January 8, 2025

Archives for 2003

New Media: Success or Failure?

Mary Hodder at bIPlog points to Steve Lohr’s odd piece, “New Media: Ready for the Dustbin of History?” in Sunday’s New York Times. Mary argues that Lohr’s thesis – that the Internet has failed, except as a vehicle for e-commerce – is bunk. I agree.

Lohr makes two errors. First, he mistakes the financial failure of dotcom startups for a lack of social impact. Yes, many people lost money when the dotcom bubble burst. But the Internet kept chugging along, and the pace of real innovation (as opposed to “let’s sell pet food on the Net” pseudo-innovation) didn’t change.

The airlines are a perfect illustration of this profit-as-social-impact fallacy. The airline business has been, at best, a break-even proposition over its entire history. Despite their lack of profitability, the airlines have given us (relatively) cheap and easy air travel, and transformed our lives.

Lohr’s second fallacy is mistake the bad forecasts of a few prognosticators for the failure of an industry. Some of the “new media” visionaries turned out to be wrong in their detailed visions, but that doesn’t mean that online media were irrelevant.

It’s hard to predict the future. We shouldn’t be too surprised that the vision of online magazine Slate, as forecast by editor Michael Kinsley in 1996, hasn’t completely come to pass. Despite its midcourse corrections, Slate has been a cultural success, earning a dedicated readership and publishing a lot of good writing.

Internet pioneers should remember that it’s not always easy being on the cutting edge. Sometimes you lose money. Sometimes you misjudge the future. Even so, you’re creating something that changes the world.

Declan on Spam

Don’t miss Declan McCullagh’s column this week, in which he offers a particularly astute view of how to address the spam problem. In a nutshell, he argues that we need to change the economic incentives for the spammers, and he discusses some practical ways to do that.

Reputation

Big copyright owners have apparently had some degree of success in their efforts to flood file-sharing networks with decoy files, thereby frustrating users’ attempts to find copyrighted works. Conventional wisdom is that file-sharing systems will institute some kind of reputation-feedback system to help their users determine which sources tend to offer real files and which tend to offer decoys.

Reputation systems try to mimic the dynamics of real-life reputations, which are a powerful mechanism for inducing cooperative behavior, as anyone who has lived in a small town can attest. The best-known reputation technology is EBay’s, which allows everyone who transacts business with you to give you a score, and which aggregates those scores into a concise summary. EBay users are willing to pay more for an item when it is offered by a seller who has built up a good reputation over time. This system has generally worked pretty well.

If file-sharers had the same incentives as EBay users, we could be pretty confident that reputation systems would work for file-sharing vendors too. But the incentives differ in important ways.

For example, an EBay vendor wants to engage in more transactions, because he profits on each one. A file-sharer, though, doesn’t want to upload too many files, because each upload uses up part of his network resources. A file-sharer suffers if his reputation gets too good, so a reputation system may create a perverse incentive to behave poorly sometimes. Indeed, a group of friends might conspire to trash their own reputations, so as to ensure themselves unimpeded access to each others’ files.

There is also the question of who will do the record-keeping for a file-sharing reputation system. EBay is happy to keep track of the reputation reports for their users, because it boosts EBay’s business. The vendor of a file-sharing system may worry that keeping any kind of record of each transaction between users, and giving any kind of recommendation to users about where to get files, might bring the vendor one step closer to the kind of active participation in infringing transactions that got Napster in trouble.

Despite this, my prediction is that at least some file-sharing vendors will try adopting reputation systems, and that after a few false starts they will find a way to make those systems at least modestly successful to combating decoy tactics. But that’s only a guess – I won’t stake my reputation on it.

Trade Agreement

Donna Wentworth at Copyfight reports that the U.S. has signed a trade agreement with Singapore that requires the U.S. to refrain from repealing the anti-circumvention provisions of the Digital Millennium Copyright Act. This looks suspiciously like an end-run around the legislative process.

One complaint about the DMCA has been that it holds back the development of technology in the U.S., and thereby weakens our competitive position against other countries’ technology industries. The obvious solution to this kind of self-inflicted competitiveness problem is to repeal the offending law. It looks like our trade representatives have hit upon another plan: convince other countries to hold back their technology industries too.

RIAA Hackathon Not Likely

Andrew Ross Sorkin’s much-discussed article in Saturday’s New York Times details planning by the record industry to launch aggressive cyber-attacks against suspected copyright infringers.

Some of the world’s biggest record companies, facing rampant online piracy, are quietly financing the development and testing of software programs that would sabotage the computers and Internet connections of people who download pirated music, according to industry executives.

The record companies are exploring options on new countermeasures, which some experts say have varying degrees of legality, to deter online theft: from attacking personal Internet connections so as to slow or halt downloads of pirated music to overwhelming the distribution networks with potentially malicious programs that masquerade as music files.

Some of the programs described are unethical and probably illegal to use. An example is a program that “locks up a computer system for a certain duration — minutes or possibly even hours — risking the loss of data that was unsaved if the computer is restarted.”

It’s not surprising that a few people are asking “what if” questions about technological measures that are theoretically available to the music industry. I of all people am not going to criticize somebody for thinking about the technical implications of security attacks that they would never imagine actually carrying out. What is surprising is that some industry people are talking to the press about the possibility of carrying out these attacks.

The music industry has carefully positioned itself as a bulwark against the depredations of a scofflaw techno-rabble. Articles like this only tarnish that carefully cultivated image. So: who is talking to the Times about this?

A close reading of the article seems to reveal that there is less here than meets the eye. The RIAA distances itself:

[RIAA President Cary Sherman] said that while his organization often briefs recording companies on legal issues related to what he calls “self help” measures, “the companies deal with this stuff on their own.”

And as for the more extreme approaches, he said, “It is not uncommon for engineers to think up new programs and code them. There are a lot of tantalizing ideas out there — some in the gray area and some illegal — but it doesn’t mean they will be used.”

The five major record companies are similarly closed-mouthed:

The music industry’s five “majors” … have all financed the development of counterpiracy programs, according to executives, but none would discuss the details publicly. Warner Music issued a statement saying: “We do everything we feel is appropriate, within the law, in order to protect our copyrights.” A spokeswoman for Universal Music said that the company “is engaging in legal technical measures.”

Nothing in these statements indicates that the majors are considering illegal or borderline-legal actions.

The main sources for the article appear to be two companies, Overpeer and MediaDefender, who have reason to tout their techno-capabilities to the industry, along with anonymous “industry executives.” My guess is that the extreme measures discussed in the article represent the fantasies of a few people in the industry, rather than an organized plan that has any chance of becoming reality.