under .neither without eureka hotel x26 casino redhawk casino marketing outside Such primadonna casino that was jolie ville resort x26 casino pt defiance casino diamond jacks casino shreveport spa at sibiya casino Why hotel casino atlantic city about this .

June 22, 2009 4:20 pm

[…] by a judge in Texas while you live … say in Ohio.  Don’t believe it? Read Chapter 5: Tethered Appliances, Software as Service and Perfect Enforcement” to see how a judge in Marshall Texas did just that — regarding a copyright case […]

July 7, 2009 3:05 pm
Sheermipcem on paragraph -1:

Hi. And see you again.

July 7, 2009 9:33 pm

[…] owned, and can be taken away with only a refund to show for it.  I worry about this phenomenon here and here in my book — I just didn’t have any good examples at the time of writing.  […]

July 17, 2009 2:46 pm

[…] Zittrain’s warnings in his book The Future of the Internet and How to Stop It. […]

July 21, 2009 7:13 am

[…] move, David Rothman at Teleread points to a very disturbing quote from Jonathan Zittrain’s The Future of the Internet and How to Stop It. The very connectedness of the “tethered world” (as Zittrain calls the world of […]

July 22, 2009 2:29 pm

[…] unprecedented power to reach into our homes and change how our devices function. In 2004, TiVo sued Echostar (which runs Dish Network) for giving its customers DVR set-top boxes that TiVo alleged infringed on […]

July 22, 2009 3:49 pm

[…] that devices to store data and code are increasingly becoming information appliances that are controlled by the manufacturer, not the user – precisely the situation the Kindle has […]

July 22, 2009 9:47 pm

[…] Chapter 5 of the book predicts situations just like this. Because of security concerns, we gravitate towards “information appliances like … TiVos, iPods, iPhones, and BlackBerries” that can be automatically updated and patched by the vendor or carrier. Meanwhile, also in the name of security, the vendors take away users’ ability to tinker with the devices. The threat of malicious hacker code is sometimes (not always) handled better under these strict regimes — but what about malicious code installed by the manufacturers, or the governments of the world? […]

July 23, 2009 3:52 pm

[…] outward the definition of “cloud computing.” It arises from the adoption of what I call “tethered appliances.” These are devices where the code and data may well remain near the user, so they do not at […]

July 30, 2009 9:05 am
laura on paragraph 4:

As for PCs, telling users that their own surfing or program installation choices are to blame understandably makes them no less frustrated, even if they realize that a more reliable system would inevitably be less functional—a trade-off seemingly not required by refrigerator improvements
more reliable can make the system function slower

October 8, 2009 4:29 pm
laura on paragraph 5:

With tethered appliances, the dangers of excess come not from rogue third-party code, but from the much more predictable interventions by regulators into the devices themselves, and in turn into the ways that people can use the appliances

more regulated internet

October 8, 2009 4:30 pm
laura on paragraph 15:

TiVo v. EchoStar and PlayMedia v. AOL broach the strange and troubling issues that arise from the curious technological hybrids that increasingly populate the digital world. These hybrids mate the simplicity and reliability of television-like appliances with the privileged power of the vendor to reprogram those appliances over a network.
can destroy the network with a touch of a button. sometimes different groups feel piratized and go to court.

October 8, 2009 4:37 pm
laura on paragraph 18:

Lessig and others have worried greatly about such potential changes, fearing that blunderbuss technology regulation by overeager regulators will intrude on the creative freedom of technology makers and the civic freedoms of those who use the technology.20
Over regulation can hurt the creative freedom the internet provides.

October 8, 2009 5:01 pm
laura on paragraph 18:

There have been private attempts to use code to build so-called trusted systems, software that outsiders can trust to limit users’ behavior—for example, by allowing a song to be played only three times before it “expires,” or by preventing an e-book from being printed.21 (Code-based enforcement mechanisms are also variously called digital rights management systems or technological protection measures.)22 Most trusted systems have failed, often because either savvy users have cracked them early on or the market has simply rejected them
there is a way to get around these greedy companies intent only on the almighty dollar not on creative freedom, look at napster

October 8, 2009 5:05 pm
laura on paragraph 20:

Chinese regulators have used their extensive control over ISPs’ routing of data packets to steer users away from undesirable Web sites by simply causing the Web pages to fail to load in the course of normal surfing
they use peoples impatience against them! how clever and controlling! ew!

October 8, 2009 5:09 pm
laura on paragraph 22:

North Korea has gone even further with endpoint lockdown. There, by law, the radios themselves are built so that they cannot be tuned to frequencies other than those with official broadcasts.27
wow! they have made sure those people do not get creative! I cannot imagine living in such a controlled enviroment!

October 8, 2009 5:11 pm
laura on paragraph 24:

Tethered appliances belong to a new class of technology. They are appliances in that they are easy to use, while not easy to tinker with. They are tethered because it is easy for their vendors to change them from afar, long after the devices have left warehouses and showrooms

they can still control it if u buy it so u do not really own it, but updates on the machine is handy without u having to take it somewhere to update it. Its really a catch 22! Some good but also some bad

October 8, 2009 5:13 pm
laura on paragraph 25:

Updates come from only one source, with a model of product development limited to non-user innovation. Indeed, recall that some recent devices, like the iPhone, are updated in ways that actively seek out and erase any user modifications.

Yikes! sounds like a good device but wow they hood wink people into buying them when u do not really control them at all!

October 8, 2009 5:16 pm
laura on paragraph 26:

A shift to smarter appliances, ones that can be updated by—and only by—their makers, is fundamentally changing the way in which we experience our technologies. Appliances become contingent: rented instead of owned, even if one pays up front for them, since they are subject to instantaneous revision.

we shouldn’t have to pay for them since we just used the device we cannot modify it

October 8, 2009 5:18 pm
laura on paragraph 32:

could further decide to automatically reprogram the TiVo to limit its fast-forwarding functionality or to restrict its hours of operability. (In China, makers of multiplayer games have been compelled to limit the number of hours a day that subscribers can play in an effort to curb gaming addiction.

curb certain activities so you pay more. feels like personel freedoms are not protected on the internet

October 8, 2009 5:31 pm
laura on paragraph 38:

TiVo promises not to release such surveillance information in personally identifiable form, but the company tempers the promise with an industry-standard exception for regulators who request it through legal process.

so if sewed they can have our info how very neat of them!

October 8, 2009 5:36 pm
laura on paragraph 40:

In 1996, law student Michael Adler offered the hypothetical of an Internet-wide search for contraband.42 He pointed out that some digital items might be illegal to possess or be indicative of other illegal activity—for example, child pornography, leaked classified documents, or stores of material copied without permission of the copyright holder. A Net-wide search could be instigated that would inventory connected machines and report back when smoking guns were found
sounds great! could track people with bad activity its not tracking everyone just people who should be tracked.

