
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Tue, 14 Apr 2026 11:53:18 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Truth Lives in the Open: Lessons from Wikipedia]]></title>
            <link>https://blog.cloudflare.com/lessons-from-wikipedia/</link>
            <pubDate>Fri, 15 Sep 2017 00:33:00 GMT</pubDate>
            <description><![CDATA[ Victoria Coleman, CTO, Wikimedia Foundation

Moderator: Michelle Zatlyn, Co-Founder & COO, Cloudflare ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Victoria Coleman, CTO, <a href="https://twitter.com/Wikimedia">Wikimedia Foundation</a></p><p>Moderator: <a href="https://twitter.com/zatlyn">Michelle Zatlyn</a>, Co-Founder &amp; COO, Cloudflare</p><p>MZ: What is the Wikimedia Foundation?</p><p>VC: We pride ourselves in aiming to make available information broadlynot-for-profit</p><p>We’re the 5th most visited site on the planet.We are the guardians of the project. There are 12 projects that we support, Wikipedia is the most prominent but there are others that will be just as influential in the next 5 years: e.g. Wikidata.299 languages</p><p>Let’s also talk about the things that we don’t do: we don’t do editing. We edit as community members but not as members of the foundation.</p><p>We don’t monetize our users, content, or presence. We are completely funded by donations, with an average donation of $15.</p><p>MZ: If your mission is to help bring free education to all, getting to everyone can be hard. So how do you get access to people in hard-to-reach areas?</p><p>VC: It’s definitely a challenge. We built this movement primarily in NA and EU, but our vision goes beyond that. We started doing some critically refined and focused research in Brazil, Mexico, Nigeria.</p><p>Trying to understand what global communities need in other parts of the world.</p><p>We found that some people don’t know who we are, so we need to communicate to these people who we are.</p><p>MZ: We just heard on the last panel, and the notion of fake news came up. What is the foundation’s point of view around fake news? How can you give us hope for the future?</p><p>VC: First of all, the Foundation does not deal in news. One of our core principles is knowledge / notions? existing knowledge. What we do do is make it reliable as we can possibly make it. We have a community of 200,000 editors.</p><p>In our community, we live by principles: reliability of the source (“citation needed”),maintain and ask our community of more than 200,000 people to make sure these principles are upheld. We are vocal and we hold each other accountable.“Democracy dies in darkness.” “Truth thrives in openness.” We create quality content through openness.</p><p>MZ: When something controversial is posted on Wikipedia, how quickly does it get pulled?</p><p>VC: It depends on how front of mind the topic is, Sometimes in seconds.</p><p>Content that is incorrect very rarely persists past a week or month.</p><p>Medicine and Military history are the two most popular Wiki topics.</p><p>ER doctor is one of our most prolific editors; he said that if I can edit Wikipedia, i can reach 45 million people a month.</p><p>MZ: One of the reasons I went into tech rather than the medical field was because it was another way to help people at scale. Everything on Wiki has to have a source, a citation. But that must be hard. What are the implications for this?</p><p>VC: We take that very seriously. This past June, we were able to liberate 45% of all citations from the platform. Suddenly 60 million citations became available for everybody to use. This is very important material for research.</p><p>Being able to share the citations e.g. about Zika virus is what allowed this community to accelerate finding solutions. We advocate vociferously for openness, content that is not behind the wall.</p><p>Awhile ago they decided not to allow citations or references to the daily mail in the encyclopedia because they felt that as a source of news, it was less reliable.</p><p>MZ: Has that since been reversed?</p><p>VC: I don’t believe so.</p><p>MZ: You mentioned that Foundation builds other tools; what are some of the other open-source tools you are building that our audience might find useful?</p><p>VC: For example, Media Wiki is being used by Department of Energy, Intelligence community. the intelligence community has a product called Intellipedia that gets 350,000 hits per day. Another way of making tools through which people share knowledge.</p><p>Another example is ToolForge: taking data sets and making them available to volunteers who write tools.</p><p>So you come to us and we will give you what you need; not just computing and storage but data sets to work with. And people make magic...</p><p>MZ: The Foundation is a study in people coming together around the world--example of optimism. Wikipedia is one of top 5 sites; how do you keep that position? What’s next for the foundation?</p><p>VC: We want to continue to scale. It’s a matter of a lot of introspection. This will tell you about how you work. We’re at the tail end of an 18-month consultation project with 1000s of volunteers in our community all over the world. I came from a corporate background, and you know how strategy is made there. You go into the boardroom and come out and say this is how it is going to be. This is not how it works for us: it’s not our movement, it’s the movement of our volunteers.</p><p>We are going to continue focusing on making knowledge available to everybody. They told us they want us to go beyond the confines of North America and EU.</p><p>Now the challenge is to figure out how to get there.</p><p><b>Q&amp;A:</b></p><p>Q: Silicon Valley has a gender issue; what about Wikipedia? Who is the Wiki community? Who is invited to participate, what articles are challenged or not? How does the leadership of the community meaningfully address these issues going forward?</p><p>VC: You bring up a very good point. I must say that we are fairly balanced within the Foundation itself. But I sympathize and agree. People that edit can use whatever identity they want, so we don’t actually know what gender identity our editors are.</p><p>E.g. One of our researchers noted differences in men &amp; women’s bio: women’s had more info about their spouse.</p><p>The first step is recognizing the problem; From a tech perspective, we are building tools to help reduce bias if possible. But the real solution is not to have bias in the first place. We are doing a lot of work with community engagement to make the experience of becoming an editor more welcoming for women.</p><p>The first step is recognizing the problem; our community engagement department is working with people to help them make their first edits.</p><p>Q: Things in Wikipedia are footnoted; often with links from the web which are brittle and changeable. Can there be a partnership between Wikipedia and internet archive to keep links?</p><p>VC: Yes. We look to build partnerships with everyone.</p><p>All our sessions will be streamed live! If you can't make it to Summit, here's the link: <a href="http://www.cloudflare.com/summit17">cloudflare.com/summit17</a></p> ]]></content:encoded>
            <category><![CDATA[Internet Summit]]></category>
            <guid isPermaLink="false">7qSk6eCR3BxwQaS8D0YPFV</guid>
            <dc:creator>Internet Summit Team</dc:creator>
        </item>
        <item>
            <title><![CDATA[Will Data Destroy Democracy?]]></title>
            <link>https://blog.cloudflare.com/will-data-destroy-democracy/</link>
            <pubDate>Fri, 15 Sep 2017 00:03:00 GMT</pubDate>
            <description><![CDATA[ Lawrence Lessig, Roy L. Furman Professor of Law and Leadership, Harvard Law School and Darren Bolding, CTO, Cambridge Analytica

Moderator: Matthew Prince, Co-Founder & CEO, Cloudflare

 ]]></description>
            <content:encoded><![CDATA[ <p><a href="https://twitter.com/lessig">Lawrence Lessig</a>, Roy L. Furman Professor of Law and Leadership, Harvard Law School and <a href="https://twitter.com/darrenbolding">Darren Bolding</a>, CTO, Cambridge Analytica</p><p>Moderator: <a href="https://twitter.com/eastdakota">Matthew Prince</a>, Co-Founder &amp; CEO, Cloudflare</p><p>MP: If there’s one person responsible for the Trump presidency, it seems there is a compelling argument that that might be you.</p><p>DB: I very much disagree with that.</p><p>MP: How does Cambridge Analytica work, and how did the Trump campaign use it to win the presidency?</p><p>DB: we take that data and match it up with lists of voters, and combine that data science to come up with ideas about you who might want to sell a product to, or in the case of politics, this is this person's’ propensity to vote, this is the candidate they are likely most interested in. WE also do all the digital advertising. By combining data with digital advertising, we have lots of power.</p><p>MP: so you don’t want to take credit for having won the election; but the campaign's use of data and targeting was an important factor in the election.</p><p>DB: Yes, and what Cambridge did was basically a great turnaround story.</p><p>MP: Lawrence you ran a presidential campaign focused on one issue; finance reform. Yet the candidate that spent half as much as Hillary Clinton won. Is finance still the issue or do we need to start thinking about data as the divider.</p><p>LL: My slogan was not “fix campaign finance” but “fix democracy first”. This means to fix all the different ways the system denies us a democracy in the sense that we are equal citizens. If you have a congress spending 30-70% of their time raising money, or gerrymandering, that is not a congress concerned with representing its citizens. This is not a system that produces citizenship driven to electing a president.</p><p>Our electoral college means that the vote of republicans here in California is worth nothing. These are all the ways in which we have a failed democracy.</p><p>I wanted to at least have a voice in the debate to rally around these issues.</p><p>What happened is the democratic party changed the rules just as i qualified to be on that stage. But i would suggest that the man who won took the same set of slogans - Drain the Swamp - and ran as full-force as he could and targeted as his opponent a woman who was “sold out” to these interests precisely.</p><p>I think it is the fundamental issue.</p><p>MP: One of the core tenets of democracy seems like a shared understanding.</p><p>If you have 15 different targeted messages, does that corrode the shared understanding?</p><p>LL: The truth is, in the half of DB’s world focused on commerce, it’s the best of all possible times. The half of the architecture of communication focused on giving people access to netflix, it’s the best of all possible times. We have to recognize that the internet is the best and worst of all possible times at the same time.</p><p>So when you shift to democracy, the same technologies undermine our ability to do democracy the way we did before.It used to be that the process of winning election was same as building coalition.It was in front, in plain sight, and when you won, you knew why.</p><p>When you have technology like Cambridge Analytica has perfected, the process of winning election is totally separate from governing.</p><p>MP: So Darren are you destroying democracy?</p><p>DB: The act of democracy is allowing people to choose who their representatives are. That doesn’t imply that everyone has to have the same shared context. I think it’s possibly beneficial that people with disparate points of view / interests they should have those interests addressed.</p><p>MP: But you work for a company that says they have a unique tech to do this better. What is it about the tech that makes it so much more better that doesn’t corrode shared understanding, on the other side?</p><p>DB: The shared understanding is out there is almost more cultural than anything. I think that having a conversation with you about the regulations that Germany might impose doesn’t permit you from knowing about other aspects of foreign policy with Germany; it’s just a specific thing you care about. Now if the messages are contradictory, that’s when it becomes a problem. But as long as people are maintaining consistent points of view, it’s not wrong to communicate about issues that are important to a specific set of persons.</p><p>LL: I wouldn't say that CA produced diffuse culture where there is no shared understanding. But what we don’t recognize enough is how extraordinary 1960s and 70s were for democracy, when everybody was focused on three television shows every night. America basically understood the same stuff.</p><p>MP: Former chair of FCC says that maybe this is actually the natural state today; in the 60s and 70s, 3 companies controlled profitable technology and spent more time being neutral and elevating conversation. Is this time period what we should be striving for or is that a reaction to fear of regulation?</p><p>LL: I agree this was extraordinary period. It defined how we understand democracy, and that period is gone.</p><p>That period is gone. I don’t want to return to it. Those three shows were too narrow in a number of ways. My point is that we don't yet have a good model for how to work a democracy where we all live in our own niche worlds of the basic facts.</p><p>The architecture of media today is just like the architecture of media in the 19th century.</p><p>Most journalism was partisan, all about rallying troops to own version of truth. The difference is that we have no way of knowing what the public thought.</p><p>The difference is that we have no way of knowing what the public thought then. We could only know what the politicians thought. We didn’t even have polling.</p><p>MP: But back then, you also had a particular understanding of what you were reading; today, FB has an algorithm, there is an editorial voice, and you don’t know what that is. There is some neutrality.</p><p>LL: Back then, media drove people to vote in a certain way or not. But today, the views of people about whether we should go to war in Iraq or whether immigrants deserve to be blocked, the views of the people matter directly.</p><p>Supposed to have a representative democracy, but we increasingly have a direct democracy composed for a public that doesn’t know anything about issues because we live in niche market bubble worlds that don’t inform us the way our broader world has in the past.