In “What About Lessig?” Joshua Allen does a few logical backflips. Dave Winer manages to extract a useful nugget of wisdom from the peice, but what strikes me so odd is that Joshua is mixing Lessig views on open source with his views on copyrights with his views on the End-to-End’ness of the Internet which I am under the impression he keeps seperate. I haven’t read his views of (open) source code access, and I have to agree with putting an upper bound on copyrights. (life of author plus X where X < 10? whatever), but I was in agreement with Lessig during his talk at microsoft about the end to end issues (which is the arguements Lessig was making in the article Joshua torn apart). I remeber asking lessig what he thought about the idea of some protocols being available in a RAND fassion. He didn’t knee jerk say that it was bad, but reminded me that sometimes the reasonable part of RAND could be very expensive, so it depends on that. This is not the Lessig Joshua paints at the end of his rant about “the Collective”.
Ordinary people, extraordinary evil. What kind of person can attack, mutilate and kill a total stranger or even a neighbor? A scholar talks about the dark potential in all of us.
“It’s easier for me to sleep at night if I think that perpetrators of genocide and mass killing are lunatics or insane or only found in cultures like Germany. I don’t blame people for jumping to those explanations. But for me it begins with the issue of numbers. We know that 6 million Jews died in the Holocaust, but very seldom do we step back and ask the question: How many people does it take to kill 6 million people? We know that 800,000 Rwandans died in 100 days, but again, how many people does it take to kill 800,000 people?” [Salon.com]
Ray Ozzie does a good job explaining the motivations for something like Palladium. Something to remeber about palladium (from what I understand) is that it’s first deployment will be corperate PCs to keep internal data, internal. The success of such a technology is not wrapped around hollywood and consumer PCs, but rather it’s success of keeping a group of people’s data secure inside the group.