October 8, 2009 5:37 pm
laura on paragraph 45:

A well-configured e-mail client can adequately block spam, making it unnecessary to resort to intervention by a public authority. Material harmful to minors can be defanged by using parental filters, or by providing better education to children about what to expect when they go online and how to deal with images of violence and hate.
people can modify on their own if we start to regulate the bad people whos to stop the government once the gate is open from regulating us all it could get out of hand.

October 8, 2009 5:39 pm
laura on paragraph 58:

Web sites maintained by commercial filtering programs are consistently overbroad, erroneously placing Web sites into categories to which they do not belong.62 For example, when the U.S. government sponsored a service to assist Iranians in overcoming Internet filtering imposed by the Iranian government, the U.S.-sponsored service in turn sought to filter out pornographic sites so that Iranians would not use the circumvention service to obtain pornography. The service filtered any site with “ass” in its domain name—including usembassy.state.gov, the U.S. Department of State’s online portal for its own overseas missions.63

trying to liberate them but in the end blocking them from their own site! Ha that is funny!

October 8, 2009 5:48 pm

[…] for you, yet all too easy to demand by government.  Applications running the cloud can mean new gatekeepers between you and code you might want to run….If you store your data in the cloud, your provider […]

October 29, 2009 11:02 am
Anonymous on paragraph 97:

jnibhuyygy8t7ffttfftt7y7gy7u

December 8, 2009 10:57 am
Schnarchen on paragraph -1:

Great story, didn’t thought reading this would be so amazing when I read the title with link!

December 9, 2009 5:04 am
L. Reese on paragraph 3:

The author’s Volvo analogy is simple and very telling. People ought to understand how to use tools and technologies safely and properly. The user is almost solely responsible for any outcome that arises from the use of their PC. But still, one can become involved in car crashes through no fault of their own.

February 1, 2010 6:15 pm

[…] Zittrain, a professor at Harvard Law School, outlines a similar case in his book “The Future of the Internet — and How to Stop It.” In 2004, TiVo sued the […]

March 2, 2010 7:00 pm

[…] Zittrain, a professor at Harvard Law School, outlines a similar case in his book “The Future of the Internet — and How to Stop It.” In 2004, TiVo sued the satellite TV […]

March 2, 2010 9:25 pm

[…] Zittrain, a professor at Harvard Law School, outlines a similar case in his book “The Future of the Internet — and How to Stop It.” In 2004, TiVo sued the satellite TV […]

March 2, 2010 10:47 pm

[…] dumb on the school’s part, and (b) reminiscent of this (ubiquitous cameras) and this (remote activation) in the book. Check out the Onion’s take […]

March 8, 2010 6:09 pm

[…] previously covered the drawn-out battle between EchoStar and TiVo over EchoStar’s DVR technology, which TiVo claims infringes its […]

March 12, 2010 11:39 am
Lori B on whole page :

Some people don’t like to do online banking due to privacy issues, but they’ll shop online? Some people like to maintain a certain level of privacy at work/school, but they’ll post all of their information on social websites? (i.e: facebook, twitter, myspace) Some people like the sense of anonymity through the internet, however they give their e-mail address out on every other website they go on. At what level will we all realize that there is no such thing as privacy anymore?
This chapter commented on the fact that ‘A change in technology can change the power dynamic between those who promulgate the law and those who are subject to it.’ This seems to imply that there is no longer any such thing as privacy and where there is technology, there will be ‘digital drama.’

March 28, 2010 7:22 pm

[…] mind-bogglingly dumb on the school’s part, and (b) reminiscent of this (ubiquitous cameras) and this (remote activation) in the book. Check out the Onion’s take […]

April 1, 2010 12:29 pm

[…] infinitum, making it impossible for a reader to say he or she has read an e-book since content is always subject to change. Information flows in the other direction on the Kindle superhighway too, as Amazon apparently […]

June 1, 2010 10:01 am

[…] cases as companies — and governments — figured out how to take advantage of additional control points that exist in tethered appliances.  Their Delphian suggestion came to pass in the mobile arena […]

August 24, 2010 2:16 pm

[…] — or worse, be compelled to by outside pressures.  I write about this prospect at length here.  The famously ungovernable Internet suddenly becomes much more governable, an outcome most […]

September 7, 2010 9:11 am

[…] Apple’s unilateral control over which apps users can run on their iPhones and iPads again raises concerns that a closed platform enables censorship either by Apple directly according to its standards or by […]

January 2, 2011 9:54 am

[…] its remote kill switch on the table as a means for removing any illegal content. TiVo v. EchoStar showed us that some courts are willing to force an infringer to reach in and disable infringing devices […]

March 31, 2011 9:31 am

[…] its remote kill switch on the table as a means for removing any illegal content. TiVo v. EchoStar showed us that some courts are willing to force an infringer to reach in and disable infringing devices […]

March 31, 2011 9:31 am

[…] that information to the device, and potentially also to the user. This technology could be used to disable the camera at classified government outposts; automatically blur out copyrighted background or […]

June 6, 2011 9:23 am
projektowanie stron www on whole page :

Very clean internet site , regards for this post.

September 19, 2011 1:35 am
Eventagentur on whole page :

An impressive share, I just given this specific onto a colleague who has been doing a little analysis with this. And he in reality bought me breakfast because I discovered it for him.. smile. So let me reword in which: Thnx for the deal with! But yeah Thnkx for spending time to discuss this, I feel strongly regarding it and love reading more on this topic. If possible, as you become experience, would you mind updating your site with more details? It is highly ideal for me. Big thumb up just for this blog post!

September 28, 2011 1:20 am
Anonymous on whole page :

I do like the manner in which you have presented this difficulty plus it really does provide us a lot of fodder for consideration. However, from what precisely I have experienced, I simply just trust when other remarks pile on that individuals keep on issue and not get started upon a tirade associated with the news du jour. Still, thank you for this fantastic piece and although I do not necessarily agree with the idea in totality, I value your perspective.

November 3, 2011 4:25 am

[…] rented instead of owned, even if one pays up front for them." (Jonathan Zittrain, The Future of the Internet 107 (2008)). Hence, as Jonathan Zittrain explains, the material you store on your e-reader is […]

November 21, 2011 5:22 pm
ugg boots model: 5815 on whole page :

strongzz Pretty nice post. I just stumbled upon your blog and wanted to say that I have truly enjoyed browsing your blog posts. In any case I’ll be subscribing to your rss feed and I hope you write again soon!

