November 22, 2024

NYT: Software Diverts Referral Commissions

Today’s NYT discusses software that horns in on referral commissions (like those from Amazon’s affiliates program) meant for others.

Based on the article’s description, it looks like the software lurks quietly, waiting until the user’s browser is going to place an order that could generate a commission. Then the software inserts its distributor’s ID into the request, so as to capture the commission. Apparently the software even puts its own ID in place of another party’s ID, meaning that it captures commissions “meant” for others.

This software comes bundled into programs that a user downloads for free. The user “consents” to the commission-grabbing software’s behavior via vague language inserted into the enclosing product’s click-through agreement.

This seems like a pretty slimy thing to do. Maybe the lawyers out there can tell us whether it’s legal.

Godwin Article on the "Right to Tinker"

Mike Godwin has a new article at law.com on “the right to tinker.” He mentions my upcoming book on the topic. (Thanks, Mike.)

Notes on Today's Berman-Coble Hearings

A House subcommittee held hearings this morning about the Berman-Coble peer-to-peer (p2p) hacking bill. I heard the first two hours, but then I had to go give a lecture.

The bill would give copyright owners new powers to employ self-help “hacking” measures aimed to prevent infringing file-trading on p2p networks. Everybody agreed that the self-help measures now being used are legal. One such measure is spoofing – providing dummy files that look like infringing material, to make it hard for people to find real infringing copies.

The big surprise for me was that the content-industry people seemed to have little idea what they would do with their new powers. When asked what they wanted to do that would be legalized by the bill, RIAA CEO Hilary Rosen said she didn’t know. She referred the question to Randy Saaf of MediaDefender.

Saaf could only come up with one desired measure that the bill would legalize. He called the measure “interdiction” and he described it as connecting to the offending user’s computer and downloading the offending file, in a way that prevented others from downloading. That sounds to me like a classic denial of service attack.

Everybody seemed to understand that the bill’s passage would escalate the technical arms race of measures and countermeasures between p2p designers and copyright owners. Nobody seemed to have any idea where that arms race would lead, or what its implications might be for the bill.

Congressman Boucher summed it up well when he said that Congress would be wise to wait until the copyright owners at least know what they want.

Wireless Tracking of Everything

Arnold Kling at The Bottom Line points to upcoming technologies that allow the attachment of tiny tags, which can be tracked wirelessly, to almost anything. He writes:

In my view, which owes much to David Brin, we should be encouraging the use of [these tags], while making sure that no single agency or elite has a monopoly on the ability to engage in tracking. Brin’s view is that tracking ability needs to be symmetric. We need to be able to keep track of politicians, government officials, and corporate executives. The danger is living in a society where one side can track but not be tracked.

Kling’s vision is of a world where nearly every object emits a kind of radio beacon identifying itself, and where these beacons are freely observable, allowing any person or device to take a census of the objects around it. It’s easy to see how this might be useful. Whether it is wise is another question entirely (which I’ll leave aside for now).

One thing is for sure: this vision is wildly implausible. Yes, tracking technology is practical, and may be inevitable. But tracking technology will evolve quickly to make Kling’s vision impossible.

First-generation tracking technolgy works by broadcasting a simple beacon, detectable by anyone, saying something like, “Device #67532712 is here.” If that were the end of the technological story, Kling might be right.

Like all technologies, tracking tags will evolve rapidly. Later generations won’t be so open. A tag might broadcast its identity in encrypted form, so that only authorized devices can track it. It might “lurk,” staying quiet until an authorized device sends it a wakeup signal. It might gossip with other tags across encrypted channels. Rather than being a passive identity tag, it will be an active agent, doing whatever it is programmed to do.

Once this happens, economics will determine what can be tracked by whom. It will be cheap and easy to put a tag into almost anything, but tracking the tag will be impossible without getting a cryptographic secret key that only the owner of the object, or the distributor of the beacon, can provide. And this key will be provided only if doing so is in the interest of the provider.

It’s interesting to contemplate what kinds of products and services will develop in such a world. The one thing that seems pretty certain is that it won’t be the simple, open world that Kling envisions.

Live On-Line Feed of Tomorrow's House "Piracy" Hearings

Tomorrow (Thu 26 Sept) at 9:00 AM (Eastern time), the House Subcommittee on Courts, the Internet, and Intellectual Property, will hold a hearing on “Piracy Of Intellectual Property On Peer-to-Peer Networks.” A live feed will be available during the hearing.

[link credit: Ray Ozzie]