Peer-to-Peer: Do NOT Shoot the Middleman
The digital world is moving from the traditional client-server protocols, where one distinct party provides its service to a large amount of clients, to peer-to-peer protocols, in which all parties are both clients and servers. This shift makes that all nodes in the network start acting as middlemen. This calls for the same protections for those middlemen as providers have.
Recently, in the juridical circus against the Pirate Bay in specific and copyright infringement over peer-to-peer networks in general, a large Dutch provider stated that the court misunderstood BitTorrent. Basically, they stated that there is a difference between the initial seeders, those who made the torrent, and “normal” seeders, those who are just a hop in the network. In other words, there is a difference between the people that initially uploaded the data and the middlemen.
Seeders? Torrents? What Are We Talking About?
Without going into too much detail, a peer-to-peer protocol is a form of communication between computers where all nodes are equal. For example, when you are talking to someone over Skype, you directly connect to this person without the need of a central server. Thus, both parties are “normal” computers.
BitTorrent and comparable systems are so-called peer-to-peer file-sharing protocols. These protocols work by breaking a file up in multiple smaller pieces. Every node in the network can have one or more pieces of this file. Someone who wants to download this file is able to connect to any of these nodes to connect all pieces in order to, eventually, get the complete file. This allows for much faster downloading, because different pieces can be downloaded from different computers. Thus, any computer in the network can perform the task of a middleman in bringing the file from the initial uploading person to the end-user.
Once Again: Decentralisation Is the Power of the Internet
I already stated it before: without decentralisation, the Internet would not be what it is today. Peer-to-peer protocols are one of the best examples of decentralised use of the Internet. In a decentralised system, there is no central authority at all, which ensures freedom, innovation and availability.
Part of decentralised systems is that communication between a large amount of users, such as streaming media or file sharing, require middlemen to ensure high speeds – which are often faster than traditional client-server variants. In the case of BitTorrent, those middlemen are commonly also downloading the file, but this is depending on the protocol not always the case. Additionally, some countries, such as the Netherlands, allow downloading and forbid spreading of copyrighted material.
Protect the Middleman
Internet Service Providers are protected by a so-called “mere conduit” rule, which keeps them from getting sued based on what their users send over their networks. However, when we aim at more decentralised systems, all users act like providers from time to time. Nevertheless, they are not Internet Service Providers in the sense of the law.
Those parties in decentralised protocols that only act as a hub in a network should also be protected. This already follows from the notion of “mere conduit”, they merely do there part of the protocol without regard to the content. For example, if you think of the previously discussed Tor, which is also used for horrible things. You do not want to be sued for the awful things some users may do, when you operate an end-node because you want to help political dissidents.
Decentralisation and the Middleman: We Need Protections
People that merely operate as part of a decentralised system should not be held liable. Depending on the system, only the initial uploading parties or the end-users are responsible for what happens. In the decentralised world that is the Internet, everyone can be an Internet Service Provider from time to time. Therefore, everyone deserves legal protection when they act in this role.
Tags
Academia Anonymity Banking Security Chip and PIN Cloud Computing Cookies Copyright Cryptography Cybercrime Data Protection DDoS Decentralisation Decryption Duty Deep Packet Inspection Democracy Digital Activism Digital Voting E-mail Election Security EMV Encryption European Regulation on Data Protection Fundamental Rights Game Theory Het Heerengymnasium Identity Protection Internet Nemo Tenetur Netneutrality Passwords Police Privacy Profiling Remote Search Science Service Oriented Computing Signatures Smart Cards Spam Technocracy Tor Transparency Transport Layer Security Trust VotingRecent Comments
- Lydia Duijvestijn on Het Heerengymnasium: eerste deel
- Patrick Schreurs on Wanneer gebeurt er eindelijk iets aan het auteursrecht?
- Open Access: Unlock Science for the 21st Century | Information Security and Digital Liberalism « All around Open Knowledge on Open Access: Unlock Science for the 21st Century
- Open Access: Unlock Science for the 21st Century | Information Security and Digital Liberalism | Open Knowledge | Scoop.it on Open Access: Unlock Science for the 21st Century
- Beverly on Security + Security = Insecurity
Archives
- May 2017 (1)
- April 2017 (2)
- March 2017 (3)
- February 2017 (3)
- January 2017 (4)
- September 2016 (1)
- November 2015 (1)
- July 2014 (1)
- June 2014 (1)
- April 2014 (1)
- January 2014 (1)
- September 2013 (2)
- August 2013 (1)
- July 2013 (2)
- June 2013 (1)
- March 2013 (1)
- February 2013 (4)
- January 2013 (4)
- December 2012 (2)
- November 2012 (7)
- October 2012 (9)
- September 2012 (9)
- August 2012 (10)
- July 2012 (10)
- June 2012 (10)
- May 2012 (2)
- November 2011 (2)
- July 2011 (2)
- June 2011 (1)
- May 2011 (2)
- January 2011 (2)
- November 2010 (1)
- June 2010 (1)
- May 2010 (1)
- March 2010 (1)
Categories
- Collaborative Efforts (25)
- Bas Wallage (15)
- Beer Sijpesteijn (1)
- Hugo Ideler (2)
- Jeroen Slobbe (18)
- Lukas de Sonnaville (1)
- Mark van Beek (1)
- Nick Leoné (1)
- Paul Oudshoorn (1)
- Paul Stapersma (2)
- Robbert van den Berg (1)
- English (64)
- Fiction (14)
- Nederlands (Dutch) (42)
- Publications (30)
- Books (1)
- Computerrecht (1)
- DEMO (6)
- Forum of EthnoGeoPolitics (1)
- I/O Vivat (1)
- ICT Update (1)
- Internetrecht door Arnoud Engelfriet (1)
- Joop.nl (7)
- Liberaal Geluid (1)
- Nederlands Juristenblad (1)
- NRC Handelsblad (3)
- Proceedings of the TSConIT (1)
- The Post Online (1)
- UT Nieuws (3)
- Volkskrant (1)
- Scientific Papers (12)
- Stories (13)
- Het Heerengymnasium (13)
- Topics (54)
- On Academia (1)
- On Computer Science (1)
- On Cybercrime (3)
- On Democracy (6)
- On Information Security (33)
- On Liberalism (3)
- On Privacy (7)
- Views (47)
- Collaborative Efforts (25)