April 7, 2004 | By Donna Wentworth

Digital Imprimatur in a Nutshell

Via Howard Rheingold comes David Weinberger's NPR talk on emerging technologies that could significantly limit our ability to use and create with digital content -- the "triple threat" of content lockdown: Digital Rights Management (DRM), digital identity and trusted computing.

Rheingold observes that "This talk should recall [John] Walker's Digital Imprimatur paper." Indeed. That paper, which spawned a much-discussed Steven Levy piece, builds on the same insight (and pessimism) made famous by EFF board member Larry Lessig in his Code and Other Laws of Cyberspace -- "Hey, you Internet pioneers, your Internet isn't intrinsically free -- it's already proven quite regulable and we're headed toward more regulation. Wake up!" Lessig went on to divide the "levers" of regulation into four categories -- code; law; markets; norms.

What Digital Imprimatur does is add granularity to the "code" category -- a specific laundry list of technologies that have the potential to transform the Internet from open to closed. EFF's Fred von Lohmann read the paper; below, he provides a digest -- Digital Imprimatur in a Nutshell -- as well as his own list of countervailing technologies.

Writes Fred:

"Walker's list:

1. The Firewalled Consumer: NAT ascendant! Connections controlled upstream.
2. Certificates: Everything gets a cryptographically unique identity assigned by a central authority.
3. Trusted Computing: Walker may not fully understand TCG, but he's right to point it out.
4. Certified Micropayments: In the glare of e-commerce, no one notices the death of anonymity, free linking, free networking, free Internet.
5. DRM: 'Nuff said.
6. Trusted Internet Traffic: Only 'certified' packets get carried.

These technologies together create a strong current toward the creation of the Secure Internet -- 'No ID, No IP' -- only certified packets, payments, programs and data are allowed. Mainstream computers ignore, or are cut off from, all traffic not on the Secure Internet. Not because Big Brother/Big Content has a grand conspiracy but, rather, because well-intentioned policy-makers and techies want to stop worms, spam, porn, fraud, terrorists and all manner of other ills.

As a side-effect, however, the open Internet becomes a thing of the past.

Chilling. Yet familiar. EFF is working on (or at least aware of) every technology Walker cites, and most of the policy issues he identifies. But it's a darn good roadmap.

My list of countervailing technologies to watch:

1. Low cost meshing wireless networks. Small-world Darknets.
2. Inexpensive, high-density unrestricted storage devices. Darknet over sneaker-net.
3. Open source software, if it's a real alternative computing environment for regular people.
4. Distributed anonymizing proxy networks."

Deeplinks Topics

Stay in Touch

NSA Spying

EFF is leading the fight against the NSA's illegal mass surveillance program. Learn more about what the program is, how it works, and what you can do.

Follow EFF

Listen to EFF researcher @Maassive discuss newly signed California privacy laws on @kpbsmidday, live at 12:20pm PT https://eff.org/r.rg06

Oct 13 @ 11:46am

EFF is attending ICANN 54 to protect the interests of users. Our take on privacy and domain name registration: https://eff.org/r.8tsv

Oct 13 @ 11:19am

Your voice can make a difference. Tell @POTUS to stand up for your right to security. https://savecrypto.org/?r=eff

Oct 13 @ 11:03am
JavaScript license information