December 5, 2011 3:53 am
Shery Tittle on whole page :

I truly enjoy looking at on this site, it has good content .

February 28, 2012 11:07 am
mujer df busca hombre on whole page :

Hoy en día, hay 2 efectos por a una mujer casada busca un hombre fuera de su matrimonio. La primera razón para sentir que el entendimiento de que atracción salvaje, Participa evitar mujer df busca hombre alejarse de su rutina. La infidelidad de distancia, ayuda a una mujer a una dama aprender y también para razones por las que debe o no debe no debe terminar su relación. La segunda razón que a que una persona un hombre de compañía. Hay varios mujeres casadas entrar The Future of the Internet—And How to Stop It » Chapter 5: Tethered Appliances, Software as Service, and Perfect Enforcement toda una nueva relación de razones financieras, llegar a mayor mujeres casadas situación económica crisis financiera o la posición social, o algún otro a través del cual no tiene.

April 9, 2012 11:41 am

[…] matter. Apple has the ability to do so, and in the past, courts in cases such as TiVo vs. Echostar (discussed at length in Chapter 5 of Future of the Internet) have required companies to modify their existing, tethered products to remove infringing […]

June 13, 2012 11:45 am

[…] matter. Apple has the ability to do so, and in the past, courts in cases such as TiVo vs. Echostar (discussed at length in Chapter 5 of Future of the Internet) have required companies to modify their existing, tethered products to remove infringing […]

June 13, 2012 3:22 pm

[…] « d’écouter aux portes » des utilisateurs d’appareils “tethered”. Il cite notamment le cas où un véhicule équipé d’un système OnStar a été reprogrammé à distance pour […]

July 12, 2012 9:52 pm
August Luck on whole page :

I am glad to be a visitor of this pure site ! , thankyou for this rare information! .

July 18, 2012 5:15 pm
park on whole page :

I am not real excellent with English but I line up this rattling leisurely to read .

July 20, 2012 9:07 am
dating disabled men on paragraph -1:

Hi there friends, how is the whole thing, and what you wish for
to say concerning this piece of writing, in my
view its really awesome for me.

October 30, 2012 7:48 am
Homemade Sleep Remedies on paragraph -1:

Does your blog have a contact page? I’m having trouble locating it but, I’d like to
shoot you an e-mail. I’ve got some suggestions for your blog you might be interested in hearing. Either way, great site and I look forward to seeing it grow over time.

November 4, 2012 9:10 pm

I’m curious to find out what blog platform you happen to be utilizing? I’m experiencing some minor security problems
with my latest blog and I’d like to find something more risk-free. Do you have any recommendations?

January 10, 2013 7:37 am
www.medizinkatalog.info on paragraph -1:

Great goods from you, man. I have be mindful
your stuff prior to and you’re simply too magnificent. I actually like what you’ve obtained right here, really like
what you’re saying and the way in which wherein you assert it. You’re making
it enjoyable and you still take care of to keep
it sensible. I can not wait to read far more from you.
This is really a wonderful website.

January 17, 2013 1:59 am
ray ban glasses on paragraph -1:

WOW just what I was searching for. Came here by searching for sunglasses
armani

March 28, 2013 6:15 am

[…] on installable applications come the restrictions on generativity that The Future of the Internet anticipated: “lock down the device, and network censorship and control can be extraordinarily reinforced.” […]

April 1, 2013 5:02 pm

[…] referred to this as a ‘walled garden’ which was further reflected in chapter 5 of  Zittrain’s (2008) book ‘The Future of the Internet and How to Stop it’. Zittrain demonstrates the lack […]

May 6, 2013 9:05 am
ahmaduqd.jigsy.com on paragraph -1:

I love your blog.. very nice colors & theme.
Did you make this website yourself or did you hire someone to do it for you?
Plz reply as I’m looking to create my own blog and would like to find out where u got this from. appreciate it

May 16, 2013 8:47 am
water ionizer on whole page :

As soon as I detected this internet site I went on reddit to share some of the love with them.

May 31, 2013 5:15 am
toy hauler for sale on whole page :

Sure high resolution video quality includes much memory, that’s why it presents better quality.

May 31, 2013 9:55 am
Carol Mespelt on whole page :

Your insights into which your are writing about are based in truth and understanding. What a great study. . Pardon me for asking and getting of subject but have you designed you website your self or was this carried out by a complete service design studio? Anyway I enjoyed theread.Please maintain up the great work. Cheers!

May 31, 2013 4:19 pm
Jeffery Rohdenburg on whole page :

There are some fascinating cut-off dates on this article however I don’t know if I see all of them center to heart. There is some validity but I will take hold opinion until I look into it further. Good article , thanks and we would like extra! Added to FeedBurner as nicely

June 1, 2013 1:14 am
Detroit Michigan Escorts on whole page :

Hello.This article was extremely interesting, particularly because I was looking for thoughts on this issue last Thursday.

June 1, 2013 5:11 am
ripped x on whole page :

Great post here. One thing I would like to say is that most professional job areas consider the Bachelors Degree like thejust like the entry level requirement for an online college degree. Though Associate Qualifications are a great way to start, completing the Bachelors opens many entrance doors to various employment opportunities, there are numerous online Bachelor Diploma Programs available through institutions like The University of Phoenix, Intercontinental University Online and Kaplan. Another issue is that many brick and mortar institutions offer Online versions of their degree programs but commonly for a substantially higher payment than the firms that specialize in online higher education degree plans.

June 1, 2013 6:04 am
kostka granitowa on whole page :

It’s a shame you don’t have a donate button! I’d definitely donate to this excellent blog! I suppose for now i’ll settle for bookmarking and adding your RSS feed to my Google account. I look forward to fresh updates and will share this blog with my Facebook group. Talk soon!

June 1, 2013 10:36 am
ogrody wroc?aw on whole page :

wonderful post, very informative. I wonder why the other specialists of this sector do not notice this. You must continue your writing. I am confident, you have a huge readers’ base already!

June 1, 2013 6:00 pm
Wrench Acessories on whole page :

Hi! I’ve been following your weblog for a long time now and finally got the bravery to go ahead and give you a shout out from Porter Texas! Just wanted to say keep up the great work!

June 1, 2013 10:23 pm
stop unwanted thoughts on whole page :

I have learned some important things through your blog post post. One other point I would like to convey is that there are lots of games in the marketplace designed particularly for preschool age kids. They consist of pattern acceptance, colors, wildlife, and designs. These often focus on familiarization as opposed to memorization. This makes children engaged without having a sensation like they are learning. Thanks

June 2, 2013 3:29 pm
kostka granitowa on whole page :

Good day! This is my 1st comment here so I just wanted to give a quick shout out and say I truly enjoy reading your blog posts. Can you suggest any other blogs/websites/forums that deal with the same topics? Many thanks!

