Logo
    Search

    #90 Matt Lieber Goes to Dinner

    enMarch 02, 2017

    Podcast Summary

    • Battle for Internet video standardsThe W3C is fighting to maintain a unified Internet video experience, but the complex nature of the technology and lack of public understanding pose significant challenges.

      There's an ongoing battle happening behind the scenes of the Internet, which, if not addressed, could have catastrophic consequences. The issue at hand is about how we watch videos on the web, and the group leading the charge to maintain a smooth Internet experience for everyone is the World Wide Web Consortium (W3C). However, there's a significant roadblock: the technology involved is complex and technical, making it difficult for people to understand and get involved. Cory Doctorow, a science fiction novelist and Internet expert, has been warning about this issue for a long time. If the W3C, or "good guys," lose this battle, it could lead to a fragmented Internet with incompatible video formats, causing issues with streaming and accessibility. The importance of this issue may be overlooked due to its complexity, but the potential consequences are significant and warrant attention.

    • Developing Open Standards for the Web's GrowthThe W3C, an international organization, develops open standards to ensure the Web's long-term growth, settling debates over terminology and sentence structure in HTML, and currently considering eliminating the need for updates to Microsoft Silverlight for streaming media content to improve user experience and reduce piracy.

      The W3C (World Wide Web Consortium) is an international community that develops open standards to ensure the long-term growth of the Web. Their primary goal is to establish a universal language for the Internet, defining the building blocks and settling debates over terminology and sentence structure in the HTML language. Members, such as Adrian Bateman and Adrian Roselli, engage in discussions and debates on conference calls, sometimes finding the experience tedious. A current issue they are considering is eliminating the need for updates to Microsoft Silverlight for streaming media content, which could significantly improve user experience and reduce piracy. Overall, the W3C's work is essential for maintaining the Web's accessibility, interoperability, and innovation.

    • New DRM system Widevine C eliminates need for plugin updates, but raises concerns about security and limitations for researchersNew DRM system Widevine C offers convenience by eliminating plugin updates, but raises concerns about security, research limitations, privacy, and control over digital content.

      There's a new DRM (Digital Rights Management) system called Widevine C, which aims to eliminate the need for updating plugins like Silverlight and Flash for video playback. However, it raises concerns about security and potential limitations for researchers. And the history of DRM and copyright laws shows that even well-intended efforts to protect content can lead to controversial outcomes. For instance, the case of Dimitry Skilyarov, a Russian software developer, illustrates this point. He was arrested by the FBI in 2001 for disclosing a flaw in Adobe's eBook reader, which was marketed as copy-protected. Skilyarov's actions were seen as a violation of the Digital Millennium Copyright Act (DMCA), and he spent months in jail before reaching a plea deal and returning to Russia. The Widevine C system, if successful, could potentially make our digital lives more convenient by eliminating the need for frequent updates. But it also raises questions about the potential impact on security researchers and the implications for privacy and control over our digital content. The debate around DRM and copyright laws continues, and it's essential to consider the potential consequences as these technologies evolve.

    • New W3C standard for encrypted video players raises security concernsMedia companies pushing for closed video player standard, raising security risks and potential loss of user control

      The World Wide Web Consortium (W3C) is considering a new standard for encrypted video players, which raises concerns about potential security risks and the involvement of media companies. This new standard would prevent users from inspecting the code, making it a closed system. Corey O'Dell, a security researcher, expressed his worries about the potential consequences, such as allowing hackers to take control of computers, access passwords, and log credit card numbers. The W3C's motivation for this change might be due to recent members, including Netflix, YouTube, and Viacom, who have long advocated for more control over the web to protect their business models. These media companies have been pushing for Digital Rights Management (DRM) in browsers, which would restrict users from pirating content. The irony is that these companies, who promote openness and innovation, are now helping to create a lock that limits the web's openness. The security risks and potential loss of user control have sparked debate and opposition, with many questioning the necessity and benefits of this new standard.

    • Mozilla's Dilemma: Balancing User Access and Content Creator RightsMozilla advocates for openness but integrates DRM into Firefox to maintain market presence and user access to restricted content

      The implementation of Digital Rights Management (DRM) technology in web browsers like Firefox creates a complex and challenging situation for organizations like Mozilla. Mozilla, as a company advocating for openness and transparency, is caught in the middle between content creators who want to protect their copyrighted material and users who demand access to that content. Although Mozilla recognizes the content creators' rights, they prefer alternative methods for content protection. However, due to the necessity of maintaining user base and market presence, Mozilla ultimately agreed to integrate the DRM code into Firefox. This decision, while difficult for Mozilla, allows users to access restricted content on the browser. Despite the sadness and discomfort it brings, it's a compromise Mozilla had to make to stay competitive in the market.