</p><p>DB: data science is part of the solution. I can use a tool on FB to tell me what percentage of my wall is democrat or republican.</p><p>MP: So that’s the argument that we are only just getting used to tech. We will get better at being able to interpret these things and see through them.</p><p>DB: These tools also make it easier for smaller groups to get their povs out there into the general market. It costs less to get their message out there. You couldn't do that before because all the power was in a small number of hands. SoData science available to anybody through FB is actually quite powerful.</p><p>I for one thing that if you are accurately representing what the populace is interested in, that is not a bad thing for democracy; that’s a good thing.</p><p>If the public is fractured, that’s what the public deserves.</p><p>LL: As a kid, as a republican, I was celebrating the internet, I was saying exactly what DB was, but we didn't think enough about the ways it would change the context in which we could have the conversation.</p><p>We have never had the ability of someone to speak to 30 million people without an editor standing between. This is new. But now a guy can tweet, and it is seen by 30 million people, and we don’t yet know how to run a democracy with that dynamic.</p><p>I hitchhiked across the soviet union when i was young. And was told that in the soviet union they have a better system of free speech than you do in America. We wake up and realize that every newspaper is lying to us; so we have to read 7-8 different newspapers before we understand the truth. This develops a better culture of critical understanding than you have in US.</p><p>We have become the soviet union; our parents don’t yet know how to deal with a world in which everyone is lying to you.</p><p>But our kids know, and can figure it out based on 7or 8 different feeds.</p><p>MP: So is the solution time? Over time, If Cambridge Analytica won the election, what is the next trick? Who will win the next one?</p><p>DB: I think personalization of information that will allow individuals to better communicate with people they know. Rather than have one person broadcasting, you’ll have personal relationship.The dispersion of the central control over the message out to individuals is very powerful. Now instead of Donald Trump talking at you, you have someone else...</p><p>MP: It’s a way to trick the kids, then, isn’t it? If your friends are telling you something, that’s how you get the cynics.</p><p>LL: it’s certainly a wonderful development; but the problem is that if they’re doing that on the basis of a totally different understanding of the world. Some people think climate changes real; others false . If there’s no common gorond of understanding, that may be good for winning elections, but not for actually governing.</p><p>DB: you’re building a virtual community in each “town,” and each community is discussing what is important to them.</p><p>MP: I was just talking to an engineer in China, who said that democracy is great but it always drops below its lowest common denominator. How do we fix that if that’s the case?</p><p>DB: Our original founders wrestled with that idea; we have to keep trying.</p><p><b>Q&amp;A:</b></p><p>Q: Does Cambridge Analytical make problems like Willy Horton worse or better?</p><p>DB: I don’t think it plays that much of a role one way or another. Your context is the ads that played during the Bush campaign?</p><p>I think it just makes the message more amplified.</p><p>LL: Here we have a real disagreement. You have an assumption that people can’t be inconsistent in how they represent their world view. If we have a technology that perfects ability to elect people, but not through public conversation, that encourages this dramatic</p><p>DB: as long as the campaign is consistent and does not change its point of view…</p><p>LL: when have we ever seen that?</p><p>Q: Where do you draw the line on ethical microtargeting? Are you creating models to target people on the basis of racial messaging?</p><p>DB: I don’t think Cambridge pushed any racially charged messages--</p><p>MP: do you identify people… do you have a category that is racists?</p><p>DB: we had 15 models. It never even came up.</p><p>MP: how do we set a framework or a social contract so that Cambridge Analytica doesn’t have a racist profile?</p><p>LL: Today story that broke about ProPublica and FB basically had an anti-semitic ad category to market to people who hate Jews, and had used algorithms inside of FB to target anti-semites.</p><p>Mark Zuckerberg is interested in finding what people want and catering to it; and that’s fine. In 99% of what we care about, that’s what we want. But in democracy, that’s a terrifying possibility.</p><p>Q: People make decisions based on knowledge &amp; information they consume. We are now talking about driving mass behavior, which is different from just giving people what they want.</p><p>How can data science be used responsibly? What regulations do we need when social networks are driving mass behavior? If it’s not regulation, what other structures do we need?</p><p>DB: If you look at the EU, they have the GDPR, and there’s a control over how much information is available. People being aware of how much information they have to give up is going to be somewhat helpful. If you know what information you are giving up, you know what you are able to be targeted on. There will also need to be some sort of code of ethics about what is right and what is wrong to do with data. I am inherently not a fan of regulation. When you have that, entrenched players will create regulatory capture which will stifle innovation.</p><p>There should be some sort of element there. “Algorithms will find the worst in us if you let them go nuts.” And this is not all happening on one side of the spectrum.</p><p>LL: It’s fun and hopeful to talk about codes of ethics stifling the worst, but if the worst is profitable, the code of ethics will be eaten by the profit.</p><p>In one of Steven Bannon’s last interviews, he said, “What we want is the democrats to talk about identity politics every single day until the next election, and we’re going to talk about economic policy and we will beat them.” And you begin to realize that racism is just them playing the democrats. In our world of 2-second attention spans, what do you do to resist that?</p><p>All our sessions will be streamed live! If you can't make it to Summit, here's the link: <a href="http://www.cloudflare.com/summit17">cloudflare.com/summit17</a></p> ]]></content:encoded>
            <category><![CDATA[Internet Summit]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[Data]]></category>
            <guid isPermaLink="false">6uLlpwtoco9u5HL3pRsfI8</guid>
            <dc:creator>Internet Summit Team</dc:creator>
        </item>
        <item>
            <title><![CDATA[As Seen on TV]]></title>
            <link>https://blog.cloudflare.com/as-seen-on-tv/</link>
            <pubDate>Thu, 14 Sep 2017 23:37:33 GMT</pubDate>
            <description><![CDATA[ Chris Cantwell, Co-Creator and Show Runner, Halt & Catch Fire

Moderator: John Graham-Cumming, CTO, Cloudflare ]]></description>
            <content:encoded><![CDATA[ <p><a href="https://twitter.com/ifyoucantwell">Chris Cantwell</a>, Co-Creator and Show Runner, <a href="https://twitter.com/HaltAMC">Halt &amp; Catch Fire</a></p><p>Moderator: <a href="https://twitter.com/jgrahamc">John Graham-Cumming</a>, CTO, Cloudflare</p><p>CC: first off, we have very low ratings! The story came from my father who worked in computers in the early 80s in dallas; later in california. The dynamic between those characters was influenced by my dad.</p><p>This was largely a story about reverse engineering. The underdog story was interesting: not Bill Gates, not Silicon Valley, but a different story about the computer world.</p><p>JGC: and you managed to do 4 seasons</p><p>CC: In four seasons we go from ‘83 to ‘94; we cover everything from small networks to building of internet backbone, rise in search and www</p><p>JGC: I watched it before I came; it gave me some bad memories because there were AOL disks</p><p>CC: We have an incredible prop team. Some comes from RI computer museum; i have to ask our prop master, he might have manufactured them from images online.</p><p>JGC: This is a show about tech but also about money; these people are trying to build companies. The same people trying again and again. Is that a metaphor for recycling something?</p><p>CC: Yes, i think so; a big theme is reinvention, on a personal level and about what they’re working on.Reinvention as a theme that is championed by Silicon Valley is a really universal concept.</p><p>We learned from our research &amp; tech advisor that there are ideas that float into ether and are diffuse and shared, and at some point one person catches something and the idea takes off. That idea “wins”, but really it’s a chaotic mess of people playing with possibilities.</p><p>JGC: What strikes me is how the characters are trying to build something and they don't’ know what they’re doing. Then one of the characters talk about building an index for the web. In some ways that’s the nature of creation; you don’t know what direction you’re going. There’s a link-up with art there.</p><p>CC: Absolutely, in season 4 a character has been in the basement since 1990; we realized that it took a while for web to take off. We portrayed guy in a basement collecting post-its handwriting URLs. It was a website every few days; into a website a second. So he has collected them, and we have a visual representation of his whiteboard.He gives them to his friends, who gives them to someone else; she builds her own website that links to each site;</p><p>Organically people discover that site, and then they have a proto-viral site on their hands.It didn’t start that way.It was like the yellow pages, but they don’t really exist anymore.</p><p>JGC:I was also struck me that what they're doing in the ‘83 clip is really quite technical. It struck me that tech has gotten much more complicated but also much simpler.</p><p>CC: Yes, because of the rise of computing industry we’ve also experienced accessibility of tech.That you can go to Best Buy right now and buy a cinematic camera that you once had to rent and go to film school for for years and knot knwo what it looked like until the filml was dveloped.</p><p>Accessibility is a great power and virtue of the industry. We tracked this over the course of the season</p><p>In the first season they feel like young upstarts. By season 4 they are struggling ot keep up with what’s going on.</p><p>It’s amazing to see this happening even today, given the democratization of so many things.</p><p>JGC: The characters are always optimistic---this isn’t Black Mirror or Westworld. What happened to that optimism?</p><p>CC: on a character level, we follow people who are always focused on the next thing.</p><p>We’re placing our happiness on what’s to come, and there is a kind of grasping that the characters are constantly engaged in, born of a real belief in what they are doing. And yet they are never satisfied with where they are. Over the course of the journey of the series, these five characters realize that about their lives and wonder whether they can actually step off the wheel.</p><p>On the tech side, when people started pulling apart / indexing web pages it was done for fun. First experiences on internet were just about exploring, and there was a joy in that.</p><p>What is unspoken on the show is a tremendous ambivalence that couldn’t happen now.</p><p>“We might be on a train that we are no longer piloting.”</p><p>Tech is moving so fast that we can’t adapt as quickly as the things we are building.</p><p>JGC: Is it also that we can’t imagine the consequences of what we are doing?</p><p>CC: i think so. There isn’t much foresight; the characters on our show don’t have the benefit of hindsight.</p><p>The characters in the show talk a lot about the future. Future is a heavy word. People sometimes say: “There’s no such thing as the future; it’s just people trying to sell you a crappy version of the present”. We can never predict it.</p><p>JGC: if you look at ‘83, they have a physical machine, and by ‘94, it’s all software. So a lot of what you’re trying to portray is really quite boring; how do you dramatize sitting in front of the computer?</p><p>CC: Again, low ratings! It’s interesting, since the pilot i love it when characters have something to hold.</p><p>Our pilot director was a filmmaker named Juan Campinelli [?]; we turned on an IBM for him, and he turned to us and said; “that’s what it does?” It was so boring for him. Now, we have screens that are blank and actors typing and building websites that are inert pages---that’s even less interesting.</p><p>JGC: Is this some sort of terrifying metaphor? The machine doesn’t know what we are typing?</p><p>CC: We tried to turn one machine on, and it actually caught on fire.</p><p>JGC: How do you research this show?</p><p>CC: Carl has been an incredible resource on our show; he’s a venture capitalist, has done everything under the sun; he does this because he loves it.</p><p>We liberal arts guys needed someone like Carl to help us understand what was going on</p><p>Everything we have tried to put on screen we have tried to get right, out of respect for historical telling. But we had to go from perfectly right to defensible, because sometimes even our sources began to disagree with each other.</p><p>I just learned that we accidentally used 2013 reissue of Doom: people got pissed off. At a certain point, we’re doing the best we can. Hopefully the human drama is carrying you through.</p><p>JGC: How do you get inside characters’ heads?</p><p>CC: the actors do their homework to try to understand as much as possible; but we try to convey that these characters are masters of their field; the viewers have to trust that they know what they’re talking about.</p><p>It’s really about character stories. “Technology can be a delicious metaphor for so many things.” E.g. Automated vs human touch.</p><p>You can pit the characters that have so much animus toward each other against each other.</p><p>If we get sidetracked in the writer’s room talking about print drivers, we gotta bring it back to the human drama.</p><p><b>Q&amp;A:</b></p><p>Q: Being a grey beard who has worked in Silicon Valley for 40 years, I noticed it was mainly engineers running things at first; then transition to business types in the 1990s. Do you agree with that phenomenon, and will it affect your future storylines?</p><p>CC: Season 4 is our last; there is push and pull between those who build and understand it, and those who sell it.</p><p>When you have someone who is just “the suit” / the ideas guy, there’s a really interesting struggle that we try to dramatize throughout.</p><p>As the tech gets more ephemeral and seems like magic, business guys may have gained upper hand. You see the venture capitalists holding all the chips and the engineers fewer and farther between in the later episodes.</p><p>Q: I'm assuming you've seen the movie Hackers, with a visualization of traveling through the network. Have you thought about other ways of visualizing the activity of sitting down at the computer to do this work?</p><p>CC: We have. It’s tricky. We once tried to do a sequence where 2 characters moving through digital community they created online, but then it looked bad.</p><p>Sometimes we can visualize, and sometimes we have to go with what’s real, and I think sometimes a viewer can respond to the latter more.</p><p>Q: What about the notion of origin story? Do you think there are 4 seasons of drama buried behind every million dollar company?</p><p>CC: the way we determine that is by meeting with the people themselves on the ground; that’s where we’ve gotten the best stories. Carl has amazing stories. So i’m sure the same could be said of Cloudflare.</p><p>All our sessions will be streamed live! If you can't make it to Summit, here's the link: <a href="http://www.cloudflare.com/summit17">cloudflare.com/summit17</a></p> ]]></content:encoded>
