Beginning the tidy-up

This commit is contained in:
Éibhear Ó hAnluain 2019-09-19 20:43:33 +01:00
parent 6ed44e21c2
commit a2b2404148

View file

@ -327,7 +327,7 @@
- The new Copyright Directive... - The new Copyright Directive...
- -
* CONSDONE Introduction * Introduction
My name is Éibhear Ó hAnluain and I have been working in software My name is Éibhear Ó hAnluain and I have been working in software
engineering and IT systems design since 1994. I thank you for the engineering and IT systems design since 1994. I thank you for the
@ -343,8 +343,8 @@
I will also address some additional concerns I believe are relevant I will also address some additional concerns I believe are relevant
to this analysis. to this analysis.
* CONSDONE Self-hosting * Self-hosting
** CONSDONE Self-hosting ** Self-hosting
For the purposes of this submission, /self-hosting/ is where an For the purposes of this submission, /self-hosting/ is where an
individual or small group has opted to provide their own internet individual or small group has opted to provide their own internet
services, making use either of computer capacity provided by an ISP services, making use either of computer capacity provided by an ISP
@ -369,8 +369,8 @@
*** CONSTODO Real examples of self-hosting *** CONSTODO Real examples of self-hosting
I host a number of services: I host a number of services:
- [[http://www.gibiris.org/eo-blog][/Éibhear/Gibiris/]] is my blog site. - [[http://www.gibiris.org/eo-blog][/Éibhear/Gibiris/, http://www.gibiris.org/eo-blog]] is my blog site.
- [[https://social.gibiris.org/][/Social Gibiris/]] is a micro-blogging service that is federated - [[https://social.gibiris.org/][/Social Gibiris/, https://social.gibiris.org/]] is a micro-blogging service that is federated
with others using the /AtomPub/ technology. Thus, /Social with others using the /AtomPub/ technology. Thus, /Social
Gibiris/ is federated with many other instances of /GNU Social/, Gibiris/ is federated with many other instances of /GNU Social/,
/Mastodon/ and /Pleroma/. This network of federated services, /Mastodon/ and /Pleroma/. This network of federated services,
@ -383,10 +383,10 @@
- [[https://news.gibiris.org/][/news.gibiris.org/]] is a news-aggregation service that allows me - [[https://news.gibiris.org/][/news.gibiris.org/]] is a news-aggregation service that allows me
to gather all the news sources of interest to me into one to gather all the news sources of interest to me into one
location, which I can then access from wherever I am. location, which I can then access from wherever I am.
- [[https://cloud.gibiris.org/nextcloud][/cloud.gibiris.org/]] is a file-sharing platform that I use with - [[https://cloud.gibiris.org/nextcloud][https://cloud.gibiris.org/]] is a file-sharing platform that I use with
my family when we are collaborating on projects (e.g. school my family when we are collaborating on projects (e.g. school
projects, home improvement projects, etc.) projects, home improvement projects, etc.)
- [[https://matrix.gibiris.org/][/matrix.gibiris.org/]] is an instant-messaging system which I set - [[https://matrix.gibiris.org/][https://matrix.gibiris.org/]] is an instant-messaging system which I set
up for the purposes of communicating with my family and close up for the purposes of communicating with my family and close
friends. friends.
@ -434,9 +434,9 @@
Very often, as with me, the reason to self-host is a combination Very often, as with me, the reason to self-host is a combination
of more than 1 of these reasons. of more than 1 of these reasons.
