Disputed term/author/ism | Author |
Entry |
Reference |
---|---|---|---|
Code | Lessig | I 81f Code/Lessig: The issue here is how the architecture of the Net—or ist “code”—itself becomes a regulator. In this context, the rule applied to an individual does not find its force from the threat of consequences enforced by the law—fines, jail, or even shame. I 82 A locked door is a physical constraint on the liberty of someone to enter some space. I 93 [This kind of code] is not just written rules; it is not just custom; it is not just the supply and demand of a knowing consuming public.What makes [e.g.] AOL is in large part the structure of the space.You enter AOL and you find it to be a certain universe. This space is constituted by its code. You can resist this code—you can resist how you find it, just as you can resist cold weather by putting on a sweater. But you are not going to change how it is. I 139 By “open code” I mean code (both software and hardware) whose functionality is transparent at least to one knowledgeable about the technology. By “closed code”, I mean code (both software and hardware) whose functionality is opaque. One can guess what closed code is doing; and with enough opportunity to test, one might well reverse engineer it. But from the technology itself, there is no reasonable way to discern what the functionality of the technology is. I personally have very strong views about how code should be created. But whatever side you are on in the “free vs. proprietary software” debate in general, in at least the contexts I will identify here, you should be able to agree with me first, that open code is a constraint on state power, and second, that in at least some cases, code must, in the relevant sense, be “open.” I 149 The code is regulable only because the code writers can be controlled. […]An unmovable, and unmoving, target of regulation, then, is a good start toward regulability. And this statement has an interesting corollary: Regulable code is closed code. I 150 To the extent that code is open code, the power of government is constrained.Government can demand,government can threaten, but when the target of its regulation is plastic, it cannot rely on its target remaining as it wants. […] Books are open code: They hide nothing; they reveal their source—they are their source! A user or adopter of a book always has the choice to read only the I 151 chapters she wants. Closed code functions differently. With closed code, users cannot easily modify the control that the code comes packaged with.Hackers and very sophisticated programmers may be able to do so, but most users would not know which parts were required and which parts were not. Or more precisely, users would not be able to see the parts required and the parts not required because the source code does not come bundled with closed code.Closed code is the propagandist’s best strategy—not a separate chapter that the user can ignore, but a persistent and unrecognized influence that tilts the story in the direction the propagandist wants. I 152 If the world becomes certificate-rich, regulability still increases. The same conclusion follows if more code were burned into hardware rather than left to exist as software. Then, even if the code were open, it would not be modifiable. (1) I 175 […]something fundamental has changed: the role that code plays in the protection of intellectual property. Code can, and increasingly will, displace law as the primary defense of intellectual property in cyberspace. Private fences, not public law. I 276 My vote in each context may seem to vary. With respect to intellectual property, I argue against code that tracks reading and in favor of code that guarantees a large space for an intellectual commons. In the context of privacy, I argue in favor of code that enables individual choice—both to encrypt and to express preferences about what personal data is collected by others. Code would enable that choice; law could inspire that code. In the context of free speech, however, I argue against code that would perfectly filter speech— it is too dangerous, I claim, to allow perfect choice there. Better choice, of course, is better, so code that would empower better systems of reputation is good, as is code that would widen the legitimate range of broadcasting. The aim in all three contexts is to work against centralized structures of choice. In the context of filtering, however, the aim is to work against structures that are too individualized as well. I 323 Jean CampVsLessig: Jean Camp, a Harvard computer scientist who taught in the Kennedy School of Government, said that I had missed the point. The problem, she said, is not that “code is law” or that “code regulates. LessigVsVs: Of course, for the computer scientist code is law. And if code is law, then obviously the question we should ask is:Who are the lawmakers? I 324 But to a lawyer, both Camp and I, throughout this book, have made a very basic mistake. Code is not law, any more than the design of an airplane is law. (See Internet Law/Lessig). I 328 Does this mean that we should push for open rather than closed code? Does it mean that we should ban closed code? The best code (from the perspective of constitutional values) is both modular and open. Modularity ensures that better components could be substituted for worse. And from a competitive perspective, modularity permits greater competition in the development of improvements in a particular coding project. I 329 The law prefers opaque to transparent code; it constructs incentives to hide code rather than to make its functionality obvious. […] Our law creates an incentive to enclose as much of an intellectual commons as possible. It works against publicity and transparency, and helps to produce, in effect, a massive secret government. […] But the inertia of existing law—which gives software manufacturers effectively unlimited terms of protection—works against change. The politics are just not there. 1. I am grateful to Hal Abelson for this point. |
Lessig I Lawrence Lessig Code: Version 2.0 New York 2006ff |
Internet Law | Lessig | I 307 Cyberlaw/internet law/international law/Lessig: if you’re offering Nazi material, and a French citizen enters your site, you should block her, but if she is a U.S. citizen, you can serve her. Each state would thus be restricting the citizens of other states as those states wanted. But citizens from its nation would enjoy the freedoms that nation guarantees. This world would thus graft local rules onto life in cyberspace. I 308 Each state […] has its own stake in controlling certain behaviors, and these behaviors differ. But the key is this: The same architecture that enables Minnesota to achieve its regulatory end can also help other states achieve their regulatory. I 309 An ID-rich Internet ((s) a structure that does not permit much anonymity) would facilitate international zoning and enable this structure of international control. Such a regime would return geographical zoning to the Net. It would reimpose borders on a network built without those borders.[…] To those who love the liberty of the original Net, this regime is a nightmare. […] Of course, my view is that citizens of any democracy should have the freedom to choose what speech they consume. But I would prefer they earn that freedomby demanding it through democraticmeans than that a technological trick give it to them for free.[…] This regime gives each government the power to regulate its citizens; no government should have the right to do anything more. I 310 Liberty depends on the regulation remaining expensive. […] There is both a surprisingly great desire for nations to embrace regimes that facilitate jurisdiction-specific regulation and a significant reason why the costs of regulation are likely to fall. We should expect, then, that there will be more such regulation. Soon. The effect, in short, would be to zone cyberspace based on the qualifications carried by individual users. It would enable a degree of control of cyberspace that few have ever imagined. Cyberspace would go from being an unregulable space to, depending on the depth of the certificates, the most regulable space imaginable. I 312 The problems that cyberspace reveals are not problems with cyberspace. They are real-space problems that cyberspace shows us we must now resolve—or maybe reconsider. I 323 Jean CampVsLessig: Jean Camp, a Harvard computer scientist who taught in the Kennedy School of Government, said that I had missed the point. The problem, she said, is not that “code is law” or that “code regulates. LessigVsVs: Of course, for the computer scientist code is law. And if code is law, then obviously the question we should ask is:Who are the lawmakers? I 324 But to a lawyer, both Camp and I, throughout this book, have made a very basic mistake. Code is not law, any more than the design of an airplane is law. […] When we lawyers tell the Jean Camps of the world that they are simply making a “mistake” when they bring the values of public law to code, it is rather we who are making the mistake.Whether code should be tested with these constraints of public value is a question, not a conclusion. It needs to be decided by argument, not definition. I 328 Does this mean that we should push for open rather than closed code? Does it mean that we should ban closed code? (See Code/Lessig). I 337 The cost of “piracy” is significantly less than the cost of spam. Indeed, the total cost of spam—adding consumers to corporations—exceeds the total annual revenues of the recording industry. (1) So how does this difference in harm calibrate with what Congress has done to respond to each of these two problems? 1. David Blackburn, “On-line Piracy and RecordedMusic Sales” (Harvard University, Job Market Paper, 2004. |
Lessig I Lawrence Lessig Code: Version 2.0 New York 2006ff |