            <category><![CDATA[Internet Summit]]></category>
            <guid isPermaLink="false">59fbqsvah06jD35XFKSHTc</guid>
            <dc:creator>Internet Summit Team</dc:creator>
        </item>
        <item>
            <title><![CDATA[Private Companies, Public Squares]]></title>
            <link>https://blog.cloudflare.com/private-companies-public-squares/</link>
            <pubDate>Thu, 14 Sep 2017 23:18:10 GMT</pubDate>
            <description><![CDATA[ Daphne Keller, Director, Stanford Center for Internet & Society, and Lee Rowland, Senior Staff Attorney, ACLU Speech, Privacy & Technology Project

Moderator: Matthew Prince, Co-Founder & CEO, Cloudflare ]]></description>
            <content:encoded><![CDATA[ <p><a href="https://twitter.com/daphnehk">Daphne Keller</a>, Director, Stanford Center for Internet &amp; Society, and <a href="https://twitter.com/berkitron">Lee Rowland</a>, Senior Staff Attorney, ACLU Speech, Privacy &amp; Technology Project</p><p>Moderator: <a href="https://twitter.com/eastdakota">Matthew Prince</a>, Co-Founder &amp; CEO, Cloudflare</p><p>MP: Technology and law seem like they are colliding more and more. Tech companies are being asked to regulate content. For a largely non-lawyer audience, give us some foundations about basic rules when you have content on your network?</p><p>LR: Communications 2.0 makes the 1st amendment almost quaint. The vast majority of speech that we exchange happens online. When it is hosted by private companies, the 1st amendment doesn’t constrain it. So this is a space governed by norms and individual choices of people like Matthew. In the wake of Cloudflare's decision to take down the Daily Stormer, Matthew penned a piece saying it’s scary that we have this power, and I exercised it. We have a completely unaccountable private medium of communication.</p><p>MP: There are shields for companies for this; What is intermediary liability and why is this a position at Google/Stanford?</p><p>DK: No one knows what it means; it’s a set of laws that tell platforms when they have to take down user speech because that speech is illegal. In the US, platforms don't have to take anything down; but outside of the US, the rule is that when platforms discover something they have to take it down or face liability themselves. The problem is that anytime someone alleges that something is illegal, it can be taken down. So the rules about when platform should to do this are very consequential for practical free speech rights of users on the internet.</p><p>LR: We can’t undervalue how much these rules have created today’s online ecosystem: Yelp would not exist without intermediary liability. Any content provider platform exists because of these laws passed in late 90s.</p><p>MP: In both the US and the EU, laws are coming under threat; we tend to focus on US, but Germany’s top priority in the last G7 meeting was limiting intermediary liability.</p><p>LR: There’s an opportunity here for companies with ties to US to make sure that we don’t allow countries with less protected speech regimes to ratchet to the lowest common denominator. Multinational pressures risk going to that lowest common denominator. I think companies like Cloudflare have a duty to uphold the values that reflect our first amendment landscape. Do we want a world where Nazis cannot have a website? It’s not a comfortable thing to talk about; but I want the ability to see and find speech that reflects human beliefs, because that’s how we know it is out there. Enforcing that kind of purity only hides beliefs it does not change them. Companies that are part of web infrastructure have fundamental responsibility to provide neutral platform. We are providing a neutral platform and it's other people’s job to see that speech and counter it.</p><p>DK: There’s also an ugly dynamic between governments and major platforms; private companies are taking over government functions, which is weird because they are not subject to government constraints. This creates an opportunity where private companies can do things that government can't but maybe want to do e.g. collecting user data.</p><p>In Europe, the commission reached agreement with 4 big platforms on the EU hate speech code of conduct: The agreement was that they would voluntarily take down hate speech as described in the agreement, which is not the same as hate speech as defined in the law. They are voluntarily agreeing with the government to take down hateful speech. Many Americans find this odd.</p><p>MP: Is this a fight that we can win? Views on free expression ideals have changed since 4 years ago; “don’t be evil” doesn’t translate well in German; What argument persuades rest of world that we should be neutral platform?</p><p>LR: These borders have real impacts on speech; but for American consumers and companies giving internet access to American Internet users, we do have the ability to help people understand not to race to moral panics. No one is out there picketing AT&amp;T because Richard Spencer has a cell phone account with them.</p><p>MP: We have had a tradition of newspapers having editorial perspective, conservative or liberal.Is Facebook like the modern newspaper? Or are they like the printing press? What is the analogy that makes sense?</p><p>DK: In Europe, people are inclined to say that Facebook needs to admit that it is a media company. The difference between Facebook and a media company is that the media company hand-selected everything that it published, whereas Facebook is an open platform</p><p>MP: But if you put up a link to Daily Stormer on Facebook with support for the site, it was taken down; if you were critical of the organization, however, it was kept up.That sounds like a media company.</p><p>DK: They take down a lot. That’s not the same as saying they could be legally accountable for everything that is transmitted on their platform.</p><p>LR: I do think that people on a gut level hold newspapers accountable for their world view.Facebook already exists as a content review company; they’re a platform but they've always had algorithms and curation. Each of these is a choice that affects what you hear/see.</p><p>MP: “it’s the algorithm it’s neutral”</p><p>LR: That has always struck me as horseshit...</p><p>MP: Does it surprise you there’s not a Fox News search engine?</p><p>LR: This has been constant conversation in the net neutrality debate. Internet service providers have said: we don’t discriminate: but we want the right to not take you to a certain website.</p><p>Can you have a bespoke ISP? The Disney ISP that makes for damn sure you don’t see porn? Maybe, no one has done it. People’s willingness to replicate their own bubble. There seems to be enough of a demand of that.</p><p>DK: The fact that there isn’t a Fox News search engine is actually important.</p><p>People who are saying, Facebook should not be able to take over my political speech are also noting that there is no place else to go: friends, etc. are all on Facebook. It matters when there’s somewhere else to go. If there’s only one place to go, it’s easier to imagine there being government regulations on them.</p><p>MP: The question is: is there any scale at which you think maybe it’s not the right time… Is there a time when that’s the way to think of your status? Steve Bannon is proposing that giant companies should be regulated as utilities. Is there a time when that’s the right way that this should be thought of? If you are Facebook and you are the only place to reach this audience, does that mean that you have another set of obligations?</p><p>DK: I don't think that works. This may apply to your business, but for the service that Facebook offers, the service creates a community that people want to come to because it is not full of hate speech and bullying. And without that kind of curation, they would no longer have the value proposition for their users.</p><p>MP: That suggests that there are different rules depending on where you are in the stack. What should a <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-a-domain-name-registrar/">registrar</a> do vs. DNS vs. browser provider? What is the framework you’d use to determine where internet is or is not neutral vs. curated?</p><p>LR: I want to admit that as a 1st amendment advocate, there are interests on the other side. I may think it is a dangerous precedent, but you have the right to decide who to keep and kick off.</p><p>For us, as ACLU, we focus on two things:Government subsidies and the kind of centrality and importance of that service.</p><p>Are you a neutral … or common carrier? Are you actively curating content?</p><p>Generally there isn’t a model where you are distinguishing based on content; this isn’t the most profitable path to success.</p><p>MP: ACLU has been force for free speech in US; who is fighting for free and open web outside of this country?</p><p>DK: There are organizations around the world that work on this. Some of the best efforts are in Brazil, Argentina, India; much smaller in EU. We're paying attention to these differences.</p><p>It's important for smaller companies, for journalistic interests to show up and let them know.</p><p>MP: What are the arguments you’ve found that are persuasive in these conversations about regulation? What works?</p><p>DK: I think people get it when you say you are sacrificing sovereignty by standing back and asking an American company to decide this for you. In some cases, the economic argument is also persuasive. Outside US, American lawyers yelling about 1st amendment do not get much respect. But there are other important points you can make</p><p>LR: Domestically, if we’re talking about convincing legislators to think about roles, there’s the Communications Decency Act. At the time in the late 90s when it was passed it was overwhelmingly bipartisan because conservatives and republicans knew Silicon Valley is liberal.</p><p>In the last 15 years, there has been moral panic about human trafficking online. Some of the unholy alliances come when women’s advocates on left and libertarians on right agree with each other. It’s the First time congress has amended SESTA since late 90s.</p><p>The only thing that’s ever effective besides a lawsuit is reminding people that they might be the goose or the gander next time. You might not always be on the right side.</p><p>Facebook agreed to the hate speech rules. So many human rights activists voices have been silenced according to that agreement. The Intercept article on human rights activists that have been silenced under over censoring.</p><p>MP: What are 1 or 2 things that you are worried about, that people aren’t thinking enough about right now?</p><p>DK: There is tremendous pressure to build technical filters to find and suppress content and widespread belief that this tech can be built to identify terrorist speech. Companies are under pressure and end up agreeing; the result is that videos documenting atrocities in Syria re-being taken down. So the push for mechanized content removal is very dangerous.</p><p>LR: I totally agree, and I also highlight the importance of due process. If someone censors our speech we can say, hey wait a minute. But you don't have that option with FB.Hand in hand, algorithmic ratcheting combined with lack of due process is a problem.</p><p><b>Q&amp;A:</b></p><p>Q: Besides basic issue about media making judgments about censorship, there are two additional dangers: 1) what makes companies like Cloudflare more or less susceptible to pressure from governments; 2) the danger of companies colluding on these things.</p><p>DK: On vulnerability, What makes you vulnerable to pressure form a government: people on ground that can be arrested; assets that can be seized; wanting to have a market in that company, or already having a market that you are afraid to lose.In terms of collusion, I worry about monoculture that systematically discriminates against speech of particular people.</p><p>Companies that don't want to be regulated decide to self-regulate.</p><p>Q: One of the challenges with open internet is its openness; what about dark web that is encrypted? Is that potentially an answer, where regulating free speech becomes difficult because we don’t know where it comes from.</p><p>LR: I think it addresses free speech values problem; but for average internet user, probably will create less attractive ecosystem. If you want anonymity that’s great, but is it an actual useful web? If you want useful web that is free, effective, and accessible, answer is probably no.</p><p>All our sessions will be streamed live! If you can't make it to Summit, here's the link: <a href="http://www.cloudflare.com/summit17">cloudflare.com/summit17</a></p> ]]></content:encoded>
            <category><![CDATA[Internet Summit]]></category>
            <category><![CDATA[Freedom of Speech]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">5gqc9thpvk8wS1RdtlG9P1</guid>
