Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
cyberlaw:cyberspace [2019/01/24 14:20]
witta
cyberlaw:cyberspace [2019/01/24 14:20] (current)
witta
Line 27: Line 27:
 The fact that content, including messages, can take any path between the two end points is a foremost reasons why the internet is hard to regulate. Internet infrastructure is designed to resist control and automatically re-route around problems, such as broken links, when and where they might occur. For instance, individual messages are broken down into much smaller '​packets',​ and the '​internet protocol'​ provides the standard for communication that enables all connected systems to talk to each other and pass data along the chain. This illustrates Gilmore'​s argument that,​((Philip Elmer-Dewitt,​ ‘First Nation in Cyberspace’ (1994) 49 TIME International http://​www.chemie.fu-berlin.de/​outerspace/​internet-article.html.)) if a particular path is blocked or censored, the internet protocol allows computers to find alternative routes to send content to its destination. ​ The fact that content, including messages, can take any path between the two end points is a foremost reasons why the internet is hard to regulate. Internet infrastructure is designed to resist control and automatically re-route around problems, such as broken links, when and where they might occur. For instance, individual messages are broken down into much smaller '​packets',​ and the '​internet protocol'​ provides the standard for communication that enables all connected systems to talk to each other and pass data along the chain. This illustrates Gilmore'​s argument that,​((Philip Elmer-Dewitt,​ ‘First Nation in Cyberspace’ (1994) 49 TIME International http://​www.chemie.fu-berlin.de/​outerspace/​internet-article.html.)) if a particular path is blocked or censored, the internet protocol allows computers to find alternative routes to send content to its destination. ​
  
-Some networks are easier to regulate than others. More decentralised networks, such as '​peer-to-peer'​ (P2P) file sharing technologies,​ are more difficult to regulate in part because of the sheer number of largely anonymous end-users who might be sharing content. As we will discuss in [[The Liability of Intermediaries|The ​Liability of Intermediaries chapter]], parties alleging some kind of infringement often chose to due intermediaries,​ rather than end-users. Targeting an intermediary,​ such as an ISP, can be very effective because of the '​customer/​server'​ nature of their networks (i.e. the ISP, or server, largely contractually agrees to provide internet access to end-users, or its customers).+Some networks are easier to regulate than others. More decentralised networks, such as '​peer-to-peer'​ (P2P) file sharing technologies,​ are more difficult to regulate in part because of the sheer number of largely anonymous end-users who might be sharing content. As we will discuss in the Liability of Intermediaries chapter, parties alleging some kind of infringement often chose to due intermediaries,​ rather than end-users. Targeting an intermediary,​ such as an ISP, can be very effective because of the '​customer/​server'​ nature of their networks (i.e. the ISP, or server, largely contractually agrees to provide internet access to end-users, or its customers).
  
 One way of avoiding regulation online is through the use of a Virtual Private Network **[('​VPN'​)](https://​www.youtube.com/​watch?​v=prhQKAJG8nA)**. A VPN creates an encrypted '​tunnel'​ from an entry point in one jurisdiction to an exit point in another. By using a VPN, a user can appear to be located in another jurisdiction. This means a user can potentially avoid jurisdiction-based filtering or blocking, such as geo-blocking of online content, and attempt to better conceal their real location and other personal information. **[Mitch Huges](https://​www.youtube.com/​watch?​v=rk0aeKMCRFs)** explains how some Australians use VPNs to access overseas Netflix content and ultimately bypass industry agreements that require geographic market segmentation of content. ​ One way of avoiding regulation online is through the use of a Virtual Private Network **[('​VPN'​)](https://​www.youtube.com/​watch?​v=prhQKAJG8nA)**. A VPN creates an encrypted '​tunnel'​ from an entry point in one jurisdiction to an exit point in another. By using a VPN, a user can appear to be located in another jurisdiction. This means a user can potentially avoid jurisdiction-based filtering or blocking, such as geo-blocking of online content, and attempt to better conceal their real location and other personal information. **[Mitch Huges](https://​www.youtube.com/​watch?​v=rk0aeKMCRFs)** explains how some Australians use VPNs to access overseas Netflix content and ultimately bypass industry agreements that require geographic market segmentation of content. ​
  
  • cyberlaw/cyberspace.txt
  • Last modified: 8 months ago
  • by witta
  • Currently locked by: 162.158.94.24,159.69.113.186