Not-Quite-Open Wireless: What Does it Mean to Be Really Open?
In addition to the vast number of open community wireless networks all over the world, there has been a recent uptick in business plans from start-ups and well-established companies that aim to increase wireless Internet access. The Open Wireless Movement encourages free, open, and unrestricted wireless access we welcome private sector participation alongside the work of communities, non-profits, governments, and dedicated individuals, in order to realize this vision.
But not all business plans that promote wireless access are equal. Here are some guiding principles for those who are looking to build or grow solutions that promote wireless Internet access consistent with the Open Wireless Movement:
No captive portals. Unfortunately, captive portals have become a common tool for doling out wireless access, especially in developed areas like San Francisco, where EFF's office is located. But captive portals hinder important security services that require an unfettered connection between the user and the remote origin. Moreover, captive portals are incompatible with browser-less embedded devices and non-browser client software, and are unnecessary for distributing Terms of Service agreements.
No authentication required for users. Users should not have to authenticate in order to use the Internet. This factor is crucial to uphold user privacy and anonymity.
No configuration required for users. Users should not have to go through a complicated configuration process or install additional software in order to make use of an open wireless access point.
No cost barriers for users. We do not want to categorically insist that open wireless must be free of charge, but the important principle is that cost does not create a barrier for people who need to only make small use of an often abundant resource.
Universal availability. Open wireless networks should be open to anyone in range with a wireless-capable device, not only to those who fall into a certain category, such as subscribers to a particular Internet service.
Peaceful coexistence with existing open wireless networks. Open wireless solutions should not cannibalize other open networks, and users should ideally have a range of open wireless options available to them.
In addition, we think open wireless networks of the future should provide meaningful security for users. We also think that the future ecosystem of open wireless networks needs to be sufficiently decentralized so that no single entity stands between a very large set of users and seamless access to the free Internet.
With this rubric in mind, we thought we'd take stock of some of the not-quite-open wireless solutions out there that came across our radar to see how they stack up against our principles for truly open wireless. This list is not comprehensive, but it should give a flavor of the strengths and shortcomings of some of these alternative almost-open wireless solutions.
|No captive portal||FAIL||FAIL||FAIL||FAIL|
|No authentication||FAIL||FAIL||FAIL (Facebook required!)||?|
|No cost barriers||PASS||PASS||1/2||FAIL|
Have we missed any popular and active new business models encouraging wireless Internet access that should be on this chart? Please write to us to let us know: firstname.lastname@example.org.
Recent DeepLinks Posts
Jul 2, 2015
Jul 1, 2015
Jul 1, 2015
Jul 1, 2015
Jun 30, 2015
- Fair Use and Intellectual Property: Defending the Balance
- Free Speech
- Know Your Rights
- Trade Agreements and Digital Rights
- State-Sponsored Malware
- Abortion Reporting
- Analog Hole
- Anti-Counterfeiting Trade Agreement
- Bloggers' Rights
- Broadcast Flag
- Broadcasting Treaty
- Cell Tracking
- Coders' Rights Project
- Computer Fraud And Abuse Act Reform
- Content Blocking
- Copyright Trolls
- Council of Europe
- Cyber Security Legislation
- Defend Your Right to Repair!
- Defending Digital Voices
- Development Agenda
- Digital Books
- Digital Radio
- Digital Video
- DMCA Rulemaking
- Do Not Track
- E-Voting Rights
- EFF Europe
- Encrypting the Web
- Export Controls
- FAQs for Lodsys Targets
- File Sharing
- Fixing Copyright? The 2013-2015 Copyright Review Process
- Genetic Information Privacy
- Hollywood v. DVD
- How Patents Hinder Innovation (Graphic)
- International Privacy Standards
- Internet Governance Forum
- Law Enforcement Access
- Legislative Solutions for Patent Reform
- Locational Privacy
- Mandatory Data Retention
- Mandatory National IDs and Biometric Databases
- Mass Surveillance Technologies
- Medical Privacy
- National Security and Medical Information
- National Security Letters
- Net Neutrality
- No Downtime for Free Speech
- NSA Spying
- Online Behavioral Tracking
- Open Access
- Open Wireless
- Patent Busting Project
- Patent Trolls
- PATRIOT Act
- Pen Trap
- Policy Analysis
- Public Health Reporting and Hospital Discharge Data
- Reading Accessibility
- Real ID
- Search Engines
- Search Incident to Arrest
- Section 230 of the Communications Decency Act
- Social Networks
- SOPA/PIPA: Internet Blacklist Legislation
- Student and Community Organizing
- Surveillance and Human Rights
- Surveillance Drones
- Terms Of (Ab)Use
- Test Your ISP
- The "Six Strikes" Copyright Surveillance Machine
- The Global Network Initiative
- The Law and Medical Privacy
- Trans-Pacific Partnership Agreement
- Travel Screening
- Trusted Computing
- Video Games