            <dc:creator>Internet Summit Team</dc:creator>
        </item>
        <item>
            <title><![CDATA[Betting on Blockchain]]></title>
            <link>https://blog.cloudflare.com/betting-on-blockchain/</link>
            <pubDate>Thu, 14 Sep 2017 22:20:10 GMT</pubDate>
            <description><![CDATA[ Juan Benet, Founder, Protocol Labs, and Jill Carlson, GM, Tezos Foundation

Moderator: Jen Taylor, Head of Product, Cloudflare ]]></description>
            <content:encoded><![CDATA[ <p><a href="https://twitter.com/juanbenet">Juan Benet</a>, Founder, Protocol Labs, and <a href="https://twitter.com/_jillruth">Jill Carlson</a>, GM, Tezos Foundation</p><p>Moderator: Jen Taylor, Head of Product, Cloudflare</p><p>JT: Tell us about what BlockChain is</p><p>JC: Going back to 2008, advent of blockchain came with bitcoin white paper.</p><p>The word Blockchain wasn’t mentioned at that point, but that was the advent of this tech.</p><p>What it solved was niche problem called double spend problem. Creation of digital cash.</p><p>What you see in a bank account isn’t digital cash. The problem in cryptography was how to create digital cash that doesn't rely on 3rd party intermediary. This is what Bitcoin created.</p><p>JB: Blockchain packs in lots of stuff: useful as brand. Like internet/web in early 90s, the meaning is fuzzy.</p><p>Properties that all of these apps have in common:</p><p>Academic definition: A blockchain is an indelible chain of blocks; once you insert information into one of them it remains.</p><p>Marketing definition: many applications have been developed over last few years, all have to do with public verifiability. Reliance on cryptographic methods to achieve goals on clearing payments and the ability to check and verify.</p><p>Across the board, removing 3rd parties from equation. Establishing publicly verifiable state of structures. Trust protocol removes trust needed from individual parties.</p><p>It points to a return to what people called for in the early 2000s. Decentralization of the power structures that control the internet.</p><p>Removing power from entrenched places.</p><p>JT: you’re both doing great work with organizations looking at moving blockchains forward. What is currently happening with this tech?</p><p>JC: I work with Tezos; a blockchain protocol and platform used to build decentralized apps. Hearkens to a concept of a hard fork of a blockchain</p><p>Hard fork: 2 different assets of bitcoin, assets and cash</p><p>Comes back to idea of decentralization. Decentralization offers many things; one problem it raises is how you push upgrades to the tech. Generally there is one centralized party. With blockchain it’s different. Lots of politicized infighting among communities and users of tech; Tesos seeks to solve this infighting and enable coordination.</p><p>If everyone here owned one Tesos token, everyone would have one vote as to how the roadmap proceeds.</p><p>Also seek to innovate on formal verification of core base of protocol to make applications more easy and accessible.</p><p>This comes back to the language we’ve chosen for the protocol and implementations on top of that. The tech will underpin trillions of dollars worth of industry, and it should be built with that in mind.</p><p>JB: we works on IPFS and …IPFS is a decentralized hypermedia protocol.Think of the web, and if the web itself had no notion of locations or sites but was more decentralized than now; content would not be addressed by where it is and who owns it, but instead by what the information is itself. The same information would have the same address. This isn’t how the webo works now. Today that’s not the case. We want to rethink the stack for how the web works: content addressing rather than location addressing. Peer-to-peers structure.</p><p>Think about how easy is it for content to become hypercentrialized and censored;</p><p>Also efficiency: channels of low bandwidth and so on.</p><p>If we can move entire sections of the web to a remote location and serve them at protocol level, take what we’ve learned from CDNs and build into the protocols themselves.</p><p>Finally, it’s a way of thinking if you have decentralized way of creating protocols that organize work in a public network, can you organize a system to store data for all of it. A utopian decentralized market where storage is proper commodity? Allowing ISPs to participate in cloud storage.</p><p>Today we have a hypercentralized storage system as well.</p><p>JT: The power of decentralization could really change the world. What are some of the other benefits or uses that we could apply this tech to?</p><p>You get to work with the community in such a rich way; what other use cases?</p><p>JC: Inspiration from investment bank. Started off as a bond trader.</p><p>The real innovation is just not about decentralization like bitcoin but also reshaping entire market structures.</p><p>Reshaping entire market structures that today depend on rent-seeking middlemen. Logical conclusion of this is: redefining what it means to own something in digital form.</p><p>Today we don’t really own anything that is in digital form. BoA database represents my ownership. So i get excited thinking about how completely different market structures will look in a couple of years.</p><p>JB: At its core, this has to do with establishing decentralized computing platform where you can run programs and encode business logic and where participants can’t overturn results, and there is no litigation over the events that take place. What happens to law when you can express legal agreements in a digital context.</p><p>Transactions are easier if you don’t have to draft agreements and think about them in depth every time.</p><p>The major innovation with blockchain is that law and finance were right away ripe for changes, in terms of investments and ownership.</p><p>You have the first real wave of smart contracts, finance and law are immediately being changed.</p><p>Potential is massive: you can change pretty much everything, how we reason about markets and providing services and utilities. This is the first public utility that is completely international, governing themselves.</p><p>You can run all kinds of services: cloud storage, cloud computing changed in fundamental ways.</p><p>That said, it will take a while. UX is still atrocious. Quality of platform is bad relative to modern standards. Considering migrating an application into a different context is almost a non-starter. The tech has to catch up with banking to enable developers to change how they maintain applications.</p><p>You’ll have developers able to create something like Twitter, put into into the network, and never having to worry about maintaining it anymore, because participants will. Completely different way of approaching development.</p><p>Now is the right time to get involved to help develop.</p><p>When you have a 100-line code of contract, you want to leverage all you can to make sure you get the right answer.</p><p>JC: Precisely because there are no 3rd party intermediaries to call about reversing an action.</p><p><b>Q&amp;A:</b></p><p>Q: I am an investment banker, but i don’t understand what mining is.</p><p>JB: When you think about decentralized consensus protocol, where a bunch of parties are proposing values for the head of the chain, and they have to agree upon what that value is.Mining is a way that lots of work/resource expenditure have to exert in order to propose a vote on value.You have a whole bunch of people with computers hooked up trying to give one value weight and declare a winner.It’s like a voting system where you use resource expenditure...</p><p>JC: proof of stake algorithm vs. proof of work system</p><p>On any blockchain network you need a validator who verifies certain things about transactions and then is broadcasting that badge or block to the network. The validator gets elected based on how much computational power they are putting into the system.</p><p>Next generation of systems will use proof of stake, where election process relies on how many tokens you have: creates new incentive structure</p><p>JB: we found a way to resource expenditure with a valuable side effect: mining is useless otherwise. It’s useful insofar as it lends weight to your proposed value, but no value outside of your company.</p><p>We found a way to use valuable storage of files and computational work which shows that resource expenditure is actually proving network that you have stored files. We think proof of stake is valuable area of research in the future.</p><p>Governance of these systems will evolve dramatically over the next years.</p><p>Q: I’m curious about how people are thinking about preventing recentralizing things, e.g. smart contracts. Like in agreeing on price of wheat over a given day, Everyone has to agree on what the price of wheat is on a given day, and certain nodes have more power. Secondly, how are you thinking about preventing recentralization as you are going through these processes of decentralization.</p><p>JB: There are many things happening that might cause recentralization; Oracle solution is solid if you have verifiability and if you know they can’t charge exorbitant fees.Approach is to decentralize in pieces. A good enough solution for now and then go back and decentralize more along the way.</p><p>We think about it in terms of storage providers or distribution providers: how to carefully structure things to get as much value as possible.</p><p>JC: running joke in crypto space is that crypto-currency has created far more 3rd parties than it has destroyed.</p><p>A new protocol has to be very specific about the problem it is trying to solve. If i am in Venezuela using crypto-currency, the trust problem I’m solving there is different from the trust problem in file storage. One protocol won't solve every trust problem.</p><p>There are different trust problems and there is no “one protocol to rule them all”</p><p>All our sessions will be streamed live! If you can't make it to Summit, here's the link: <a href="http://www.cloudflare.com/summit17">cloudflare.com/summit17</a></p> ]]></content:encoded>
            <category><![CDATA[Internet Summit]]></category>
            <guid isPermaLink="false">22zGK38liS22DWIPFxrM6E</guid>
            <dc:creator>Internet Summit Team</dc:creator>
        </item>
        <item>
            <title><![CDATA[The New Breed of Patent Trolls]]></title>
            <link>https://blog.cloudflare.com/the-new-breed-of-patent-trolls/</link>
            <pubDate>Thu, 14 Sep 2017 21:38:07 GMT</pubDate>
            <description><![CDATA[ Lee Cheng, President & Co-CLO, Symmetry IP LLC, and Vera Ranieri, Staff Attorney, Electronic Frontier Foundation

Moderator: Doug Kramer, General Counsel, Cloudflare ]]></description>
            <content:encoded><![CDATA[ <p><a href="https://twitter.com/leechcheng">Lee Cheng</a>, President &amp; Co-CLO, Symmetry IP LLC, and <a href="https://twitter.com/vranieri">Vera Ranieri</a>, Staff Attorney, Electronic Frontier Foundation</p><p>Moderator: Doug Kramer, General Counsel, Cloudflare</p><p>DK: Patent--IP issues and challenges are accelerating important supreme court cases. there’s also a flurry of legislative activity about patents. Good idea to talk about this topic: where is this going? How to push world in virtuous direction?</p><p>DK: current state of affairs. Vera: at the core is the patent itself, which is issued by and often adjudged by the patent office… is this where the problem lies?</p><p>VR: I like to blame everyone. How does someone get a patent in the first place? Someone comes up with an invention, patent attorney, documents it with opaque language, and files. The examiner then interprets the patent and searches for prior art, and says “I think this is what the patent owner is trying to claim.”</p><p>In the software space, it’s especially difficult. A lot of where inventing happens in software is right here, in businesses. People have a problem and find a solution by developing software. They don’t patent and publish.</p><p>Patent office tends to focus on patents.</p><p>DK: Talk about the incentive structure for those.</p><p>VR: Patent examiners are part of a union and their deal includes doing work and get credit for issuing patents. There’s no way to reject a patent because the applicant can come back over and over again. So most patent officers will issue the patent and let people deal with it later.</p><p>DK: Is there anything in this system that could change the dynamic?</p><p>VR: I’d give patent examiners more time, which they lack. There is also currently incentives at the patent office to not search the Internet. Patents don't become public until 18 months after a patent application is filed.</p><p>DK: So then how do enforcement proceedings work? Is that where the fault should lie?</p><p>LC: Patent trolling is a manifestation of litigation abuse. If you look at the problem historically, it’s far too easy in america to sue someone and almost impossible to hold someone accountable. It’s costly to defend against assertions of patent abuse.</p><p>One of the reasons we were able to embark on the strategy we did is that there were already signs at higher levels of the judiciary that this was a problem. So there have been a lot of cases over the years that have been rationalizing patent law. It’s incredibly slow and easy to find loopholes. We still have trolling today; the best we can hope for is to drive it to a sustainable nuisance level.</p><p>DK: So this is a moving target; do you have any examples of new and expanded challenges of creative assertion of patents?</p><p>LC: You can think of trolling as part of the litigation industry. There’s so much money at stake. So, it’s not surprising that you have creative human beings on the complainant side. They’re protecting their livelihoods and will evolve their tactics. We see developments; recently there has been news about [a medical company] selling to an indian tribe and making an argument that the tribe is protected against litigation. It’s a cat and mouse game.</p><p>DK: IP is property; the question becomes how do you allocate or set up an incentive structure that leads to optimal allocation for societal good? At the administrative level, how do you set up patent application or process in a way that could lead to optimal allocation?</p><p>VR: Don’t be confused. I don't think we should be doing a thorough job in the patent office. The vast amount of patents have no economic value and only certain patents case the problem. If a patent becomes economically important, maybe charge those owners more money to weed out others that aren’t economically important. Prove its worth. We should say to patent owners: “If you want to keep this patent, prove it by paying for it.” Right now a lot of the costs are on the people who have ostensibly infringed.</p><p>DK: Reallocation of costs or raise review to prove value. Is there a reasonable way to get companies in the game before they get sued?</p><p>VR: They way the system is setup right now is that if competitors try to participate, they will hurt themselves. The public should be a patent office customer; I’d like to see lower costs in challenging patents. Patent owners are pushing back because it’s taking away some of their leverage.</p><p>DK: The country issues patents and congress later finds a flaw in that, and sets up their own process. But now there is a challenge about whether or not they can do that.</p><p>Do you sympathize with the argument that these are important rights?</p><p>VR: I’d have more sympathy if there was more rigorous evaluation at the outset. What I see is not that rigorous of an evaluation by allowing someone to say “I have a very strong property” right after the office only spent 19 hours looking at it. There’s an imbalance right now.</p><p>LC: It’s already a high bar to file an IPR. Better than going through court, I see the solution as economic: Achieving end of patent application which is a benefit to society.</p><p>DK: Is there a way that you could define the genuine attempt to practice a patent?</p><p>LC: I’d love to see compromise: If something’s not practiced, you get your filing fee back.Patents are monopolies and monopolies are bad for society. We shouldn’t have an arm of the government handing them out like candy. You can reward the garage inventors, but they don’t deserve a gigantic windfall if they don't bring the economic advantages to society.</p><p>DK: Let’s talk about wins in other direction: People who win litigation have their own patents. How do you think about achieving balance between company innovation &amp; value as an individual with own IP?</p><p>LC: I’m a purist and idealist; I think that for the people who start companies, none of those successful companies became successful initially. They made products and services that added tremendous value to society and to everyone’s lives. They eventually developed robust portfolios. I would hope that their founders keep in mind the importance of preserving the ability to start companies. I want them to maintain that sense of idealism about what patents represent.</p><p>DK: The paradigm is the pharmaceutical industry. In twenty years and one day the price of a pill goes to pennies. It’s hard to imagine a corollary in the tech world where you just wait 20 years and a day and then you can use all of Facebook’s patents.</p><p>What is one change you could make that would move the needle toward positive changes in patents?</p><p>VR: I was thinking if I lived in a perfect world, everyone would get free lawyers. The rationale is that litigation is really expensive; what I see is that people aren’t winning or losing patent suits not because of merits or demerits but because of the cost of their lawyers. When you know you’re in the right but your lawyer tells you it’ll cost $200,000 and they can’t promise anything, it’s a wise business decision to just pay the $50,000 to the patent office instead.</p><p>LC: One of my wishes was granted: “TC Hartland” was decided. We have impacted 40-50% abuse of patent cases.</p><p>DK: Before TC Hartland, you could sue a company anywhere they were selling their product, and a lot of these cases were centered in East Texas. Was this about home field advantage?</p><p>LC: It wasn’t even a home field advantage. Judges wanted to make sure these communities were economically stimulated and these cases could drive a lot of revenue. So East Texas ended up becoming a place where about 45% of all patent cases in the US were being filed.</p><p>One decision addresses potential huge volume of frivolous patent litigation.</p><p>LC: I would also reform damages.</p><p><b>Q&amp;A</b></p><p>Q: I have two questions: 1) There hasn’t been much discussion about post-grant review and I’d love to hear your thoughts. 2) There was discussion of the Oil States case; I’d like your thoughts on that.</p><p>VR: Post-grant review can be very helpful in one or two areas, but not really in the software space. There are too many to search through.</p><p>Post-grant review is a procedure for newly issued patents where a third-party can come in and say it shouldn't have been issued. But you have to do it pretty quickly. Unless you are a large company with legal resources, I don't see much of an impact in software.</p><p>DK: if you're in software, you don’t know how the patent is going to get applied.</p><p>LC: it doesn't bother me at all…</p><p>Q: one of the problems with post-grant review is that if youlose, you increase your damages.IPRs can consider 101 grounds as prior artStandard of proof is much higher on art that patent office didnt considerPatent owner has long time to write infringement report; tremendous disadvantae to… with 3-week turnaround</p><p>DK: part of the thread we’ve been running through is the idea that the playing field is tilgin</p><p>We’re not really dealing with one rule here, but a series of different rules…</p><p>VR: On 101 issue: Supreme Court recently reaffirmed that you can't get patent on abstract idea. This is important to software patents because many are abstract ideas, not any technical explanation of how to implement an idea.To have a way to decide that is important.</p><p>LC: hopefully everyone in the audience will take a stand against the injustice of the patent system</p><p>All our sessions will be streamed live! If you can't make it to Summit, here's the link: <a href="http://www.cloudflare.com/summit17">cloudflare.com/summit17</a></p> ]]></content:encoded>
            <category><![CDATA[Internet Summit]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[Patents]]></category>
            <guid isPermaLink="false">3qsZ45frP2lonrUmx9ciBg</guid>
            <dc:creator>Internet Summit Team</dc:creator>
        </item>
        <item>
            <title><![CDATA[If I Knew Then What I Know Now: Tales from the Early Internet]]></title>
            <link>https://blog.cloudflare.com/if-i-knew-then/</link>
            <pubDate>Thu, 14 Sep 2017 21:16:01 GMT</pubDate>
            <description><![CDATA[ Paul Mockapetris, Inventor, DNS, and David Conrad, CTO, ICANN

Moderator: Matthew Prince, Co-Founder & CEO, Cloudflare ]]></description>
            <content:encoded><![CDATA[ <p><a href="https://twitter.com/svnr2000">Paul Mockapetris</a>, Inventor, DNS, and David Conrad, CTO, <a href="https://twitter.com/ICANN">ICANN</a></p><p>Moderator: <a href="https://twitter.com/eastdakota">Matthew Prince</a>, Co-Founder &amp; CEO, Cloudflare</p><p>MP: You wrote all this stuff; why is the internet so broken?</p><p>PM: People complain about security flaws, but there is no security in original design of dns. I think of it that we haven’t had the right investment in rebuilding the infrastructure.</p><p>Original stuff was only good for 10 years, but we’ve been using it for 30.</p><p>DC: The fact that we were able to get packets from one machine to another in the early days was astonishing in itself.</p><p>MP: So what are you worried about in terms of Internet infrastructure that we aren’t even thinking about?</p><p>PM: i’m worried about the fact that a lot of places like the IETF are very incremental in their thinking, and that people aren’t willing to take the next big jump. E.g. hesitancy to adopt blockchain</p><p>Being able to experiment and try new stuff is important.</p><p>The idea that you can't change anything because it will affect the security and stability of the internet. we need to weigh benefits and risks or we will eventually die of old age.</p><p>DC: Typically, security of routing system. There are people out there who might route stuff inappropriately. I’m not confident about some solutions that have been proposed.The complexity of the system is starting to bite us pretty hard.</p><p>Also, more so, I worry about ability of bad poeple to redirect cannons at any service or target. Way too easy to overwhelm anything in the infrastructure.</p><p>MP: So if a lot of this is about being stuck in the incremental world and not making inventions, is it getting worse or better? Is there any hope?</p><p>PM: Some of it is more basic technology. Stevie Wonder said that when you believe in things you don’t understand, then you suffer. We need to think about routing as a computational problem with bilateral or multilateral agreements. And people can control their destiny a little bit more.</p><p>It’s also a competitive marketplace.</p><p>Think about using tech so people can update the agreements that they have</p><p>MP: But how do you move things forward, given incrementalism? What is path to actually replace dns with blockchain? Do we need to move away from bottom-up internet governance?</p><p>PM: I don’t know exactly how you do it.. It's the case that organizations have gotten big enough that they can make their own custom equipment. The software has always defined the network. So how can you have interfaces to allow collaboration with as much control and reliability as you’d like?</p><p>I think the next frontier is to think about ways to do distributed synchronization contracts. Coordinating addresses and names by your own tools. We need more investment in the capabilities of the infrastructure.</p><p>DC: I agree; we have reached stage of semi-equilibrium w standards, resulting in ossification of underlying infrastructure. This also permits thinking outside box. After awhile, people will get tired of the proprietary stuff and start another round of standardization. It’s a cycle.E.g. DNS over HTTP</p><p>There have been increasing calls for standardization corporations to formulate a standard way of doing these things.</p><p>The other problem is that you start getting vested interests who don’t want progress; they like the niche that they’ve developed for themselves. And they like revenue streams.The cycle of disruption and equilibrium will continue. The IETF is struggling to understand how it will remain relevant moving forward in a way that allows for disruptive technologies t come in and change the underlying game.</p><p>MP: Related to internet governance debate, what do you saw to Ted Cruz when he says US gave up control of internet? Does he have a point?</p><p>DC: NO. Fundamentally, internet is network of networks. You can get into questions at a point about what happens when an app reaches critical mass; does it have regularity implications. By and large, internet has no mechanisms of control.</p><p>MP: it seemed like the internet was working okay before, why did the US stroke the provision that says we can go in and potentially veto what ICAN was doingWhat was rationale?</p><p>DC: Part of it was misunderstanding. The primary role of US govt was to make sure ICANN didn’t do something stupid. And after 12 years of not having anything stupid happen, they realized that not doing anything to the root zone was causing a lot of political problems internationally. So they decided to let the contract expire.</p><p>MP: There was/is real risk that the internet gets governed by a much more political organization that would transform the way the internet is governed to a top-down organization. Unlike what Cruz says, the move by the last administration to say they wouldn't be able to control the internet anymore was a brilliant political move.</p><p>DC: Alternative to Cruz’s approach is fragmented internet, with national networks connected with gateways.And that has implications with regards to the ability of internet organizations to reach markets they would like to reach</p><p>MP: Can we avoid that? Can we have a non-fragmented internet? I’m less sure that this is the case today vs. 4 years ago.</p><p>PM: the internet has cracks in it today. The only real issue is how fragmented is it gonna get. When i was visited china once, at the local hotel you had open internet, but only for westerners who happens to be visiting. It is going to fragment, political people will press their agenda.</p><p>I wish i could make a deal with the US government where i could say, okay you can have my data but you should be protecting me from other people. Negotiations are going to continue.</p><p>MP: is there something technically that you wish you had done in the design that would have better resisted that fragmenting?</p><p>PM: when I was at ICAN, people were saying that the US govt should not be control of all of this; and that was a great attitude, but the US govt can be persuasive. There will be different shades. You can’t expect people to think that the internet isn’t part of the regular world. It is. So regular rules will be applied to it.</p><p>MP: what’s changed? Do you feel less idealistic and optimistic, or have you always been pessimistic?</p><p>PM: My message is: should i look at telegram or signal? I can’t do anything about the US govt, but i want to protect my privacy from commercial organizations. To me it’s more that we have ot think about being more aggressive about thinking about protecting our privacy ourselves. But we should be asking the govt to protect us and not just the storehouse holding all our conversations.</p><p>Until we make security user-friendly, we won’t use it as much, and then it won’t protect us.</p><p>DC: the technology for filtering, for blocking moves with other technologies. And it’s getting better over time. I'm not particularly optimistic but i think that ultimately the network derives value from the number of people who connect to it. Once you filter or block significant parts of internet, it begins to lose value.</p><p>There is an effort to try to protect the data that is being transferred. Ther ewill be on-path taps and data taps, but ultimately the value that the internet brings will provide a way to ensure the infrastructure continues to operate. There will be islands and gateways, but when GDP start depending on connectivity, that sends a signal to govts.</p><p>MP: a lot of the world that looked to the US for internet leadership, they see where growth is coming from, and that is China.