{"id":24965,"date":"2014-07-19T08:41:06","date_gmt":"2014-07-19T12:41:06","guid":{"rendered":"http:\/\/www.opensource.im\/?p=24965"},"modified":"2014-07-19T08:41:06","modified_gmt":"2014-07-19T12:41:06","slug":"net-neutrality-a-key-battleground-in-growing-fight-over-encryption-activists-say","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/net-neutrality-a-key-battleground-in-growing-fight-over-encryption-activists-say.php","title":{"rendered":"Net neutrality a key battleground in growing fight over encryption, activists say"},"content":{"rendered":"<p><p>    Plans    to favor some Internet packets over others threaten consumers    hard-won right to use encryption, a digital privacy advocate    says.  <\/p>\n<p>    Activists and tech companies fended off efforts in the U.S.    in the 1990s to ban Internet encryption or give the government    ways around it, but an even bigger battle over cryptography is    brewing now, according to Sascha Meinrath, director of X-Lab, a    digital civil-rights think tank launched earlier this year. One    of the most contested issues in that battle will be net    neutrality, Meinrath said.  <\/p>\n<p>    The new    fight will be even more fierce than the last one, because    Internet service providers now see dollars and cents in the    details of packets traversing their networks. They want to    charge content providers for priority delivery of their packets    across the network, something that a controversial Federal    Communications Commission proposal could allow under certain    conditions. Friday is the filing deadline for the     first round of public comments on that plan.  <\/p>\n<p>    Encrypted traffic cant be given special treatment because    it cant be identified, Meinrath said. That could eliminate a    major revenue source for ISPs, giving them a strong reason to    oppose the use of encrypted services and potentially an    indirect way to degrade their performance, he said. Meinrath    laid out parts of this argument in a recent essay in the June    issue of Critical    Studies in Media Communication, called Crypto War II and    written with tech policy activist Sean Vitka.  <\/p>\n<p>    The    U.S. government once sought to keep the countrys cryptographic    technology to itself or to hold onto the keys to all encrypted    data. Opponents won out and opened the door to encrypted    services people use every day, such as shopping and email. But    the ability to use encryption is under fire both from    government and potentially from ISPs new business models, the    essay said. The looming cryptography debate will also involve    several other hot topics, including government surveillance    spreading from networks into individual devices and the privacy    of data generated by the Internet of Things, the authors    wrote.  <\/p>\n<p>    Net    neutrality could be important to the use of encryption in at    least two ways, according to Meinrath. For one thing, if    broadband capacity is scarce on a busy service-provider    network, and some traffic gets paid priority, then other    traffic could suffer. Encrypted traffic is likely to get the    short end of that deal. For example, a streaming video service    that was encrypted and couldnt be prioritized might stall or    have longer buffer times if it had to share a crowded pipe with    favored video streams.  <\/p>\n<p>    In    addition, ISPs might start to block encrypted traffic in order    to maintain their business model. For example, if carriers can    discriminate among applications, they can make some exempt from    a users data consumption cap. AT&T has already announced    plans for such a service, called     Sponsored Data, on its cellular data network. Among other    things, this could allow content providers to cover the cost of    delivering their data to consumers, making their content more    attractive.  <\/p>\n<p>    That    concept may get more complicated if encryption comes into play,    Meinrath said. For example, in some developing countries,    Facebook and mobile operators together are offering cheap    mobile data deals that only cover Facebook. There are encrypted    services that can tunnel through Facebook to give users access    to other service, but carriers will want to know if anyone is    circumventing the exclusive Facebook deal.  <\/p>\n<p>    The    problem is that providers are going to say, We need to be able    to know that youre not doing that, therefore we need to be    able to ensure that you are not encrypting, he said.  <\/p>\n<p>    All    this doesnt necessarily spell doom for your favorite banking,    health insurance or video chat sites. The implications are    deeper and longer term, Meinrath said.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the original post here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.pcworld.com\/article\/2456000\/net-neutrality-a-key-battleground-in-growing-fight-over-encryption-activists-say.html\/RK=0\/RS=w93V9vQGUOJ_7TaqYKNBIFh8A5c-\" title=\"Net neutrality a key battleground in growing fight over encryption, activists say\">Net neutrality a key battleground in growing fight over encryption, activists say<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Plans to favor some Internet packets over others threaten consumers hard-won right to use encryption, a digital privacy advocate says. Activists and tech companies fended off efforts in the U.S. in the 1990s to ban Internet encryption or give the government ways around it, but an even bigger battle over cryptography is brewing now, according to Sascha Meinrath, director of X-Lab, a digital civil-rights think tank launched earlier this year. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-24965","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24965"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=24965"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24965\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=24965"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=24965"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=24965"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}