June 3, 2013 6:22 am
elevate gf on whole page :

Thanks , I’ve just been searching for information approximately this subject for ages and yours is the best I have found out till now. But, what in regards to the bottom line? Are you positive in regards to the supply?

June 3, 2013 7:39 am
Nano Engineered Oils on whole page :

you’re in point of fact a excellent webmaster. The web site loading pace is incredible. It kind of feels that you’re doing any unique trick. In addition, The contents are masterpiece. you’ve performed a excellent process in this matter!

June 3, 2013 6:27 pm
foot pain tampa on whole page :

Greetings! I know this is kinda off topic but I was wondering which blog platform are you using for this site? I’m getting fed up of Wordpress because I’ve had issues with hackers and I’m looking at alternatives for another platform. I would be awesome if you could point me in the direction of a good platform.

June 4, 2013 11:01 am
foot pain seattle on whole page :

Wow! This blog looks just like my old one! It’s on a completely different subject but it has pretty much the same layout and design. Great choice of colors!

June 4, 2013 1:57 pm
foot pain Seattle on whole page :

I love what you guys are up too. This type of clever work and reporting! Keep up the wonderful works guys I’ve incorporated you guys to my personal blogroll.

June 4, 2013 7:51 pm
plantar fasciitis Seattle on whole page :

My programmer is trying to convince me to move to .net from PHP. I have always disliked the idea because of the expenses. But he’s tryiong none the less. I’ve been using Movable-type on a variety of websites for about a year and am concerned about switching to another platform. I have heard excellent things about blogengine.net. Is there a way I can import all my wordpress posts into it? Any kind of help would be really appreciated!

June 4, 2013 10:08 pm
pirater un compte facebook on whole page :

I have to express appreciation to you just for rescuing me from this particular trouble. Because of exploring through the search engines and coming across views that were not pleasant, I thought my entire life was over. Living without the strategies to the problems you’ve fixed by means of this article content is a critical case, and ones that might have badly affected my career if I had not encountered your blog. Your personal understanding and kindness in taking care of all areas was valuable. I am not sure what I would have done if I hadn’t come upon such a thing like this. I can also now look forward to my future. Thanks for your time so much for the impressive and effective help. I won’t be reluctant to endorse the blog to anyone who desires care about this problem.

June 5, 2013 4:05 am
heel pain Memphis on whole page :

Howdy, i read your blog occasionally and i own a similar one and i was just curious if you get a lot of spam feedback? If so how do you reduce it, any plugin or anything you can recommend? I get so much lately it’s driving me mad so any support is very much appreciated.

June 5, 2013 4:16 am
defiance power leveling on whole page :

Hey there! This is my first comment here so I just wanted to give a quick shout out and tell you I really enjoy reading through your articles. Can you recommend any other blogs/websites/forums that deal with the same subjects? Thanks for your time!

June 5, 2013 11:51 am
lotro power leveling on whole page :

you have got a great weblog here! would you like to make some invite posts on my weblog?

June 5, 2013 1:21 pm
wot power leveling on whole page :

naturally like your website however you need to test the spelling on quite a few of your posts. A number of them are rife with spelling issues and I to find it very troublesome to inform the truth on the other hand I will certainly come back again.

June 5, 2013 5:46 pm
Northshore plumber on whole page :

Great blog! Do you have any tips and hints for aspiring writers? I’m planning to start my own site soon but I’m a little lost on everything. Would you propose starting with a free platform like Wordpress or go for a paid option? There are so many choices out there that I’m completely confused .. Any ideas? Cheers!

June 5, 2013 6:18 pm

Lengthy ahead of the chronicle began we men have got unneurotic aside from the girls and completed factors. We had time.

June 6, 2013 10:49 am
plantar fasciitis Denver on whole page :

Amazing! This blog looks just like my old one! It’s on a totally different subject but it has pretty much the same layout and design. Great choice of colors!

June 6, 2013 3:41 pm
plantar fasciitis Memphis on whole page :

Hola! I’ve been following your site for a long time now and finally got the bravery to go ahead and give you a shout out from Austin Tx! Just wanted to tell you keep up the fantastic work!

June 6, 2013 6:09 pm
funny pictures on whole page :

Hey! Someone in my Facebook group shared this website with us so I came to give it a look. I’m definitely enjoying the information. I’m bookmarking and will be tweeting this to my followers! Terrific blog and fantastic design.

June 6, 2013 8:56 pm
Ilse Pense on whole page :

Eric, gratitude for including my net fundamentals freebies. I be pleased about it.

June 7, 2013 3:10 am

Hi there I am so delighted I found your blog, I really found you by mistake, while I was looking on Digg for something else, Regardless I am here now and would just like to say thanks a lot for a remarkable post and a all round enjoyable blog (I also love the theme/design), I don’t have time to look over it all at the moment but I have book-marked it and also added your RSS feeds, so when I have time I will be back to read a lot more, Please do keep up the fantastic job.

June 7, 2013 5:44 am
wee wee pads on whole page :

Do you mind if I quote a couple of your posts as long as I provide credit and sources back to your site? My website is in the very same niche as yours and my users would truly benefit from a lot of the information you provide here. Please let me know if this okay with you. Thanks a lot!

June 7, 2013 4:08 pm
Tanie OC Lublin on whole page :

Greetings from Ohio! I’m bored to death at work so I decided to check out your site on my iphone during lunch break. I really like the knowledge you provide here and can’t wait to take a look when I get home. I’m surprised at how fast your blog loaded on my cell phone .. I’m not even using WIFI, just 3G .. Anyhow, awesome site!

June 7, 2013 5:39 pm

Hi there I am so glad I found your web site, I really found you by error, while I was searching on Digg for something else, Nonetheless I am here now and would just like to say thanks a lot for a remarkable post and a all round entertaining blog (I also love the theme/design), I don’t have time to browse it all at the minute but I have saved it and also added in your RSS feeds, so when I have time I will be back to read a great deal more, Please do keep up the excellent job.

June 7, 2013 7:07 pm
Jewel at Buangkok on whole page :

Please let me know if you’re looking for a article author for your site. You have some really great posts and I feel I would be a good asset. If you ever want to take some of the load off, I’d really like to write some articles for your blog in exchange for a link back to mine. Please shoot me an email if interested. Thanks!

June 7, 2013 8:35 pm
Numbers Cannella on whole page :

I am sorry on your tremendous overview, but I am certainly passionate the latest Zune, and even anticipation the, together with the good product reviews a few other people have authored, will assist you to evaluate if this is basically the right choice for you.