</p><p>DC: China has imposed strict control of info, but look at europe and india which are more open:</p><p>But you also look at Europe and India and other places moving toward a more open regime focused on privacy. It is unfortunate that the US is stepping back from the leading role that they had.</p><p>PM: this whole business about filtering being harmful is not where we are today. Is there anyone in the audience who doesn't want to use anti-spam on email?</p><p>MP: but that’s your decision, not the govt’s.</p><p>PM” reputation filtering is my first line of defense. The fact that filtering is good tech doesn’t mean it can’t be used for bad or good. We should be worried about sharpening that up rather than worrying about censorship.</p><p>One question i always want to ask is: is <a href="https://www.cloudflare.com/learning/email-security/what-is-email-routing/">email routing</a> more secure than PGP? If you connect me to a billion more people, i don’t have time to talk to them.</p><p>MP: but if there’s the opportunity to talk to one, isnt; there some value?</p><p>PM: being selective about who you connect to… why would you talk to some unknown person if you wouldn’t go to a restaurant without looking at reviews?</p><p><b>Q&amp;A:</b></p><p>Q: you talked about fragmentation; when will great firewall of china have adverse effect on chinese government? When will cracks start to reappear in that?</p><p>DC: Depending on who you talk to, the great firewall of china is either the best thing that god has created or it is already impacting the ability of chinese companies to work in a global market.</p><p>Because there is so much potential for growth in china, control is winning. But as soon as chinese organizations look for larger markets, you’ll start to see changes in the way that firewall is operating</p><p>MP: When we travel over there, the lack of ability to run a google search and find code that you need, that is something that engineers on the ground in China complain about today. If chinese companies were to stop thinking about their market being only inside china. Think snapchat. The country will start to look more outward.</p><p>PM: The jury is still out. Darwin isn’t necessarily in favor of liberalism. Be comforted by specific examples like market access. But there is still reason to be scared.</p><p>MP: Ok, final question - Bitcoin @ $4,500 or IPv4 addresses @ $12.00 - what is better investment?</p><p>DC: IPv4</p><p>All our sessions will be streamed live! If you can't make it to Summit, here's the link: <a href="http://www.cloudflare.com/summit17">cloudflare.com/summit17</a></p> ]]></content:encoded>
            <category><![CDATA[Internet Summit]]></category>
            <category><![CDATA[DNS]]></category>
            <category><![CDATA[ICANN]]></category>
            <guid isPermaLink="false">3kFOumVT2QqKqUXHiRPdfd</guid>
            <dc:creator>Internet Summit Team</dc:creator>
        </item>
        <item>
            <title><![CDATA[Making the World Better by Breaking Things]]></title>
            <link>https://blog.cloudflare.com/making-the-world-better-by-breaking-things/</link>
            <pubDate>Thu, 14 Sep 2017 20:36:35 GMT</pubDate>
            <description><![CDATA[ Ben Sadeghipour, Technical Account Manager, HackerOne, and
Katie Moussouris, Founder & CEO, Luta Security ]]></description>
            <content:encoded><![CDATA[ <p><a href="https://twitter.com/nahamsec">Ben Sadeghipour</a>, Technical Account Manager, HackerOne, and <a href="https://twitter.com/k8em0">Katie Moussouris</a>, Founder &amp; CEO, Luta Security</p><p>Moderator: <a href="https://twitter.com/jgrahamc">John Graham-Cumming</a>, CTO, Cloudflare</p><p>JGC: We’re going to talk about hacking</p><p>Katie Moussouris helps people how to work around security vulnerabilities.</p><p>Ben Sadeghipour is a technical account manager at HackerOne, and a hacker at night</p><p>JGC: Ben, you say you’re a hacker by night. Tell us about this.</p><p>BS: It depends who you ask: if they encourage it; or, we do it for a good reason. “Ethical hacker” - we do it for a good reason. Hacking can be illegal if you’re hacking without permission; but that’s not what we do.</p><p>JGC: You stay up all night</p><p>BS: I lock myself in the basement</p><p>JGC: Tell us about your company.</p><p>KM: I was invited to brief Pentagon when I worked at Microsoft; The pentagon was interested in the implementation of this idea in a large corporation like Microsoft.“Hacking the pentagon”The adoption of Bug Bounty has been slow. We were interested in working with a very large company like Microsoft. There was interest in implementing ideas from private sector at Pentagon. I helped the internal team at the Pentagon ask a bunch of questions. I told them “You’re already receiving a free pen test. You’re just not receiving the report.”</p><p>Trying to engage with the hacker community and provide a legal avenue to report to the Department of Defense.</p><p>It was important for largest military organization in the world to admit that it didn’t identify all the bugs.</p><p>BS: Two years ago, no one would admit they hacked the government. Now it’s an important conversation to have.</p><p>JGC: Has the navy done it yet?</p><p>BS: That’s something we don’t know yet.</p><p>JGC: What you’re doing is not illegal, but there are some laws. What is the grey area? How are you not breaking the law?</p><p>BS: You’re okay as long as you’re following the policies.</p><p>JGC: Is this typical?</p><p>KM: When you get to potential impact, your well-meaning hacker will start to create some conflict.They’ll say: describe the vulnerability steps you’re reproducing and the potential impact. We have opportunities to “clarify” the scoping rules.Nation-states are different than private companies.</p><p>You’re giving permission to a hacker when you’re setting up a bug program; but there’s a fine line; it’s still a possible felony. When you’re thinking about it from the perspective of the DoD, you need to preserve the ability to go after a nation state, criminal actor, or any bad actor. So it’s a different kind of equity when you are creating the legalese.</p><p>I do this now with UK govt, mapping to specific laws: preserving litigative power while giving permission.</p><p>JGC: let’s talk about bug bounties themselves. What is it / how doe sit work?</p><p>BS: In short: allowing hackers to hack programs and having open communication line with them. Taking the step to allow hackers to be able to enter an application.</p><p>JGC: And you get paid… so there’s a market for this stuff out there. Who is competing in this market?</p><p>KM: I prefer to think of it as “offense market”. The highest prices are usually here. They are paying for both expertise and longevity of the bug.</p><p>Not about selling to highest bidder. It’s about compensation, recognition, and pursuit of intellectual happiness is why many hackers pursue this. The defensive market is lower paid. Price is not the competition factor. You will create a situation where you cannot eventually employ your engineers.</p><p>So I look at: how do you find other levers than price?</p><p>JGC: What was your motivation for getting into hacking?</p><p>BS: First, curiosity. Then, to be able to help, knowing that i could make a difference. Third: the money aspect.</p><p>JGC: How do we create right Bug Bounty program for a company looking for it?</p><p>KM: My company prevents premature bountification; organizations come to me and say they’e never had a bug reported.</p><p>I make sure that companies have enough automation on back end; there are more efficient ways than starting a bug bounty program to discover vulnerabilities.This is much more than how you found out about the bug.</p><p>JGC: How do you find and motivate the right hackers? Don’t you get a lot of low-hanging fruit?</p><p>KM: There are good examples of open source. how do you explain Heartbleed, a bug that has been sitting in such a popular codebase for two years? How do you attract skilled eyes and focus them where you want them? Microsoft was receiving 200,000 non-spam e-mails about bugs. It is about understanding behavioral economics at play as opposed to gauging how much a project was worth and setting a price tag.</p><p>JGC: Ben, what do you think about recent Equifax breach? What can companies like that do to protect themselves from people like you?</p><p>BS: That’s a broad question. For me, I look for default settings.Having a process of keeping these things updated.Changing settings from default.</p><p>JGC: A lot of things get broken into; it’s not necessarily a sophisticated hack; it’s that the software wasn’t updated, and so on. Do bug bounties help with that? Or are there better ways?Do bug bounties help with that?</p><p>BS: Yes; but they aren't’ the only solution. Maybe the default password has been sitting there for years and no one has changed them. When Bug Bounties find those things, we fix them, but not the only solution</p><p>JGC: How else can hackers help me get stronger?</p><p>KM: No matter how you find out about the bug, that’s not the problem to be solved.</p><p>Wherever you learn about the vulnerability is not the problem to be solved.</p><p>A bug bounty is one approach; but if a bug bounty shows a ton of low-hanging fruit, you could have found an intern to do that work.</p><p>There are more efficient things that you can do. A bug bounty is useful in giving a quick snapshot of the system. It’s useful in proving a point and showing for sure that vulnerabilities exist.</p><p>Even as consumers, there is an inundation of bugs that we all have to deal with even if we don't’ create software. There will be bugs that affect us as consumers. How do you as a consumer make a risk-based decision? Corporations make those same decisions; bug bounty help focus on what is most likely to get triggered and reconfigure.</p><p>JGC: During the presidential debates last year, Trump said that the hackings could be a guy in his basement. So who is hacking things?</p><p>KM: “Everybody is hacking everything.” We got the word espionage from the French; so “Hacking is just a new tool in the toolbox.”</p><p>We just happen to have our own equities that we need to protect along with our allies.</p><p>JGC: there is an informational imbalance between countries. When we think about spying as second oldest profession, seems like hacking must have been around for a long time.What would be your advice about protecting myself as a business from a hacker?</p><p>KM: “Nail the basics.” We keep talking about vulnerability coordination, and a bug being found and a vendor fixing that bug. What about fix deployment? How do we deal with that? Figure out patch management, your risks and tradeoffs, and your regulatory environment. What are mitigations?You should deploy a number of tests before you’re allowed to deploy that test.</p><p>JGC: What does it feel like to hack into something?</p><p>BS: it feels great. It’s great to be able to figure something out blindly.</p><p>Q&amp;A:Q: When I buy a car, I can look at safety ratings. A 5 star rating means you’re less likely to get killed in a crash.Is there a way of ensuring computer security in this way?</p><p>KM: Gosh, wouldn't that be great! There’s been some talk about cyber UL - consumer type ratings; but it gets very complicated very quickly. Just counting bugs, for example. Do you count a root bug cause as one bug? Taxonomy is complicated; rating is complicated.</p><p>How do you count and rate? What does it mean once you rate? As new vulnerabilities are found, how do you deal with 5-star product? When we do have smart toasters, my plan is to have a dumb toaster.</p><p>Q: Can you re-explain “offensive vs. defensive market”?KM: offense market is the purchasing of vulnerabilities or exploits in order to use them for an attack, defense market are things like bug bounty programs or third party vulnerability acquisition services.</p><p>I define it by: what are you buying a vulnerability for?</p><p>Q: In terms of policy decisions, what should voters be looking out for?</p><p>KM: there was a recent proposed bill that DHS should run a bug bounty. I am opposed; you should be too. You cannot legislate a smoothly-run bug bounty program.</p><p>I worry about alliterative marketing: popularizing one method.</p><p>What i worry about are these regulators thinking that everything is now a hammer that can be hit by a bug bounty nail.</p><p>Also, there is proposed legislation about wanting to know ingredient list of all software before fed govt buys it.</p><p>Now take that to its logical conclusion. A manufacturer of a submarine will now not just have to know the ingredient list of every component, but…</p><p>Important to keep congress in tune with smart new tech policy choices, not just what’s trendy or in the latest news.</p><p>All our sessions will be streamed live! If you can't make it to Summit, here's the link: <a href="http://www.cloudflare.com/summit17">cloudflare.com/summit17</a></p> ]]></content:encoded>
            <category><![CDATA[Internet Summit]]></category>
            <guid isPermaLink="false">2GjyH7sz9i0yw9li7ie6HS</guid>
            <dc:creator>Internet Summit Team</dc:creator>
        </item>
        <item>
            <title><![CDATA[A Cloud Without Handcuffs]]></title>
            <link>https://blog.cloudflare.com/a-cloud-without-handcuffs/</link>
            <pubDate>Thu, 14 Sep 2017 19:01:55 GMT</pubDate>
            <description><![CDATA[ Brandon Philips, Co-Founder & CTO, CoreOS, and Joe Beda, CTO, Heptio, & Co-Founder, Kubernetes

 ]]></description>