** CONSDONE How accessible is self-hosting. ** How accessible is self-hosting.
In a previous, similar, submission[fn:dccae:Available [[http://www.gibiris.org/eo-blog/posts/2019/04/15_harmful-content-consultation.html][here]] and In a previous, similar, submission[fn:dccae:Available [[http://www.gibiris.org/eo-blog/posts/2019/04/15_harmful-content-consultation.html][here (http://www.gibiris.org/eo-blog/posts/2019/04/15_harmful-content-consultation.html)]] and
[[https://www.dccae.gov.ie/en-ie/communications/consultations/Documents/86/submissions/Eibhear_O_HAnluain.pdf][here]].], I provide an outline of the challenges before someone who [[https://www.dccae.gov.ie/en-ie/communications/consultations/Documents/86/submissions/Eibhear_O_HAnluain.pdf][here (https://www.dccae.gov.ie/en-ie/communications/consultations/Documents/86/submissions/Eibhear_O_HAnluain.pdf)]].], I provide an outline of the challenges before someone who
wants to set up their own services. They are few, and they are wants to set up their own services. They are few, and they are
small. In summary, the reasons for this are: small. In summary, the reasons for this are:
- The Internet is mechanism for computers to find each other and - The Internet is mechanism for computers to find each other and
@ -462,7 +462,7 @@
operating system that was accessible to all. Linux-based operating system that was accessible to all. Linux-based
operating systems now form the basis of a significant proportion operating systems now form the basis of a significant proportion
of internet connected computing devices of internet connected computing devices
globally[fn:LinuxProportions:https://en.wikipedia.org/wiki/Usage_share_of_operating_systems] globally[fn:LinuxProportions:[[https://en.wikipedia.org/wiki/Usage_share_of_operating_systems][Usage share of operating systems (https://en.wikipedia.org/wiki/Usage_share_of_operating_systems)]]]
(including 73% of smartphones and tablet computers, somewhere (including 73% of smartphones and tablet computers, somewhere
between 36% and 66% of internet-facing server computers), and between 36% and 66% of internet-facing server computers), and
100% of supercomputers. 100% of supercomputers.
@ -470,7 +470,7 @@
software developers wanted to add functionality to one of the software developers wanted to add functionality to one of the
original web server software packages, /NCSA httpd/. The Apache original web server software packages, /NCSA httpd/. The Apache
web server now powers 43.6% of all web web server now powers 43.6% of all web
sites[fn:apacheProportions:[[https://w3techs.com/technologies/overview/web_server/all][https://w3techs.com/technologies/overview/web_server/all]]. Incidentally, sites[fn:apacheProportions:[[https://w3techs.com/technologies/overview/web_server/all][Usage of web servers]]. Incidentally,
the no. 2 on that web page, with nearly 42% share of websites is the no. 2 on that web page, with nearly 42% share of websites is
/nginx/. It also started out as a project by an individual who /nginx/. It also started out as a project by an individual who
wanted to solve a particular project.]. wanted to solve a particular project.].
@ -538,7 +538,7 @@
that if one node goes down or is attacked, the others can continue that if one node goes down or is attacked, the others can continue
with a minimum of interruption. with a minimum of interruption.
** CONSDONE Regulation of self-hosted services ** Regulation of self-hosted services
While it is attractive to create regulations to manage the large, While it is attractive to create regulations to manage the large,
profit-making organisations, it is imperative that such profit-making organisations, it is imperative that such
@ -580,13 +580,13 @@
pop into the heads of individuals, who would realise them with pop into the heads of individuals, who would realise them with
nothing more than a computer connected to the internet. nothing more than a computer connected to the internet.