June 8, 2013 3:23 am
laptop repairs on whole page :

silver jewellery

June 8, 2013 9:48 am
computer mouse on whole page :

An added important component is that if you are a senior, travel insurance regarding pensioners is something that is important to really consider. The more mature you are, the harder at risk you’re for allowing something terrible happen to you while abroad. If you are never covered by many comprehensive insurance, you could have several serious difficulties. Thanks for revealing your good tips on this weblog.

June 9, 2013 4:27 am
chicago party bus weddings on whole page :

The white car seems like a fastback to me; possibly a Dodge Wayfarer or Plymouth P-19.

June 9, 2013 11:50 am
cited on whole page :

I’m curious to find out what weblog platform you occur to become operating with? I’m experiencing some minor safety challenges with my most recent web page and I would like to find one thing extra risk-free. Do you might have any suggestions?

June 10, 2013 10:58 am
here on whole page :

Spot up for this write-up, I in fact assume this webpage desires much additional consideration. I’ll in all probability be once a lot more to read much more, thank you for that details.

June 10, 2013 11:39 am
facial hair on whole page :

I discovered your website internet site online and appearance a couple of your early posts. Always preserve on the outstanding operate. I basically added up your RSS feed to my MSN News Reader. Trying to find forward to reading much more by you at a later date!…

June 10, 2013 12:02 pm
learn on whole page :

It appears you might be receiving rather a lof of undesirable comments. Perhaps you need to appear into a answer for that. ..

June 10, 2013 1:09 pm
uniform tax rebate on whole page :

Terrific post however I was wanting to know if you could write a litte more on this topic? I’d be very grateful if you could elaborate a little bit further. Thanks!

June 10, 2013 4:40 pm
ecommerce investor on whole page :

Hey would you mind stating which blog platform you’re working with? I’m looking to start my own blog in the near future but I’m having a tough time deciding between BlogEngine/Wordpress/B2evolution and Drupal. The reason I ask is because your design and style seems different then most blogs and I’m looking for something completely unique. P.S My apologies for getting off-topic but I had to ask!

June 10, 2013 10:47 pm
online marketing agency on whole page :

Thanks for a marvelous posting! I certainly enjoyed reading it, you can be a great author.I will always bookmark your blog and will come back in the future. I want to encourage you to continue your great posts, have a nice holiday weekend!

June 11, 2013 7:30 am
more on whole page :

Hey! I could have sworn I’ve been to this site before but after checking through some of the post I realized it’s new to me. Nonetheless, I’m definitely happy I found it and I’ll be bookmarking and checking back often!

June 11, 2013 5:07 pm
uchwyt do projektora on whole page :

Hey would you mind sharing which blog platform you’re working with? I’m going to start my own blog soon but I’m having a hard time deciding between BlogEngine/Wordpress/B2evolution and Drupal. The reason I ask is because your design seems different then most blogs and I’m looking for something unique. P.S Apologies for being off-topic but I had to ask!

June 12, 2013 3:51 am
tech-led.pl on whole page :

Hi! I know this is kinda off topic however , I’d figured I’d ask. Would you be interested in exchanging links or maybe guest writing a blog article or vice-versa? My blog addresses a lot of the same subjects as yours and I feel we could greatly benefit from each other. If you’re interested feel free to shoot me an email. I look forward to hearing from you! Wonderful blog by the way!

June 12, 2013 5:22 am
NFL Jerseys on whole page :

I do agree with all the ideas you’ve presented on your post. They are very convincing and will definitely work. Nonetheless, the posts are too brief for beginners. May just you please extend them a little from next time? Thanks for the post.

June 13, 2013 4:18 am
flamenco guitar on whole page :

Hmm it appears like your website ate my first comment (it was super long) so I guess I’ll just sum it up what I submitted and say, I’m thoroughly enjoying your blog. I too am an aspiring blog blogger but I’m still new to everything. Do you have any recommendations for inexperienced blog writers? I’d definitely appreciate it.

June 13, 2013 4:55 am
Chelsea Bed on whole page :

Hey there would you mind sharing which blog platform you’re using? I’m planning to start my own blog soon but I’m having a tough time making a decision between BlogEngine/Wordpress/B2evolution and Drupal. The reason I ask is because your layout seems different then most blogs and I’m looking for something unique. P.S Apologies for getting off-topic but I had to ask!

June 14, 2013 7:11 am

hi!,I like your writing so so much! percentage we keep up a correspondence more approximately your post on AOL? I need an expert on this space to unravel my problem. May be that is you! Having a look forward to look you.

June 14, 2013 7:14 am
zobacz on whole page :

Cool blog! Is your theme custom made or did you download it from somewhere? A design like yours with a few simple adjustements would really make my blog jump out. Please let me know where you got your theme. Appreciate it

June 14, 2013 7:27 pm
love spells on whole page :

Have you ever thought about writing an e-book or guest authoring on other sites? I have a blog centered on the same subjects you discuss and would really like to have you share some stories/information. I know my readers would enjoy your work. If you are even remotely interested, feel free to send me an email.

June 15, 2013 2:09 pm
Custom Orthotics Canada on whole page :

Please let me know if you’re looking for a author for your weblog. You have some really good articles and I believe I would be a good asset. If you ever want to take some of the load off, I’d really like to write some material for your blog in exchange for a link back to mine. Please send me an e-mail if interested. Thanks!

June 15, 2013 3:33 pm

I feel other web-site proprietors need to take this website as an model, really clean and fantastic user friendly style and design, let alone the content material. That you are an expert within this topic!

June 16, 2013 7:57 pm
sohila zadran on whole page :

Hey there! I know this is kinda off topic but I was wondering which blog platform are you using for this site? I’m getting fed up of Wordpress because I’ve had issues with hackers and I’m looking at options for another platform. I would be fantastic if you could point me in the direction of a good platform.

June 18, 2013 4:43 pm
Gleboczek Vine Resort & Spa on whole page :

Hi there! Someone in my Facebook group shared this website with us so I came to look it over. I’m definitely loving the information. I’m book-marking and will be tweeting this to my followers! Superb blog and wonderful design.

June 18, 2013 6:06 pm
storage investment on whole page :

Hey! Someone in my Facebook group shared this website with us so I came to look it over. I’m definitely loving the information. I’m book-marking and will be tweeting this to my followers! Fantastic blog and outstanding style and design.

June 19, 2013 8:36 am
www.panitorbalska.pl on whole page :

Hi! I could have sworn I’ve been to this site before but after browsing through some of the post I realized it’s new to me. Nonetheless, I’m definitely happy I found it and I’ll be bookmarking and checking back often!