            <content:encoded><![CDATA[ <p><a href="https://twitter.com/brandonphilips">Brandon Philips</a>, Co-Founder &amp; CTO, CoreOS, and <a href="https://twitter.com/jbeda">Joe Beda</a>, CTO, Heptio, &amp; Co-Founder, Kubernetes</p><p>Moderator: Alex Dyner, Head of Special Projects, Cloudflar</p><p>We’re exploring increasing risk of few companies locking in customers gaining more power over time.</p><p>AD: I want to hear your stories about how you got into what you do.</p><p>JB: Kubernetes faced problem of either having googlers use rbs or bring X to rest of world. We wanted to have Googlers and outside people using something similar. We chose to do it as open source because you play a different game when you’re the underdog. Through open source we could garner interest. We wanted to provide applicational mobility.</p><p>AD: Brandon, talk about your mission and why you started company.</p><p>BP: We started CoreOS four years ago; We spent a lot of time thinking about this problem and containers were natural choice. They are necessary for achieving our mission. We wanted to allow people to have mobility around their applications. We wanted to enable new security model through containers. So we started building a product portfolio</p><p>AD: There are tradeoffs between using a container or an open source tech; how do you think about those tradeoffs?</p><p>BP: First Kubernetes is providing application-centric view. The abstraction is: how do we create a platform? Also, how to build useful integrations?</p><p>The project tries to build useful integrations. It’s really about that initial abstraction.</p><p>JB: One useful comparison is Kubernetes for is a kernel for system. There is a feeling that we want to keep Kubernetes as flexible kernel, while recognizing that you have to build integrations &amp; user mode on top of it.</p><p>AD: How do you talk about different levels (developer, operational)?</p><p>JB: The advice i give is that lock-in is unavoidable. The question is: What is the risk of that lock-in? You have to weigh that risk against the benefits. If you’re a startup, you’re not worried about the risk of moving away from a public cloud network. Vs. very large company. There are certain types of lock-in that present problem for operations vs. development teams. Kubernetes makes it an operational problem versus a developmental problem.</p><p>BP: Operational: by using Kubernetes, people can bring up dev environments and test on internal infrastructure in our office. This is already providing value.</p><p>On the app side, risk comes in when cloud providers build databases where data is tied to the data center. Abstraction allows developers to be free from data center.</p><p>AD: How does that work over time?</p><p>BP: For many organizations it comes down to cost benefit analysis. They look at their application code, figure out how long they’re locked-in. Leverage only comes when you can call a bluff.Basically a business decision.</p><p>JB: It’s a new type of technical debt.There is no one answer.</p><p>AD: As less people can do this, salaries of mainframe programmers are going up now; what do you think about that?</p><p>JP: There is an analogy between the big public clouds and the legacy mainframe</p><p>Legacy mainframe vs. public cloud. Even if no longer preferred choice, it will have a long future. It’s here to stay, even if world moves on.</p><p>BP: The larger companies will be competing against the major tech companies that run clouds. We don’t have a term. Is it “cloud debt”? Cloud technical debt? It’s a nascent topic but becoming important.A new challenge .</p><p>JB: Data gravity.</p><p>AD: A lot of this is about Amazon---are other large vendors approaching this because of their market position?</p><p>JB: Amazon is the big elephant for sure. But this goes beyond Amazon. When you look at Kubernetes in containers, it provides a model that did not exist before Amazon. Amazon has been struggling to find balance between infrastructure and ease of use.</p><p>So what is making this layer of infrastructure so interesting is not just multi-cloud strategy, but a different way of thinking about programming and automating applications.</p><p>The interesting stuff is how we utilize this new tool set.</p><p>BP: It’s about making and ensuring the tech works across the board. When Kubernetes started the tech wasn’t there yet for it to run on Amazon. One of our first challenges was to make it possible to get Kubernetes on Amazon. It’s an ongoing technological battle to figure out abstractions and making cloud providers innovators themselves in data and network storage, etc.</p><p>AD: What’s the counter to, yes, CoreOS will help me not get locked into Amazon?</p><p>BP: Customers are getting APIs. We’re giving customers an API that we don’t modify and they get upstream Kubernetes. We take open source software and integrate it; they can put that integration into their own apps.It’s about taking pieces and providing an adhesive experience.</p><p>Not just infrastructure but application monitoringA lot of value of the cloud is that it automates operations.</p><p>We provide you with open source software that is automated.</p><p>Software venders have to start providing value proposition of resecuring infrastructure when a vulnerability appears in the cloud. “Zero-toil automation”</p><p><b>Q&amp;A:</b></p><p>Q: Customers with critical applications usually use multiple networks; is this one value proposition of the cloud lock-in argument?</p><p>BP: we have seen both; it Depends on their internal risk assessment. You can have beautiful architecture about how your business will survive but if you don’t have applications around it, it’s all pointless.</p><p>JB: Geography is important. Having a substrate to write app against is important.</p><p>BP: It will be interesting as we see global distribution of compute network and storage, the different cost-benefit analyses that will be available. A lot of competition will arise outside of the US in terms of building data centers.</p><p>All our sessions will be streamed live! If you can't make it to Summit, here's the link: <a href="http://www.cloudflare.com/summit17">cloudflare.com/summit17</a></p> ]]></content:encoded>
            <category><![CDATA[Internet Summit]]></category>
            <category><![CDATA[Kubernetes]]></category>
            <guid isPermaLink="false">2HCFrLTeQdXcRz8imsUbtc</guid>
            <dc:creator>Internet Summit Team</dc:creator>
        </item>
        <item>
            <title><![CDATA[Making Mobile Faster than Fixed Line]]></title>
            <link>https://blog.cloudflare.com/making-mobile-faster-than-fixed-line/</link>
            <pubDate>Thu, 14 Sep 2017 18:38:29 GMT</pubDate>
            <description><![CDATA[ Cole Crawford, Founder & CEO, Vapor IO, and
Chaitali Sengupta, Consultant, Qualcomm Datacenter Technologies ]]></description>
            <content:encoded><![CDATA[ <p><a href="https://twitter.com/coleinthecloud">Cole Crawford</a>, Founder &amp; CEO, Vapor IO, andChaitali Sengupta, Consultant, Qualcomm Datacenter Technologies</p><p>Moderator: <a href="https://twitter.com/zatlyn">Michelle Zatlyn</a>, Co-Founder &amp; COO, Cloudflare</p><p>CC: moved between private and public sector.</p><p>CS: her company added 100 million customers in India.</p><p>MZ: Let’s start with where we are today: trends or things you’re seeing in the marketplace that weren’t there 5 years ago.</p><p>CC: What’s interesting is combination of data mass and data velocity, resulting in a more dynamic internet. E.g. Latency wasn’t mentioned by customers at first; AI is helping to create a new low-latency internet.</p><p>CS: One of the biggest things is applying lessons of cloud to telecom to see how we can make systems more centralized and virtualized. Network function virtualization; putting things on general service servers. Now dovetailing into 5G, where we see more bandwidth.</p><p>MZ: We’re currently in 4G world; when will 5G standard get finalized?</p><p>CS: Standards are getting finalized; trials are getting started. Many 5G systems are up and running NWC America ... is running trials already. I would say end of next year or 2019</p><p>MZ: So the future is here and it’s almost distributed? 4G took 2 years to roll out. Will it take another 2 years?</p><p>CC: It won’t. T-Mobile announced last week that what once took 24 months will now take 6 months.</p><p>MZ: Why a fraction of the time?</p><p>CC: New technologies. For all of the “nervous system” of AI, we also have to take care of heartbeat / “cardiovascular” Consider Facebook, who has bay stations now; they can save billions of dollars by innovating. Companies don’t want to be out-innovated.</p><p>CS: There is an Industry-wide understanding on need to do more automation, in the last 5 years. This is making things simpler.</p><p>MZ: So competition is helping drive innovation. Let’s talk about the data center technologies;</p><p>What’s on the horizon for bay stations?</p><p>CS: Bay station is everything that stands between your device and the information it is trying to access or send. As that system has become more complex, it has become desegregated. Now you have something at the tower, and something in a more centralized location. This trend is continuing. The trend is for all of that to become more centralized.</p><p>We need to be pragmatic; we can’t just keep everything on the cloud.</p><p>So it’s an engineering optimization problem. And it’s really breaking the bay station apart.</p><p>CC: So what is a bay station: a motherboard, a radio, and antenna and an network interface card. we are seeing decentralization of these functions.The edge will not end the cloud; it will augment cloud. The true edge is the radio access network, the meeting point between wireless and wire lines. Analogy with airline industry. That connection is material. The bay station will allow a massive virtualization. The computer sitting at the top of the tower will move down to the base and be virtualized; we will end up in a decentralized world with a metro area network that is for more geographically localized.</p><p>MZ: So, also lots of opportunity for innovation. What other innovations are you seeing?</p><p>CC: A lot of innovation led by telcos. The idea is to make an intelligent relationship that can be monetized.Serverless functions will be married to network functions.The FCC and net neutrality is the best thing that could happen. This is good for business. A lot of innovation is happening in terms of moving to intelligent connection.</p><p>CS: I see a lot of innovation down to SOC level.Machine learning will become a way of doing things, along with general purpose processors.</p><p>MZ: Let’s go back to what you said about data and how that is driving things. Give us the context: How is data increasing exponentially and what does that mean?</p><p>CC: We’ve been promised a cool virtual world; can machines make moral decisionsOn the technological side, you can’t defeat the speed of light. E.g. The human an eye can see 150 degrees vertically and 180 horizontally. 5.4 gigs of data a second.</p><p>To deliver a truly augmented reality experience, you need a very different type of internet than what we have today. You need a sub 7 millisecond decision.</p><p>There are technological boundaries we are trying to overcome; but it means a fundamental re-architecture of what we have today.</p><p>MZ: So more decentralization?</p><p>CC: You have to be closer to the radio access network. As you move across the city, you move to another tower to get your cell signal back. The amount of data velocity and proximity is far more dynamic than what we experience today.</p><p>MZ: How has regulation driven development; and what is on the horizon from a regulation standpoint?</p><p>CS: Regulations are separate from market and tech forces, but it is also geography-specific because of different interests. So one example in India is the question of user identity. In India, the social security system is in progress. So your mobile number becomes your de-facto identity. User identity is geography-specific.</p><p>CC: “if you can legally circumvent regulation, do it. It’s hard to follow the rules when the rules move so slowly.” Companies like Facebook are investing in bay stationsIn the IOT world: all of these things get terminated in bay stations. Some municipalities move faster than others. This is less federal than municipal movement.</p><p>Or, another way to think about it, “state trumps federal.”</p><p><b>Q&amp;A</b></p><p>Q: I live in the flatlands of Palo Alto and I can’t get service. How do we ensure service is reliable when moving from cell to cell?</p><p>CC: Small-cell 5G innovation will happen soon, one of de facto standards being built in. What carrier you are on and how they are investing in small-cell tech will affect that.</p><p>CS: Also the tracking of where are dark areas?</p><p>Q: We’re in a monopoly of operating systems, and the consumer has no choice to be outside of Ios or android. Will there be more consumer choice in the future? So consumer metadata is not tied to one of 2 companies.</p><p>CC: Arthur C. Clark said if what I say seems reasonable to you then I will have failed; but if what I say sounds unreasonable then we may have an understanding of what the future will be built for.We’re not far away from</p><p>Humans are terrible at the future value propositions of tech; but certainly people are thinking about how to prevent lock-in.</p><p>CS: In India, idea to have 4G phone where you don’t need. In some markets, you don’t need to have everything on your phone all the time. That leads to new ecosystems and new ways of thinking.</p><p>Q: Can you segue your metadata from Apple and Google?</p><p>CC: Look how long it took Android to catch up to app developer ecosystem. Developers are where gravity happens.</p><p>All our sessions will be streamed live! If you can't make it to Summit, here's the link: <a href="http://www.cloudflare.com/summit17">cloudflare.com/summit17</a></p> ]]></content:encoded>
            <category><![CDATA[Internet Summit]]></category>
            <category><![CDATA[Speed & Reliability]]></category>
            <guid isPermaLink="false">4LHVLQZTV2zcgXzy9woslG</guid>
            <dc:creator>Internet Summit Team</dc:creator>
        </item>
        <item>
            <title><![CDATA[Disruptive Cryptography: Post-Quantum & Machine Learning With Encrypted Data]]></title>
            <link>https://blog.cloudflare.com/disruptive-cryptography/</link>
            <pubDate>Thu, 14 Sep 2017 18:25:39 GMT</pubDate>
            <description><![CDATA[ Shay Gueron, Associate Professor of Mathematics, University of Haifa, Israel, and Raluca Ada Popa, Assistant Professor of Computer Science, UC Berkeley

 ]]></description>
            <content:encoded><![CDATA[ <p>Shay Gueron, Associate Professor of Mathematics, University of Haifa, Israel, and <a href="https://twitter.com/ralucaadapopa">Raluca Ada Popa</a>, Assistant Professor of Computer Science, UC Berkeley</p><p>Moderator: <a href="https://twitter.com/jgrahamc">John Graham-Cumming</a>, CTO, Cloudflare</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/72G9FbjLaobqe4DURG9yhL/124bdfecac85b995ff052124cec23e8d/Screen-Shot-2017-09-14-at-10.18.40-AM.png" />
            