* CONSDONE Other considerations * Other considerations
While the main focus of this submission is to highlight the While the main focus of this submission is to highlight the
potential risk to self-hosters from regulations that neglect to potential risk to self-hosters from regulations that neglect to
consider the practice, I would like to take the opportunity to consider the practice, I would like to take the opportunity to
briefly raise some additional concerns briefly raise some additional concerns
** CONSDONE Abuse of the systems ** Abuse of the systems
To date, all systems that seek to protect others from harmful or To date, all systems that seek to protect others from harmful or
other objectionable material (e.g. copyright infringement, other objectionable material (e.g. copyright infringement,
@ -594,7 +594,7 @@
example, in a recent court filing, Google claimed that 99.97% of example, in a recent court filing, Google claimed that 99.97% of
copyright infringement notices it received in from a single party copyright infringement notices it received in from a single party
in January 2017 were in January 2017 were
bogus[fn:googleTakedown:https://www.techdirt.com/articles/20170223/06160336772/google-report-9995-percent-dmca-takedown-notices-are-bot-generated-bullshit-buckshot.shtml]: bogus[fn:googleTakedown:[[https://www.techdirt.com/articles/20170223/06160336772/google-report-9995-percent-dmca-takedown-notices-are-bot-generated-bullshit-buckshot.shtml][Google Report: 99.95 Percent Of DMCA Takedown Notices Are Bot-Generated Bullshit Buckshot]]]:
#+BEGIN_QUOTE #+BEGIN_QUOTE
A significant portion of the recent increases in DMCA submission A significant portion of the recent increases in DMCA submission
@ -618,7 +618,7 @@
that claims of copyright ownership on the part of the claimant are that claims of copyright ownership on the part of the claimant are
to be made under penalty of perjury. However, that provision is to be made under penalty of perjury. However, that provision is
very weak, and seems not to be a deterrent for a determined agent: very weak, and seems not to be a deterrent for a determined agent:
https://torrentfreak.com/warner-bros-our-false-dmca-takedowns-are-not-a-crime-131115]. [[https://torrentfreak.com/warner-bros-our-false-dmca-takedowns-are-not-a-crime-131115][Warner Bros: Our False DMCA Takedowns Are Not a Crime]]].
The GDPR's /Right to be Forgotten/ is also subject to abuse. An The GDPR's /Right to be Forgotten/ is also subject to abuse. An
individual from Europe continues to force stories related to him individual from Europe continues to force stories related to him
@ -647,7 +647,7 @@
claimant suffers nothing for abusive claims, the regime is claimant suffers nothing for abusive claims, the regime is
guaranteed to be abused. guaranteed to be abused.
** CONSDONE Content Moderation ** Content Moderation
Much of the focus of legislative efforts to deal with harmful or Much of the focus of legislative efforts to deal with harmful or
objectionable material that appear on services that permit uploads objectionable material that appear on services that permit uploads
@ -718,7 +718,7 @@
didn't have time to determine the full context, or because it didn't have time to determine the full context, or because it
misinterpreted or misunderstood the context. misinterpreted or misunderstood the context.
** CONSDONE User Behaviour ** User Behaviour
Many believe that the way to deal with abusive or harmful material Many believe that the way to deal with abusive or harmful material
online is to punish the services that host the material. This is online is to punish the services that host the material. This is
reasonable if the material was placed onto the service by those who reasonable if the material was placed onto the service by those who
@ -751,20 +751,20 @@
there is no attempt to change behaviour, then abusive people will there is no attempt to change behaviour, then abusive people will
simply work around the controls and continue to abuse. simply work around the controls and continue to abuse.
** CONSDONE Investigation support ** Investigation support
In response to the live-streaming of that horrific shooting dead of In response to the live-streaming of that horrific shooting dead of
more than 50 people in New Zealand earlier this year, that country more than 50 people in New Zealand earlier this year, that country
has proscribed the video recorded by that white supremacist has declared the video recorded by that white supremacist terrorist
terrorist as "objectionable", making it a criminal offence to share as "objectionable", making it a criminal offence to share
it[fn:banNotice:https://www.classificationoffice.govt.nz/news/latest-news/christchurch-attacks-press-releases/#christchurch-attack-video-footage-and-document-has-been-banned-in-nz-what-this-means-for-you]. it[fn:banNotice:[[https://www.classificationoffice.govt.nz/news/latest-news/christchurch-attacks-press-releases/#christchurch-attack-video-footage-and-document-has-been-banned-in-nz-what-this-means-for-you][Christchurch attack video footage and document has been banned in NZ what this means for you]]].