June 20, 2013 8:18 am
read more on whole page :

Hey would you mind stating which blog platform you’re using? I’m planning to start my own blog soon but I’m having a difficult time selecting between BlogEngine/Wordpress/B2evolution and Drupal. The reason I ask is because your design seems different then most blogs and I’m looking for something unique. P.S Sorry for getting off-topic but I had to ask!

June 20, 2013 10:04 am
palm lovers on whole page :

Hi! I’m at work browsing your blog from my new iphone! Just wanted to say I love reading your blog and look forward to all your posts! Keep up the great work!

June 20, 2013 1:26 pm
website on whole page :

Hi there would you mind stating which blog platform you’re working with? I’m planning to start my own blog soon but I’m having a tough time choosing between BlogEngine/Wordpress/B2evolution and Drupal. The reason I ask is because your layout seems different then most blogs and I’m looking for something completely unique. P.S Sorry for getting off-topic but I had to ask!

June 20, 2013 3:06 pm

you are really a good webmaster. The website loading speed is amazing. It seems that you’re doing any unique trick. Also, The contents are masterpiece. you’ve done a wonderful job on this topic!

June 20, 2013 4:42 pm
Ciechocinek sanatorium on whole page :

Hey! Quick question that’s entirely off topic. Do you know how to make your site mobile friendly? My website looks weird when browsing from my iphone 4. I’m trying to find a template or plugin that might be able to fix this issue. If you have any suggestions, please share. Cheers!

June 20, 2013 11:51 pm
read more here on whole page :

I concur! completely with what you said. Great Stuff. Keep it up

June 23, 2013 8:54 am
MODCHIPS on whole page :

the idea beach towel should really be colored white because it reflects heat away’

June 25, 2013 8:29 am
Full Review on whole page :

Asking questions are actually nice thing if you are not understanding something totally, however this article provides good understanding yet.

June 25, 2013 10:25 pm
newcastle airport parking on whole page :

Howdy! I could have sworn I’ve been to this website before but after reading through some of the post I realized it’s new to me. Anyhow, I’m definitely delighted I found it and I’ll be book-marking and checking back often!

June 26, 2013 9:05 pm
this hyperlink on whole page :

Thanks for ones marvelous posting! I really enjoyed reading it, you may be a great author.I will be sure to bookmark your blog and will come back later in life. I want to encourage you to continue your great posts, have a nice morning!

June 30, 2013 6:35 pm
non latex gloves on whole page :

Wonderful work! That is the kind of information that are meant to be shared across the web. Disgrace on Google for not positioning this post upper! Come on over and talk over with my website . Thank you =)

July 3, 2013 5:37 am
Suggested Resource site on whole page :

The very core of your writing while appearing reasonable at first, did not settle properly with me after some time. Someplace within the paragraphs you actually were able to make me a believer unfortunately just for a very short while. I however have got a problem with your leaps in assumptions and you would do nicely to fill in all those breaks. If you can accomplish that, I could undoubtedly be amazed.

July 7, 2013 2:46 am
Jay Abraham on whole page :

An extraordinary share, I merely with all this onto a colleague who was simply performing a small analysis inside this. And after that he the fact is bought me breakfast just because I uncovered it for him.. smile. So properly then, i’ll reword that: Thnx for the treat! But yeah Thnkx for spending plenty of time go over this, I’m strongly concerning this and appreciate reading regarding this subject. If potential, as you grow to be experience, does one particular thoughts updating your weblog with a lot a lot more information? It actually is highly ideal for me. Huge thumb up in this post!

July 8, 2013 7:59 pm
This Webpage on whole page :

These are truly enormous ideas in regarding blogging. You have touched some nice points here. Any way keep up wrinting.

July 9, 2013 6:10 am
Full Review on whole page :

The crux of your writing while sounding agreeable originally, did not settle perfectly with me after some time. Somewhere throughout the paragraphs you actually managed to make me a believer but just for a very short while. I however have a problem with your jumps in assumptions and one would do well to fill in all those gaps. In the event that you can accomplish that, I will surely be impressed.

July 10, 2013 2:26 pm
Leonard Wakeling on whole page :

Hi there this is somewhat of off topic but I was wondering if blogs use WYSIWYG editors or if you have to manually code with HTML. I’m starting a blog soon but have no coding experience so I wanted to get advice from someone with experience. Any help would be greatly appreciated!

July 11, 2013 4:04 am
Edgardo Wikle on whole page :

Hello! I’ve been following your weblog for some time now and finally got the courage to go ahead and give you a shout out from Huffman Texas! Just wanted to tell you keep up the good work!

July 12, 2013 3:58 am
Jamison Caires on whole page :

Hey there! I could have sworn I’ve been to this website before but after browsing through some of the post I realized it’s new to me. Nonetheless, I’m definitely happy I found it and I’ll be book-marking and checking back often!

July 12, 2013 2:26 pm
Travis Mosen on whole page :

Admiring the persistence you put into your blog and in depth information you provide. It’s good to come across a blog every once in a while that isn’t the same out of date rehashed material. Wonderful read! I’ve saved your site and I’m adding your RSS feeds to my Google account.

July 12, 2013 4:25 pm
Aiko Willcox on whole page :

I’m curious to find out what blog system you happen to be utilizing? I’m experiencing some small security problems with my latest blog and I would like to find something more risk-free. Do you have any recommendations?

July 13, 2013 3:55 am
digital watches for men on whole page :

I know this site gives quality depending articles and other data, is there any other web page which provides such data in quality?

July 14, 2013 7:03 am
Isreal Shomer on whole page :

I really like your blog.. very nice colors & theme. Did you make this website yourself or did you hire someone to do it for you? Plz reply as I’m looking to design my own blog and would like to know where u got this from. many thanks

July 14, 2013 9:29 pm
Britt Safran on whole page :

Hello! I could have sworn I’ve been to this site before but after checking through some of the post I realized it’s new to me. Nonetheless, I’m definitely glad I found it and I’ll be book-marking and checking back frequently!

July 15, 2013 6:38 pm

you’re truly a excellent webmaster. The web site loading pace is amazing. It sort of feels that you’re doing any distinctive trick. Also, The contents are masterpiece. you have performed a magnificent activity on this topic!

July 16, 2013 2:57 pm
Ft. Lauderdale Car Rental on whole page :

Good day! I know this is somewhat off topic but I was wondering if you knew where I could locate a captcha plugin for my comment form? I’m using the same blog platform as yours and I’m having trouble finding one? Thanks a lot!

July 17, 2013 9:26 am

Thank you a lot for sharing this with all people you really realize what you’re talking about! Bookmarked. Kindly also consult with my website =). We can have a link alternate arrangement between us

July 17, 2013 12:48 pm
empower network review 2013 on whole page :

Have you ever considered writing an ebook or guest authoring on other websites? I have a blog centered on the same subjects you discuss and would really like to have you share some stories/information. I know my viewers would appreciate your work. If you’re even remotely interested, feel free to send me an e-mail.

