Summary: CRTC PN 2008-19; ISP Traffic Managment in Canada

As someone who is academically invested in how the ‘net is being regulated in Canada, I’ve been following the recent CRTC investigation into Internet management practices and regulation with considerable interest. Given that few people are likely to dig though the hundreds of pages that were in the first filing, I’ve summarized the responses from ISPs (save for Videotron’s submissions; I don’t read French) to a more manageable 50 pages. Enjoy!

Update: Thanks to Eric Samson and Daniel for translating Videotron’s filings – you guys rock!

Acer Aspire One Review

I’ve recently become responsible for the upkeep of an Aspire One netbook. My thoughts, thus far: wait for a while, get another model than I did, and dump Linpus as quick as possible. First, I’ll provide the actual specs for the netbook in the house, and then outline my thoughts a bit more.

Acer Aspireone (AOA110-1531 (Refurbished))

  • Sapphire Blue
  • Intel Atom Processor N270 (512KB L2 cache, 1.60GHz, 533MHz FSB)
  • 512BM DDR2 533 SDRAM
  • 8GB SSD
  • Card Reader
  • 802.11b/g WLAN
  • 10/100 LAN
  • Webcam
  • 8.9″ WSVGA (1024X600)
  • 3 cell battery
  • Preload with Linux

The Good

I’ll start with the good points: it’s very light, was very affordable (~$290 Cnd after taxes), and the Linpus OS boots very quickly. The screen is gorgeous, and with decent battery management you can squeeze about 2.5 hours out of it. While I’m not the biggest fan of the keyboard (I’m now very used to the ‘chicklet’ style Apple keyboards) it’s not terrible – I can probably hit about 80% of my average wpm out of it.

The Not-So-Good

Now, let’s talk about what I dislike:

  1. It’s a locked box. Seriously – I’ve broken down my share of notebooks, and while I’ll likely have another go in a week or two, actually accessing the SODIMM slots is hard. Really hard. Hard enough that I’d say either wait until they make getting into the AAO more reasonable, or just buy one with more memory. These little guys are not meant to be opened and modified (you can, but it’s not easy).
  2. Linpus is terrible. There, I said it. It boots quickly, but they’re working off a modified version of Fedora, and when I try to use the add/remove programs I consistently get dependency errors. Is this fixable? Sure. Should I have to fight with the damn OS at the command line so that I can upgrade to Open Office 3.0? No.
  3. Support from other OSes is still in the infancy stages. I’ve worked with Linux before, and I get the ‘Linux is a learning experience, and you can’t expect things to just work.’ That said: I don’t want to be fiddling around with the command line for a few days to get my install working properly. At the moment, I’m just waiting for some bugs with Ubuntu to get ironed out and then Linpus is being replaced.
  4. Linpus doesn’t connect to wireless networks. Well, let me rephrase: it will connect to non-enterprise networks. Anything WPA2-Enterprise or newer, and you’re out of luck until you replace the network manager. When you *do* replace the manager, you run into problems with it not remembering wireless access passwords when you come out of hibernation.
  5. Card reader memory allocation is hit and miss. Apparently, when you don’t tinker with anything, you can insert an SD card and that SD card is dynamically added to the available flash memory available to the OS. This is cool – I got an 8GB SD card to slide into the AAO, which would give it a cool 16GB of total internal storage – more than enough for casual browsing and word processing. The catch: as soon as you make the needed modifications to access the OS proper, you have to manually mount the SD card each time you turn on the computer, or bring it out of hibernation. While this wouldn’t be an issue if I didn’t want to unlock the OS, I don’t think that using the computer as a computer should mean that this breaks.
  6. Ships with Firefox 2.0. I mean, really – FF3.0 has been out for a long time. Why the hell is it shipping with FF2.0?
  7. Terrible SSD HDD. I get a 7.x MB write to the disk. Enough said.

If you’re looking to buy one of these, get a version with a spinning disk drive. That said, if you want a netbook that is just going to rock out of the box, I’d suggesting getting the HP 2140 – it’ll be a bit more expensive, but I think you’ll be a lot happier. Maybe I’ll change my tune once Ubuntu is loaded on the netbook. In fairness, I should note that I’m being picky (because it’s what I do with these kinds of things), and the person actually using the computer doesn’t have these complaints – it does what it needs to (though not being able to access WPA2-Enterprise has caused them problems). This said, I think that items (1), (2), (4), (5), (6) and (7) really are showstoppers, though (2) and (4) will both be alleviated by changing OSes, (5) is resolvable by shifting where documents and such are saved to, and (6) is solved by hitting up the command line a bit.

My rating: 3/5

Review: Privacy On The Line

This updated edition of Diffie and Landau’s text is a must-have for anyone who is interested in how encryption and communicative privacy politics have developed in the US over the past century or so. Privacy On The Line moves beyond a ‘who did what’ in politics, instead seeing the authors bring their considerable expertise in cryptography to bear in order to give the reader a strong understanding of the actual methods of securing digital transactions. After reading this text, the reader will have a good grasp on what types of encryption methods have been used though history, and strong understandings of the value and distinction between digital security and digital privacy, as well as an understanding of why and how data communications are tracked.