While one can understand the thinking that sharing the material While one can understand the thinking that sharing the material
could only be done by people who support the atrocity, this is not could only be done by people who support the atrocity, this is not
necessarily true. Other reasons to share the video or portions of necessarily true. Other reasons to share the video or portions of
it might include it might include
- to appeal for help in finding someone caught up in the massacre - to appeal for help in finding someone caught up in the massacre
- Legitimate news reporting of such an event. - legitimate news reporting of such an event.
- to help investigate the shooting and its - to help investigate the shooting and its
circumstances[fn:ForArch:Forensic Architecture, circumstances[fn:ForArch:Forensic Architecture,
https://forensic-architecture.org/, is a research group that https://forensic-architecture.org/, is a research group that
@ -772,7 +772,10 @@
records of events. To criminalise the sharing of such imagery and records of events. To criminalise the sharing of such imagery and
videos with no regard as to the purpose for the sharing plays videos with no regard as to the purpose for the sharing plays
directly into the hands of those who disregard victims' civil directly into the hands of those who disregard victims' civil
rights.] rights. Similarly, it's not correct to assume that police or
intelligence services alone perform these types of
investigations, so limiting permission to share to these
organisations would not be sufficient.]
- training for law enforcement or terrorism- or disaster-response - training for law enforcement or terrorism- or disaster-response
personnel. personnel.
@ -788,35 +791,35 @@
that it is now very easy for anyone to forge screen-shots of online that it is now very easy for anyone to forge screen-shots of online
postings. postings.
** CONSDONE Encrypted services ** Encrypted services
Some believe that if end-to-end encryption services that prevent Some believe that if end-to-end encryption services that prevent
security services from accessing material were banned or security services from accessing material were banned or
controlled, there would be less abusive behaviour online. This is controlled, there would be less abusive behaviour online. This is
not true, nor is it a good public policy. not true, nor is it a good public policy.
Encryption is just mathematics, and it knows neither whether its Encryption is just mathematics, and it knows neither that its use
use is for ill or good. However, when you consider the extent to is for ill or good. However, when you consider the extent to which
which encryption is being used -- every website that uses =https= encryption is being used -- every website that uses =https= as part
as part of its address encrypts the traffic between itself and its of its address encrypts the traffic between itself and its users,
users, and that is nearly every website around the world -- the and that is nearly every website around the world -- the good uses
good uses vastly outnumber the bad uses. If people are forced to vastly outnumber the bad uses. If people are forced to use an
use an encryption system that has been modified to make it easy for encryption system that has been modified to make it easy for
security services to gain access to the messages, it means that all security services to gain access to the messages, it means that all
the good, innocent uses of encryption are at risk. Recent news that the good, innocent uses of encryption are at risk. Recent news that
Russian spies managed to infiltrate the Russian spies managed to infiltrate the FBI[fn:Oath:[[https://news.yahoo.com/exclusive-russia-carried-out-a-stunning-breach-of-fbi-communications-system-escalating-the-spy-game-on-us-soil-090024212.html][Exclusive:
FBI[fn:Oath:https://news.yahoo.com/exclusive-russia-carried-out-a-stunning-breach-of-fbi-communications-system-escalating-the-spy-game-on-us-soil-090024212.html Russia carried out a 'stunning' breach of FBI communications
(Please note that to access this story the user has to agree to system, escalating the spy game on U.S. soil]] (Please note that to
many hundreds of forms tracking or spend many up to an hour access this story the user has to agree to many hundreds of forms
examining those forms and disabling each one individually. It is tracking or spend up to an hour examining those forms and disabling
recommended that this story be access using "Incognito" or "Private each one individually. It is recommended that this story be access
Browsing" mode in order to be protected against tracking).], using "Incognito" or "Private Browsing" mode in order to be
highlights how unreliable are assurances from security services protected against tracking).], highlights how unreliable are
that they can keep secrets such as the keys to all encryption safe assurances from security services that they can keep secrets such
from harm. as the keys to all encryption safe from harm.