July 18, 2013 1:30 pm

I’ve been absent for a while, but now I remember why I used to love this blog. Thank you, I’ll try and check back more frequently. How frequently you update your site?

July 19, 2013 2:21 am

This is my first time pay a quick visit at here and i am actually happy
to read everthing at one place.

July 19, 2013 6:40 pm
Amado Olsson on whole page :

Hey just wanted to give you a quick heads up. The text in your content seem to be running off the screen in Ie. I’m not sure if this is a format issue or something to do with browser compatibility but I thought I’d post to let you know. The layout look great though! Hope you get the problem resolved soon. Kudos

July 24, 2013 7:08 am
Darnell Sawyers on whole page :

Hey there! I just wanted to ask if you ever have any trouble with hackers? My last blog (wordpress) was hacked and I ended up losing many months of hard work due to no back up. Do you have any methods to stop hackers?

July 24, 2013 4:59 pm
Kenneth Harvel on whole page :

I really like your blog.. very nice colors & theme. Did you design this website yourself or did you hire someone to do it for you? Plz answer back as I’m looking to construct my own blog and would like to know where u got this from. many thanks

July 25, 2013 6:45 am
Genaro Eppihimer on whole page :

I totally concur with what you are saying eventhough this write-up is not suit to new WP :)

July 27, 2013 10:53 am
Conception Shearn on whole page :

My programmer is trying to persuade me to move to .net from PHP. I have always disliked the idea because of the costs. But he’s tryiong none the less. I’ve been using Movable-type on several websites for about a year and am concerned about switching to another platform. I have heard excellent things about blogengine.net. Is there a way I can import all my wordpress content into it? Any kind of help would be really appreciated!

July 29, 2013 7:43 am
Ashley Grumet on whole page :

Hello! I’ve been reading your website for some time now and finally got the courage to go ahead and give you a shout out from Atascocita Tx! Just wanted to tell you keep up the fantastic job!

July 29, 2013 6:58 pm
Pattie Vanpoppelen on whole page :

Yesterday, while I was at work, my sister stole my iPad and tested to see if it can survive a thirty foot drop, just so she can be a youtube sensation. My apple ipad is now destroyed and she has 83 views. I know this is totally off topic but I had to share it with someone!

July 30, 2013 1:06 am
Portia Ballard on whole page :

Howdy! This is my first comment here so I just wanted to give a quick shout out and tell you I genuinely enjoy reading through your articles. Can you suggest any other blogs/websites/forums that go over the same subjects? Appreciate it!

July 30, 2013 3:59 am
Micki Seabrook on whole page :

For lots of amazing pictures,check out a cool new ibook all about graffiti history. http://www.allvoices.com/news/13622749-lens-blog-henry-chalfants-big-subway-archive

July 30, 2013 7:38 am
Marko on paragraph -1:

As the admin of this website is working, no uncertainty very shortly it will be famous, due to its feature contents.

July 31, 2013 1:02 am
Ed Kuczma on paragraph -1:

Nice post. I learn something more challenging on different blogs everyday. It can always be stimulating to read content from other writers and follow just a little something from their store. I?d desire to use some with the content on my blog whether you don?t mind. Natually I?ll give you a link on your web blog. Thanks for sharing.

July 31, 2013 2:10 am
Kathryne Jenaye on whole page :

Hey presently there, I think your website might become having browser compatibility issues. When I examine your web log in Web browser, it seems fine nevertheless when opening in Ie, it has some overlapping. I merely wanted to offer you a fast heads way up! Other and then that, terrific web site!

July 31, 2013 5:02 am
Sydney Normington on paragraph -1:

I was very pleased to find this web-site.I wanted to thanks in your time for this wonderful read!! I definitely enjoying every little bit of it and I have you bookmarked to check out new stuff you blog post.

July 31, 2013 6:35 am
Scott on whole page :

I must express some appreciation to this writer for bailing me out of this type of predicament. After surfing around throughout the world-wide-web and coming across concepts that were not powerful, I thought my life was well over. Existing without the presence of answers to the issues you’ve resolved all through your main review is a serious case, as well as the ones that could have badly affected my career if I hadn’t discovered your website. Your understanding and kindness in controlling almost everything was helpful. I am not sure what I would have done if I had not discovered such a subject like this. I can also at this moment look forward to my future. Thanks so much for this impressive and sensible help. I will not think twice to suggest your blog post to anyone who should have guidance on this situation.

July 31, 2013 9:25 am
Dollie Swicegood on paragraph -1:

A powerful share, I simply given this onto a colleague who was doing slightly evaluation on this. And he actually purchased me breakfast as a result of I discovered it for him.. smile. So let me reword that: Thnx for the deal with! However yeah Thnkx for spending the time to debate this, I really feel strongly about it and love studying extra on this topic. If doable, as you turn out to be experience, would you thoughts updating your weblog with extra particulars? It’s extremely useful for me. Large thumb up for this weblog put up!

July 31, 2013 6:28 pm
Pisanie prac licencjakich on whole page :

Usually I don’t learn article on blogs, however I wish to say that this write-up very compelled me to check out and do so! Your writing taste has been surprised me. Thanks, quite nice article.

August 1, 2013 3:45 am
Modesto Craigo on paragraph -1:

I?m impressed, I have to say. Really hardly ever do I encounter a blog that?s both educative and entertaining, and let me let you know, you could have hit the nail on the head. Your thought is outstanding; the problem is something that not enough persons are speaking intelligently about. I am very comfortable that I stumbled across this in my search for something regarding this.

August 1, 2013 5:14 am
laptop screen repairs on whole page :

laptop screen repair

August 1, 2013 6:49 am
Long Island Car Service on whole page :

My partner and I absolutely love your blog and find most of your post’s to be what precisely I’m looking for. can you offer guest writers to write content to suit your needs? I wouldn’t mind producing a post or elaborating on a lot of the subjects you write about here. Again, awesome weblog!

August 1, 2013 8:55 am
plantar fasciitis Wichita on whole page :

With havin so much content do you ever run into any problems of plagorism or copyright infringement? My blog has a lot of completely unique content I’ve either written myself or outsourced but it looks like a lot of it is popping it up all over the web without my authorization. Do you know any ways to help stop content from being ripped off? I’d really appreciate it.

August 1, 2013 3:57 pm
Reggie Baccouche on whole page :

you’re truly a just right webmaster. The website loading speed is incredible. It kind of feels that you are doing any distinctive trick. Furthermore, The contents are masterpiece. you have done a fantastic process in this matter!