    • W3C Vote on Net Neutrality Rules ImminentThe W3C is set to vote on net neutrality rules, which could significantly impact the future of the internet. Meanwhile, concerns over Donald Trump's unsecured cell phone usage continue to mount.

      The debate over net neutrality rules has reached a critical point, with the director of the W3C recently voicing his support for the proposed changes. Corey Doctorow, an advocate for net neutrality, and his coalition have been fighting against these changes for three years, but a vote among W3C members is expected to take place soon, possibly on April 1st. The outcome of this vote could significantly impact the future of the internet. Meanwhile, another topic that has been generating buzz is the security of Donald Trump's cell phone, which he often uses to tweet from, despite it being an old Samsung Galaxy and not a secure presidential phone. While this may not seem like a major concern, computer security experts are raising alarms over the potential risks associated with this practice. The net neutrality issue and Trump's cell phone usage are two separate matters, but they highlight the ongoing importance of digital security and the potential consequences of regulatory decisions. Stay tuned for updates on these developing stories.

    • Hacking and Privacy: Different PerspectivesPeople have varying attitudes towards privacy and hacking, with some being more open and others more anxious. Clear communication and understanding are crucial when consenting to privacy experiments or agreements.

      People may have different perceptions and comfort levels when it comes to privacy and hacking, even when they consent to it. In a conversation, a man agreed to let his friend hack into his phone out of curiosity. The friend was able to do so easily, raising questions about data security and privacy. However, the man was less concerned than the Vice reporter who had conducted a similar experiment, highlighting varying attitudes towards privacy and hacking. The conversation also revealed that some people are more open about sharing their information, while others have anxiety about the potential consequences of their data being accessed. When considering privacy experiments or agreements, it's essential to have clear communication and understanding of what each party is consenting to.

    • Hacking into a phone reveals personal infoUnauthorized phone access can reveal emails, call records, audio recordings, and location through GPS, posing a threat for malicious use.

      Gaining unauthorized access to someone's phone can reveal a vast amount of personal information. During a conversation, the speaker discussed the potential capabilities of hacking into a phone, which includes access to emails, phone call records, and even audio recordings of calls. The speaker also mentioned that the hacker could track the person's location through GPS. This information can be used for malicious purposes, and the speaker expressed excitement about exploring these capabilities further in an upcoming experiment. The speaker also mentioned that the person whose phone they were planning to hack had been warned. The episode was produced by Gimlet and featured special thanks to various organizations and individuals. The speaker also mentioned that Gimlet was hiring salespeople and that they would be appearing at South by Southwest. The speaker reminded listeners to visit their website for more information and closed the episode by reminding listeners to tune in for the next episode in two weeks.

    Recent Episodes from Reply All

    Search Engine with PJ Vogt

    Search Engine with PJ Vogt
    PJ Vogt introduces his new show, Search Engine, where he digs into all kinds of questions, big and small. On this episode: why are drug dealers putting fentanyl in everything?  You can find the concluding episode of the story here.  To find more episodes of Search Engine or to submit a question to the show, go here. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    A Message About the Future of the Show

    A Message About the Future of the Show
    Some news: Emmanuel and Alex will be stepping away from making the show. And this iteration of Reply All will be ending in late June. This isn’t a decision that was made by any one person. Reply All has always been a super collaborative project which is what we’ve loved so much about making it. Ultimately, staff who have been working on this show for a long time – in some cases five, six, seven years at this point – are ready to pursue other things. Making this show has been an incredible pleasure. Thank you all so much for listening. We hope you join us for our remaining episodes, including our last one, on June 23rd. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    Lisa LeVasseur: Introducing the Me2B Alliance

    Lisa LeVasseur: Introducing the Me2B Alliance

    Lisa LeVasseur is an MBA technologist with a background in Computer Science and Philosophy. Lisa began strategic work in cellular telecom industry standards in the late ‘90s while at Motorola. Since then, she has participated in 3GPP, 3GPP2, MEIF, WAP Forum, IETF, W3C, IEEE and Kantara Initiative. 

    The Me2B Alliance is setting the standard for respectful technology. It is backed by a group of software engineers, policy analysts, UX experts, business and philanthropic leaders who are committed to giving individuals more say in how technology treats people.

    References: