the underground battles over the future of the internet, and what you can do
TRANSCRIPT
The Underground battles over the future of the Internet, and
what You can do.
Quick Facts
• 1982: The CIA used the Internet to blow up one of the biggest pipeline in Russia.
Quick Facts
• May 2007, Estonia Banks and telecom systems were disrupted for several days (cyber attack).
Quick Facts • October 2007 IBM and Google announced the
area of Cloud computing.
Quick Facts • November 5, 2007: Google announced
Android and founded the Open Handset Alliance
Quick Facts
• May 2008: USA government announced $30 billion effort to better prep for battle online
Quick Facts
• 2008: Several countries (France, Germany, etc.) claimed “National” Internet as a sovereign territory
• Internet was added as the 5th battlefield for war (after land, air, sea, space) in many major countries
Quick definition: “sovereign means the only final authority in a territory”
Quick Facts
• Sept. 2008: 3 millions people in Brazilian city Spirito Santos were totally plunged in Darkness because of cyber-attack
Quick Facts • June 16, 2009: The USA government asked
Twitter to delay a due maintenance during Iran Election.
Quick Facts
• March 23, 2010: Google shut down its search service in China
Quick Fack
• January 2009: NATO opened a cyber Defense school in Tallinn (Estonia)
The Internet today.
The Perfect Internet.
Repetition of the same
« Nature is an endeless combination and repetition of a very few laws. »
Ralph Waldo Emerson
« The farther backward you can look, the farther forward you are likely to see »
Winston Churchill
Back to the 80s
The Network battle
The Internet vs ALL
Internet
Versus
Compuserve Prodigy Aol Genie MCI Mail
Public Network, based on the “Procrastination principle”
Commercial networks, organized, Smart, Clean, Family friendly, Safe, well funded, and huge.
Typical Commercial Network
• Proprietary: The owner is the Master. • App store (only approved applications) • A list of approved providers • All users need a personal ID
How the Internet Prevailed? • The intelligence of the Network will be at the
ends, not at the center. (No Center) • Only one function: package data and send it. (No
Control over the data) • Everyone is equal, We trust people, no need to
control people (No ID necessary).
• Everyone can connect & create without asking permission to anyone (No limitation to access).
The September 11 of the Internet
What if ? General William T. Lord of
the USA Army said:“You don’t need
anymore an army, planes, ships, marines to attack the USA, a single computer could cause several September 11”
Back to the 70s
The Box battle
The IBM Model
• 1960s: IBM dominate business computing • IBM Provide everything: hardware, software,
maintenance, and training
• Business model: Computing as a service based on leasing for monthly fee
• Clients can’t repurpose the machines, add in-house software or install third party software.
IBM Anti-trust Suit • 1969: under anti-trust suit, IBM liberated the
computer
• The owner of a computer could do what he or she wants.
• Computer manufacturers are in hardware business.
The Free Box started a Revolution
• Hardware innovation: The Apple II • Software innovation: Visicalc starts the
personal computer revolution.
The Open source mobile phone
• Nice : Iphone • Ugly : TuxPhone
http://opencellphone.orghttp://wiki.openmoko.org
Back to the 90s
The code battle(proprietary code vs open source)
Microsoft Model • The control of the Box software
• Proprietary code. No one could see what is behind it and customize it.
• Collective security and innovation depend on one company.
• The Microsoft Tax: everyone buying a PC is
forced into Microsoft.
The Open source Model
• The source code is available to all • You can use it for free, and innovate around it. • You can improve it and give back to the
community • Vulnerabilities are found and patched quickly
and efficiently
Baby, Think!
• Most of you will not be here if not the open source movement
• Mysql / php• Tomcat/apache• Postgress• Wordpress • Firefox • …
Back to the 00s
The content battle(Who owns the content?)
Who owns the content?
• The copyright vs the Collective commons.
• P2P content distribution • Who owns user generated content
• News aggregators, search engines use of third party contents.
Understanding
A theoretical model to understand
The network Layers Level Layer What is it. The battle The winner
Top
Content LayerThe content War
Stuff & Service (text, video, voice, etc.)
-Top-down / bottom up content- Copyright
YOU(Person of the year 2006)
Middle
Logical layerThe Soft-War
Code and application that run the machines and the stuff
Proprietary vs open source Open source
BottomPhysical layerThe Hard-War
Wires, computers, hardware that make the transmissions
-PC vs Information appliance- the Internet vs the smart network
The PC& The Internet
Present and Future battles • The Network (controlled vs Open)– Id (mandatory iD) vs anonymity – Net neutrality (Send and pray vs Priority packet/QoS)– P2P netwokr vs Server/Client Network
• The Box (Information appliance vs platform)– Proprietary vs Open– Closed Architecture vs open architecture
• Content access (search engines vs Social search)– Free access to information vs controlled access– Copyright vs commons
Contact me
Mawuna KOUTONINFounder & CEO of Linkcrafter.comEmail: [email protected] Twitter: @linkcrafterMobile: +370 60 86 82 27