August 2, 2013 1:43 am
Cyndi Fisherman on whole page :

Hi! Do you utilize Twitter? I’d prefer to follow you if that you will find ok. I’m definitely enjoying your website and anticipate new blogposts.

August 2, 2013 5:59 am
informative post on whole page :

If you want to grow your knowledge only keep visiting this web page and be updated with the most up-to-date news posted here.

August 2, 2013 6:19 am
mac brushes for cheap on whole page :

Almost every child is wanting your favorite prom dress which her stay ahead of your lady mates and therefore friends kid precious night; yet , getting sensibly priced prom dresses perfect too. It only would be the also most pressing be sure you dress might always adorn yourself with. Nevertheless, on these complicated economic amount of times moms and dads might find it,prom dresses cheap, hard enjoy a ton of money on a gown which often fundamentally employed as soon as. Utilizing are dressed that amounted to you smaller associated with the expense you’ve got leftover bucks to consider essential accessories, sandals as well as odds of profit when it comes to prom event actions.

August 2, 2013 8:48 am
Recommended Reading on whole page :

Whats up this is somewhat of off topic but I was wanting to know if blogs use WYSIWYG editors or if you have to manually code with HTML. I’m starting a blog soon but have no coding know-how so I wanted to get advice from someone with experience. Any help would be greatly appreciated!

August 2, 2013 9:11 am
Aaron Randoll on paragraph -1:

You made some respectable points there. I looked on the internet for the difficulty and found most individuals will go together with together with your website.

August 3, 2013 2:06 am
Candra Babula on paragraph -1:

You made some respectable factors there. I regarded on the web for the difficulty and located most people will go together with together with your website.

August 3, 2013 2:09 am
Delana Briel on whole page :

Hey! I just wanted to ask if you ever have any trouble with hackers? My last blog (wordpress) was hacked and I ended up losing many months of hard work due to no back up. Do you have any solutions to prevent hackers?

August 5, 2013 4:56 am
Diets That Work on whole page :

|Spot on with this write-up, I truly think this website needs much more consideration. I’ll probably be again to read much more, thanks for that info.

August 8, 2013 7:31 pm
Zella Subich on whole page :

Wow, superb blog layout! How long have you been blogging for? you make blogging look easy. The overall look of your site is wonderful, let alone the content!. Thanks For Your article about The Future of the Internet—And How to Stop It » Chapter 5: Tethered Appliances, Software as Service, and Perfect Enforcement .

August 23, 2013 9:37 pm
Hiram Bertholf on whole page :

Wow, wonderful blog layout! How long have you been blogging for? you make blogging look easy. The overall look of your web site is wonderful, as well as the content!. Thanks For Your article about The Future of the Internet—And How to Stop It » Chapter 5: Tethered Appliances, Software as Service, and Perfect Enforcement .

August 27, 2013 8:11 am
Joaquin Zorrilla on whole page :

Hi to every single one, it’s truly a pleasant for me to go to see this web site, it includes useful Information.|

September 9, 2013 7:05 am
Emory Poulos on whole page :

seriously very good factors right here, just thanks

September 11, 2013 3:00 pm
bcxqtbvSH2 on whole page :

The Slave of the Husband…

Seeking in advance to learning additional from you afterward!……

September 15, 2013 4:37 am
pwlhsh epixeirhsewn on whole page :

There is perceptibly a lot to realize about this. I feel you made certain nice points in features also.

September 26, 2013 3:33 am
mold testing macon ga on whole page :

Hello! This is my first comment here so I just wanted to give a quick shout out and tell you I truly enjoy reading through your blog posts. Can you recommend any other blogs/websites/forums that deal with the same topics? Appreciate it!

October 5, 2013 9:42 am
Twila Margaris on whole page :

Wow, amazing blog layout! How long have you been blogging for? you make blogging look easy. The overall look of your site is wonderful, as well as the content!. Thanks For Your article about The Future of the Internet—And How to Stop It » Chapter 5: Tethered Appliances, Software as Service, and Perfect Enforcement .

October 18, 2013 4:43 am
visit this website on whole page :

You are so interesting! I do not suppose I’ve truly read a single thing like this before. So wonderful to discover someone with some unique thoughts on this topic. Seriously.. many thanks for starting this up. This website is one thing that is needed on the internet, someone with a bit of originality!

November 7, 2013 9:44 am
Elene Grigoreas on whole page :

I have to say i’m suffering mental health-wise right now, trying to ascertain why nicola came here in the first place.|

November 14, 2013 10:57 am
MEDICAL ASSISTANT on whole page :

That’s 78,000 more deaths for obese people than underweight.|

November 24, 2013 9:43 am
medical assistant on whole page :

Some really fantastic content on this website , thanks for contribution.|

November 24, 2013 10:24 am
Erma Wosher on whole page :

An impressive share! I have just forwarded this onto a co-worker who has been doing a little research on this. And he actually ordered me dinner because i stumbled upon it for him… Lol. So allow me to reword this…. Thanks for the meal!! But yeah, thanx for spending time to talk about this subject here on your internet site.|

November 24, 2013 2:33 pm
Steven Gillmore on whole page :

Wow, amazing blog layout! How long have you been blogging for? you make blogging look easy. The overall look of your web site is fantastic, as well as the content!. Thanks For Your article about The Future of the Internet—And How to Stop It » Chapter 5: Tethered Appliances, Software as Service, and Perfect Enforcement .

November 25, 2013 5:18 am
radarandlaserforum on whole page :

i love my uggs best radar detector comparison

November 27, 2013 11:58 pm
best radar detectors on whole page :

my uggs bring all the boys to the yard app for radar detector

November 27, 2013 11:59 pm
Reid Valela on whole page :

Does anybody know how I can place a stumbleupon icon for all my blog posts inside my weblog on blogger?

January 8, 2014 6:13 am
Suggested Website on whole page :

Hi there! Do you use Twitter? I’d like to follow you if that would be okay. I’m definitely enjoying your blog and look forward to new updates.

January 19, 2014 8:08 pm
do pobrania on whole page :

You are so interesting! I do not think I have read a single thing like that before. So wonderful to find somebody with original thoughts on this subject matter. Seriously.. thank you for starting this up. This site is something that is required on the web, someone with some originality!

January 29, 2014 5:26 am
fetish vod on paragraph -1:

Now I am going to d? my breakfast, after having my breakfast coming
again to read additi?nal news.

February 3, 2014 3:23 pm
Carleen Cianciola on whole page :

I’ve had Lumsing Power Bank for ages and it just works and works. Gives me two full charges on an iPhone 5 and can handle load well.

April 16, 2014 9:45 am
Name
E-mail
URI