41 online
 
Most Popular Choices
Share on Facebook 17 Printer Friendly Page More Sharing
Sci Tech    H4'ed 6/6/13

The 'Cloudy' Skies Corporations Want to Sell You

By       (Page 2 of 2 pages) Become a premium member to see this article and all articles as one long page.   No comments
Message Alfredo Lopez
Become a Fan
  (3 fans)
The irony of this pay-as-you-store technological intrusion is that it's built on a protocol that could actually protect us from government snooping or at least make the snoop much harder. The concept is called http://en.wikipedia.org/wiki/Distributed_computing"> "distributed data retention" or "distributed computing" and it doesn't need a company in the middle and no central place in which the storing computers are kept.

Imagine this...

You join a network and, as part of your membership in that network, you get a small storage device which you hook up to your Internet connection. That storage device already has some computer programs on it that you don't need to worry about. You just turn the device on and then use your computer as you normally would choosing to use your little box as a primary storage unit or as a back-up. Of course, you're not really saving it to the box because your data is now distributed to all the computers on the network in little pieces. You can retrieve it quickly if you need to (as quickly as you could from your computer's drive) but most of it is not on that box anymore. It's on someone else's box and someone else's data is on yours. You have no idea whose data is there and no idea where yours is.

This means that if government officials walk into your home and take the box, they aren't going to know what's on it and they can't get that information from you since you don't know either.

This isn't science fiction. In fact, the capability has been around for many years. Remote network storage distribution is the way http://en.wikipedia.org/wiki/Anonymous_email">"anonymous email service" (or "remail service") is done. The only difference is that the storage places in those systems are probably sitting among publicly available servers like the one May First/People Link (the organization to which I belong) shared with our colleagues at Rise-up. That's the one click here">the FBI seized last year and couldn't get any information from -- it was encrypted -- so they returned it without ever informing us (or RiseUp) that they took it in the first place.

The approach to sharing pieces of files among various computer is called "peer to peer file sharing" and is also very much available. It's the concept used by http://www.bittorrent.org/">BitTorrent, the remarkable file-sharing protocol developed by Bram Cohen. Bit Torrent now functions as the most popular file-sharing system on the Internet with click here">as many users as Facebook and YouTube viewers combined. You download files from a bunch of other computers on a network, most of the time in small pieces each stored on a different computer. The Bit Torrent protocol switches the storage source constantly during the download and, as if by magic, you end up with one file.

BitTorrent, by the way, doesn't mask your IP address (the numbers that identify you while you're on the Internet) so it's not "privacy-proof" but a BitTorrent compatible protocol called http://www.oneswarm.org/">One Swarm does just that and there are many approaches in development to making you "anonymous" as you share files.

The distribution protocol is there. So is the storage protocol. All that's needed to make this a reality is the network of people willing to participate. But the companies that sell Cloud storage are frantically trying to recruit the entire Internet to their bank-account-expanding services, thereby making distributed network that much more difficult to recruit to. The fact that most people, activists or not, have no idea how any of this works makes things adds to the difficulty.

But what if an activist movement was to decide that such a project was worth organizing? What if some Internet organization were to develop and launch this kind of network? What if a bunch of progressive Internet providers were to establish a coordination that would make it happen?

Now that's an idea that would blow away the clouds and reveal a pretty sunny sky of Internet privacy and protection.

Next Page  1  |  2

(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).

Rate It | View Ratings

Alfredo Lopez Social Media Pages: Facebook page url on login Profile not filled in       Twitter page url on login Profile not filled in       Linkedin page url on login Profile not filled in       Instagram page url on login Profile not filled in

Alfredo Lopez is a member of the This Can't Be Happening on-line publication collective where he covers technology and Co-Chair of the Leadership Committee of May First/People Link.
Go To Commenting
The views expressed herein are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.
Writers Guidelines

 
Contact AuthorContact Author Contact EditorContact Editor Author PageView Authors' Articles
Support OpEdNews

OpEdNews depends upon can't survive without your help.

If you value this article and the work of OpEdNews, please either Donate or Purchase a premium membership.

STAY IN THE KNOW
If you've enjoyed this, sign up for our daily or weekly newsletter to get lots of great progressive content.
Daily Weekly     OpEd News Newsletter
Name
Email
   (Opens new browser window)
 

Most Popular Articles by this Author:     (View All Most Popular Articles by this Author)

Attacking Net Neutrality Once Again

When Posting a Website Link is a Crime

NSA Intercepted Data from Google and Yahoo Servers; Monitors Nearly Everyone's Internet Use

Snowden's Latest: The NSA Has Effectively Destroyed Internet Privacy

The Day Adria Richards Said 'Not This Time!'

The Federal Court Trashes Net Neutrality... and the Internet

To View Comments or Join the Conversation:

Tell A Friend