The only disappointment is the relative lack of examination of how the US has operated internationally – there is very little mention of the OECD, nor of European data protection, to say nothing of APEC. While the authors do talk about the role of encryption in the context of export control, I was a bit disappointed at just how little they talked about the perceptions of American efforts abroad – while this might have extended slightly beyond the American-centric lens of the book, it would have added depth of analysis (though perhaps at the expense of making the book too long for traditional publication). One of the great elements of this book is an absolutely stunning bibliography, references, and glossary – 106 pages of useful reference material ‘fleshes out’ the already excellent analysis of encryption in the US.

Ultimately, if you are interested in American spy politics, or in encryption in contemporary times, or in how these two intersect in the American political arena, then this text is for you.

Review: Access Denied

The OpenNet Initiative’s (ONI) mission is to “identify and document Internet filtering and surveillance, and to promote and inform wider public dialogs about such practices.” Access Denied: The Practice and Policy of Global Internet Filtering is one of their texts that effectively draws together years of their research, and presents it in an accessible and useful manner for researchers, activists, and individuals who are simply interested in how the Internet is shaped by state governments.

The text is separated into two broad parts – the first is a series of essays that situate the data that has been collected into a quickly accessible framework. The authors of each essay manage to retain a reasonable level of technical acumen, even when presenting their findings and the techniques of filtering to a presumably non-technical audience. It should be noted that the data collected includes up to 2007 – if you’re reading the text in the hopes that the authors are going to directly address filtering technologies that have recently been in the new, such as Deep Packet Inspection, you’re going to be a disappointed (though they do allude to Deep Packet technologies, without explicitly focusing on it, in a few areas). Throughout the text there are references to human rights and, while I’m personally a proponent of them, I wish that the authors had endeavored to lay out some more of the complexities of human rights discourse – while they don’t present these rights as unproblematic, I felt that more depth would have been rewarding both for their analysis, and for the benefit of the reader. This having been said, I can’t begrudge the authors of the essays for drawing on human rights at various points in their respective pieces – doing so fits perfectly within ONI’s mandate, and their arguments surrounding the use of human rights are sound.

Continue reading

Review: Everything is Miscellaneous

I recently received David Weinberger’s Everything is Miscellaneous: The Power of the New Digital Disorder and was excited. A great deal of my present work surrounds understanding metadata, and the implications that it has for the reconstitution of knowledge and reordering of political association. Imagine my surprise when I quickly found that Weinberger fails to perform a substantive investigation of the role of metadata in the reconstitution of knowledge and society, in book that emphasizes metadata’s role! At most, he skims the surface of what metadata can affect, glossing over specifics most of the time in favor of generalizations and limited references to Greek philosophers. After you’ve read the first 30-40 pages, the only thing you really have to look forward to are (a) a few interesting discussions about blogging, tagging, and the challenges in monetizing past modes of organizing data in comparison to digital metadata-based information-associations; (b) the end, when you can put the book away or give it to someone you aren’t terribly keen about.

While there are a handful of interesting parts in the book (in particular 2-3 pages on tagging data, and the beginning discussion between 1st, 2nd, and 3rd order data might be a useful conceptual device) I was grossly unimpressed with it on the whole. For a better read and more useful investment of reading time, turn to Negroponte, Sunstein, Lessig, or even Erik Davis. Alternately, just go to Wired’s website and spend the couple hours reading the free articles there that you’d otherwise be spending reading this book. I can almost guarantee your time at Wired will be better spent.

How do I rate it? 1/5 stars.

Review: Protectors of Privacy

Newman’s Protectors of Privacy: Regulating Personal Data in the Global Economy is exemplary in its careful exposition of Europe’s data protection regulations. Using a historical narrative approach, he demonstrates that Europe’s current preeminence in data protection is largely a consequence of the creation of regulatory authorities in member nations that were endowed with binding coercive powers. As a result of using the historical narrative method, he can firmly argue that neither liberal intergovermentalist nor neo-functionalist theories can adequately account for the spread of data protection regulations in the EU. Disavowing the argument that market size alone is responsible for the spread of data protection between member nations, or in explaining Europe’s ability to influence foreign data protection regulations, Newman argues that the considerable development of regulatory capacity in European member states, and the EU itself, is key to Europe’s present leading role in the field of data protection.

Drawing on recent telecommunication retention directives, as well as agreements between the EU and US surrounding the sharing of airline passenger information, Newman reveals the extent to which data protection advocates can influence transnational agreements; influence, in the EU, turns out to be largely dependent on situating data privacy issues within the First Pillar. For Newman, Europe’s intentional development of regulatory expertise at the member state, and subsequently EU level, as demonstrated in the field of data privacy and tentatively substantiated by his brief reflection on the EU’s financial regulatory capacity, may lead the EU to play a more significant role in shaping international action than would be expected, given its smaller market size as compared to the US, China, and India.

Overall, I would highly recommend this book. If you are interested in the role of regulatory capacity in the ongoing issues of personal data (especially as it pertains to the EU), or if you just want to read an inviting, concise, and well-developed historical account of the development of EU data protection regulations, then this book is a great way to spend an evening or three.