All it takes is one determined intruder, and all the good uses of All it takes is one determined intruder, and all the good uses of
encryption are put at risk in order to safe money and effort on encryption are put at risk in order to save money and effort on
investigating illegal activities. investigating illegal activities.
I have written a number of articles on this matter providing more I have written a number of articles on this matter providing more
@ -829,10 +832,10 @@
- [[http://www.gibiris.org/eo-blog/posts/2018/09/04_some-questions-5-eyes-countries-what-can-they-do.html][Some questions for the "5 Eyes" countries on what they think they - [[http://www.gibiris.org/eo-blog/posts/2018/09/04_some-questions-5-eyes-countries-what-can-they-do.html][Some questions for the "5 Eyes" countries on what they think they
can do]] can do]]
* CONSDONE Answers to consultation questions * Answers to consultation questions
The follows are some answers to the questions posed in the call for The follows are some answers to the questions posed in the call for
submissions. submissions.
** CONSDONE Definition of communication in legislation ** Definition of communication in legislation
- Question 1 :: There are currently significant gaps in legislation - Question 1 :: There are currently significant gaps in legislation
with regard to harassment and newer, more modern with regard to harassment and newer, more modern
forms of communication. Is there a need to expand forms of communication. Is there a need to expand
@ -866,7 +869,7 @@
as as
/FOSTA-SESTA/[fn:FOSTA-SESTA:https://en.wikipedia.org/wiki/Stop_Enabling_Sex_Traffickers_Act] /FOSTA-SESTA/[fn:FOSTA-SESTA:https://en.wikipedia.org/wiki/Stop_Enabling_Sex_Traffickers_Act]
in the US, that seeks merely to punish web sites, in the US, that seeks merely to punish web sites,
will to more harm than good[fn:SOSTAEffect:Lura will do more harm than good[fn:SOSTAEffect:Lura
Chamberlain, FOSTA: A Hostile Law with a Human Cost, Chamberlain, FOSTA: A Hostile Law with a Human Cost,
87 Fordham L. Rev. 2171 (2019). Available at: 87 Fordham L. Rev. 2171 (2019). Available at:
https://ir.lawnet.fordham.edu/flr/vol87/iss5/13]. The https://ir.lawnet.fordham.edu/flr/vol87/iss5/13]. The
@ -879,21 +882,24 @@
failure of the law to consider the effect of a failure of the law to consider the effect of a
straight ban. straight ban.
The recently-passed new EU Copyright directive The recently-passed new EU Copyright Directive
mandates the filtering of user uploads based on prior mandates the filtering of user uploads based on prior
notice that such uploads *may* be infringing notice that such uploads *may* be infringing
copyright, subject to severe penalties, but requires copyright and failure to implement this filtering is
mere respect for users' freedom of speech with no subject to severe penalties. However, the directive
penalties attaching to failing to do so. The requires mere respect for users' freedom of speech
with no penalties attaching to failing to do so. The
incentive for the service operators here is to err on incentive for the service operators here is to err on
the side of suppressing material regardless of the side of suppressing material regardless of
anyone's freedom of expression, as the consequences anyone's freedom of expression, as the consequences
of not doing so could be catastrophic for the service of keeping the material up could be catastrophic for
operator. the service operator and the consequences of
infringing on someone's freedom of expression are
non-existent.
The proposal in the UK to apply a duty of care to The proposal in the UK to apply a duty of care to
service operators is also destined for failure, as a service operators is destined for failure, as a duty
duty of care is a physical-world concept that has no of care is a physical-world concept that has no
suitable analogy in the context of internet services. suitable analogy in the context of internet services.
Ironically, the likely best regulatory approach is Ironically, the likely best regulatory approach is
@ -902,7 +908,8 @@
liability protection. All these services maintain liability protection. All these services maintain
terms and conditions ("Community Rules", "Code of terms and conditions ("Community Rules", "Code of
Conduct", etc.) and confirmed violations of these Conduct", etc.) and confirmed violations of these
result in sanctions on the users. However, where result in sanctions on the users, up to and including
permanent exclusion from the service. However, where
services aren't aware of violations, they are services aren't aware of violations, they are
protected on the grounds that the behaviour that is protected on the grounds that the behaviour that is
objectionable is not that of the service operator, objectionable is not that of the service operator,
@ -914,14 +921,14 @@
and advancing technologies, new apps and other and advancing technologies, new apps and other
online forums, including the more familiar social online forums, including the more familiar social
media sites? media sites?
+ Answer :: This is this submissions core concern. For + Answer :: This is this submission's core concern. For
legislation to focus on the technology, and not on legislation to focus on the technology, and not on
the behaviour, to focus on the service operator and the behaviour, to focus on the service operator and
not on the real offender, runs real risks of damaging not on the real offender, runs real risks of damaging
human rights of totally innocent parties, as well as human rights of innocent parties, as well as stifling
stifling innovation and consolidating the market innovation and consolidating the market positions of
positions of the major operators the major operators
** CONSDONE Harassment, stalking & other forms of online abuse ** Harassment, stalking & other forms of online abuse
- Question 4 :: Online harassment can take the form of - Question 4 :: Online harassment can take the form of
on-consensual taking and distribution of intimate on-consensual taking and distribution of intimate
images or videos, otherwise known as revenge images or videos, otherwise known as revenge
@ -1025,14 +1032,14 @@
who offers commentary on many aspects of society who offers commentary on many aspects of society
frequently posts messages on Twitter designed to frequently posts messages on Twitter designed to
elicit angry responses. I describe this person as "A elicit angry responses. I describe this person as "A
master of the false equivalence". This is the classic master of the false equivalence". This is classic
online trolling behaviour. Similarly, on the 18th online trolling behaviour. Similarly, on the 18th
September 2019, a prominent UK journalist tweeted September 2019, a prominent UK journalist tweeted
personal details of a father who publicly challenged personal details of a father who publicly challenged
UK Prime Minister Boris Johnson regarding the state UK Prime Minister Boris Johnson regarding the state
of the NHS. This was construed by many as a of the NHS. This act by the journalised was construed
deliberate trolling to inflict a measure of by many as deliberate trolling designed to inflict a
unofficial retribution on the man.]. measure of unofficial retribution on the man.].
It should not be assumed that pseudonymous accounts It should not be assumed that pseudonymous accounts
are created in order for the users to escape legal are created in order for the users to escape legal
@ -1058,16 +1065,16 @@
there's good reason to assume that the significant majority of there's good reason to assume that the significant majority of
pseudonymous accounts operate for completely innocent pseudonymous accounts operate for completely innocent
reasons[fn:realnames:facebook excepted. However, facebook's reasons[fn:realnames:facebook excepted. However, facebook's
real-name policy is itself wrong, and does a great deal of real-name policy is itself wrong, and does a great deal of damage
damage to people who have good reasons for their names not to to people who have good reasons for their names not to be
be associated with their online presences.]. associated with their online presences.].
- Question 12 :: Do other jurisdictions have statutory measures to - Question 12 :: Do other jurisdictions have statutory measures to
protect victim identities in cases of online protect victim identities in cases of online
harassment being released online posthearings, harassment being released online posthearings,
etc? etc?
+ Answer :: This submission is not offering any answer to this + Answer :: This submission is not offering any answer to this
question. question.
** CONSDONE Harmful online behaviour and young people ** Harmful online behaviour and young people
- Question 13 :: How do we most appropriately regulate social media - Question 13 :: How do we most appropriately regulate social media
platforms to prevent cyberbullying and platforms to prevent cyberbullying and
inappropriate sharing of personal images? inappropriate sharing of personal images?