            </figure><p> Photo by Cloudflare Staff</p><p>Raluca is also a Co-Director of the RISELab at UC Berkeley as well as Co-Founder and CTO of a cybersecurity startup called PreVeil. She developed practical systems that protect data confidentiality by computing over encrypted data as well as designed new encryption schemes that underlie these systems.</p><p>Shay was previously a Senior Principal Engineer, serving as Intel’s Senior Cryptographer and is now senior principal at AWS, and an expert in post-quantum, security, and algorithms.</p><p>JGC: Tell us about what you actually do.</p><p>RP: Computing on encrypted data is not just theoretical; it’s also exciting because you can keep data encrypted in the cloud. It covers hacking attacks while still enabling the functionality of the system. This is exciting because we can cover so many hacking attacks in one shot.</p><p>SG: I’m working on making new algorithms; also on making solutions for quantum computers that are increasingly strong.</p><p>SG: I’ve been working on cryptography: making it faster, recently I’ve been thinking about solutions for what will happen when we have a quantum computer strong enough to threaten the known methods for cryptography.</p><p>JGC: Why are we worrying ahead of time?</p><p>SG: Protocols and implementations have been improved; performance on processors allows for most things to be encrypted. We are entering a stable situation. But right now, there is a new threat where there may be quantum computers that can solve difficult problems. This means that we need to start thinking about a replacement to the current cryptography.</p><p>RP: If someone is saving encrypted communications now, they could decrypt past conversations that could still be relevant in the future.</p><p>JGC: We don’t have the quantum computer yet but we already have the programs that will run on it.</p><p>SG: Cryptography is based on a belief in “reduction of a difficult problem.” All cryptography is based on a belief that something is difficult to do; based on this there are theoretical works that run “if… then”; but there is no robust proof that factorization is difficult, or that solving a particular problem is hard. We are just not smart enough yet.</p><p>JGC: Talk about this concept that there are classes of problems that are hard.</p><p>RP: There are classes of problems. There are many studies that people used to boost their confidence about specific algorithms.</p><p>JGC: Why can't we just make keys bigger to deal with quantum threat?</p><p>SG: We have to be practical in some sense. The amount of traffic that occurs prior to encrypting data is significant. This causes computational burdens.</p><p>RP: Shor’s algorithm is particularly effective; it can break certain properties of RSA. This is not the same for symmetrical cryptography, where increasing the key is more hopeful.</p><p>JGC: So what are we going to fix today?</p><p>SG: When you establish communications, first we agree on crypto-ciphers. The symmetric key will be used for encryption based on algorithm and signatures. Signatures are more urgent. For the symmetric key encryption, we can start today, because the quantum algorithms can’t reverse the key.</p><p>JGC: Give us an idea of what kinds of things you can do without decrypting something?</p><p>RP: In theory, you can compute any function without decrypting. We can do specialized computations effectively and machine learning on encrypted data.</p><p>For instance: How can you do summation of encrypted data? You get encryption of the sum. It’s not difficult to do an encryption summation. There are practical examples: startups, doc sharing in email; there are many solutions for classes of computation that apply to products we are using today.</p><p>So there are services for all sorts of classes of computation out there.</p><p>SG: But some of those encryption systems also depend on difficulty of factorization.</p><p>JGC: How fast will it be before companies become “post-quantum certified’?</p><p>RP: For certain classes of computation it is happening quickly, but there are still many factors making that difficult. For specialized classes of computations, it should happen in the near future … hopefully within the next 5 years. Why? Because encrypted computation brings new functionality. I.e. sharing encrypted data across hospitals to measure effectiveness of cancer treatments and enable new studies.</p><p>Encrypted computation brings you new functionality. A lot of businesses can’t share data: for instance, medical companies - which means they cannot help their patients as effectively, so we’ll be able to do many more studies when we can enable this encrypted computation.</p><p>SG: There is a call for proposals by NIST for quantum-resistant algorithms. They estimate that this will be a 5-year process. Industry will have to start integrating; the safe way would be to do both: If you want to do a key exchange, you do the classical and the quantum resistant one.</p><p>JGC: How long before we create a quantum computer?</p><p>SG: The question is how long it will take before they are strong enough… this will take some time. But there is a lot of motivation.</p><p>Quantum computing is not designed to break cryptography, but to go some good. Many industries and governments are trying to do this right now. It’s a race against the human mind.</p><p>JGC: One of the arguments against new cryptography is that it is slow. Are there costs?</p><p>RP: Certainly; what’s sped up encryption are hardware implementations. There are already startups trying to build specialized hardware for advanced encryption.</p><p>RP: For the masses to enjoy acceleration, you would need quantum computers for the masses. To speed up usage, you need quantum computers for the masses.</p><p>JGC: If there are quantum computers for the masses, what will I get?</p><p>SG: You can get better AI, faster searches.</p><p>JGC: Tell us about quantum encryption vs. quantum computing: for instance, the Chinese sending data between two satellites</p><p>RP: You’d need a lot of quantum computers, but to break it you’d just need a few.A widespread adoption of quantum encryption is going to be much slower.</p><p>Q&amp;A: What is lattice-based cryptography?</p><p>Why do the two of your domains intersect?</p><p>RP: Lattices are much more expressive in terms of the computations they can do. Lattices are more resilient to quantum attackers and classical algorithms.</p><p>SG: We have no idea how to solve lattice problems, even if we had quantum computers. New cryptography is trying to solve these issues.</p><p>This is why the new cryptography is trying to build on these problems in the hopes we can come up with an algorithm.</p><p>A quantum computer is not going to allow you to do a million computations.</p><p>JGC: What would you like the audience to take away from this session?</p><p>RP: Mainly, encrypted computation is practical. There are actually practical solutions; it can enable new functionalities. Secondly, you can enable interesting studies (medical, financial) with encrypted computation.</p><p>SG: People shouldn’t worry about quantum-resistant encryption. We’re working on it.</p><p>So it can enable new functionalities for you.</p><p><b>Q&amp;A:</b></p><p>Q: What advice for people who want to make cheap, future-proof “internet of things” devices?</p><p>SG: There is a set of algorithms that are known to be secure against quantum attacks. These are hash-based signatures. These are slow, but practical solutions. But in general, I’d like to say: Don’t lose any sleep over the threat of quantum computers; it will happen gradually. There is still time to prepare.</p><p>RP: I agree; but do start thinking about it. First get Internet of Things right; then worry about the quantum part.</p><p>Q: What are some primitives that are missing in programming language that allow you to build easily? How to balance security with programming?</p><p>RP: We have some libraries; there are some.</p><p>Q: What do you think of the quantum resistant crypto put into the Chrome browser’s TLS stack? Will secrets stand up to a quantum computer?</p><p>SG: This experiment was already performed by Google, They wanted to test what would happen to the overhead. This particular algorithm was just an exercise to see what would happen in reality, if you do both classical and quantum-safe key exchange. Conclusion: yes, we can handle it.</p><p>All our sessions will be streamed live! If you can't make it to Summit, here's the link: <a href="http://www.cloudflare.com/summit17">cloudflare.com/summit17</a></p> ]]></content:encoded>
            <category><![CDATA[Encryption]]></category>
            <category><![CDATA[Internet Summit]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">1BYQ8dCGIJD1a36awJyG2s</guid>
            <dc:creator>Internet Summit Team</dc:creator>
        </item>
        <item>
            <title><![CDATA[What Will AI Mean for Everyday Life?]]></title>
            <link>https://blog.cloudflare.com/what-will-ai-mean-for-everyday-life/</link>
            <pubDate>Thu, 14 Sep 2017 18:13:49 GMT</pubDate>
            <description><![CDATA[ Willie Tejada, Chief Developer Advocate, IBM
and Anthony Goldbloom, CEO, Kaggle ]]></description>
            <content:encoded><![CDATA[ <p><a href="https://twitter.com/wtejada223">Willie Tejada</a>, Chief Developer Advocate, IBMand <a href="https://twitter.com/antgoldbloom">Anthony Goldbloom</a>, CEO, Kaggle</p><p>Moderator: Jen Taylor, Head of Product, Cloudflare</p><p>JT: Our focus today is really what does AI mean for everyday life. I’m hearing a lot about AI. What is your assessment about where we are and how it is making a difference?</p><p>WT: we’re in an unprecedented, interesting era. From a consumer perspective, negative connotation.It’s an interesting era we are in; these technologies are going to do a tremendous amount in terms of consumers selecting what they buy, Helping patient-centric care.</p><p>Combination of data set &amp; availability of resources is fueling AI.</p><p>You might hear 90% of the world’s data has been created in the past two years. AI will help us deal with that kind of information overload.</p><p>The big difference with programming systems is that AI knows how to understand, reason, learn, interact.</p><p>AG: There is a set of techniques through which we can more accurately predict fraud, insurance plans, credit scoring.</p><p>This is a jump in the past 15 years.</p><p>5 years ago, the ability to do very exciting things with unstructured data, i.e. automating radiology. Then digital networks came along and then we had use case after use case.</p><p>AI has lots of programmatic uses.</p><p>WT: Algorithms are contributing to oncology.</p><p>You take a look at things we’ve done in oncology as an example: the ability to train a system;</p><p>Effect is based on training sets that AI is being fed. Are we using the right humans to train these systems?We need to hold the systems to the same standards we hold humans.</p><p>Design principle: It’s always assisted. Not replacement.</p><p>JT: Do you feel that the future is assisted?</p><p>AG: I don’t necessarily agree that future is assisted. Repetitive tasks can be automated, e.g. radiology. End result is that algorithms are out for anything that involves repetition or mundane tasks.</p><p>Humans spend a lot of time doing repetitive things. I think algorithms will be our future radiologists. Any job that demands a lot of repetition, for instance, auditing, mundane legal tasks.</p><p>There is probably an element of combination between routine algorithm and more challenging cases for humans</p><p>Eventually the algorithm will do the routine, simple tasks, and the more challenging tasks will be given to humans.</p><p>WT: I agree. “We’re getting humans to raise their game”. The idea is to get rid of commodity tasks. When I call Comcast, I go through the same questions all over again. So how do you reduce the time from 1 1/2 days to five minutes? How do we get humans to find solutions to more complex problems?</p><p>Even in a scenario in which AI is playing a game, AI takes care of the commodity moves, and the final win from the human.Creativity comes from humans vs. commodity</p><p>JT: Great leap forward is to process unstructured data and give insights; Give insights to someone who may only see a small sliver.</p><p>WT: Especially important in life-sciences;They are unstructured data: handwritten reports, etc.</p><p>10k new articles on clinical trials</p><p>AG: Lets say radiologists can look at 3,000 images a year; AI can look at 3,000 a second.As long as task is suitable, AI can achieve objective.</p><p>Machines have an unfair advantage.</p><p>JT: what should we be doing as a community to realize potential benefits of AI in everyday life?</p><p>AG: I’m at Google and I think Google does this effectively: when we use the voice assistant or photos we search for our photos by “search my name” and it finds pictures of me. That’s the Google brain team going out and infusing products with digital awareness.</p><p>There is a shift that companies should make: being willing to shift to need a handful of outstanding machine learners rather than many; think the right way about talent - small, extremely talented teams.</p><p>WT: The developer is this era’s doctor/engineer.</p><p>Dominantly, data and application team now work collaboratively. More need for data science.</p><p>The data team and application team used to work separately; now there’s more need for data scientists and the collaboration of those teams. Data is the fuel for AI; so that’s an important dynamic to think about.</p><p>Those roles didn’t exist until recently. As we go into next phase, new roles and division of labor will come up.</p><p>Building a team with tremendous expertise is necessary.</p><p>JT: Looking forward, how far should we and can we be taking AI?</p><p>AG: “The future is already here; it’s just not widely distributed”Challenges are mainly organizational.Google brain is an example of how you productionize machine learning in a company.</p><p>Also, reinforcement learning: There is a technique now that automates trial and error; it plays enough games that it learns what gets it a good score.</p><p>We’re starting to see AI as input to stock trading, ad targeting, etc.Generative models are a new area of machine learning: they’ll take an image and be able to write a caption for that image. Visually impaired people can now describe scenes using AI.</p><p>Digital networks are starting to make their way into existing use cases.</p><p>WT: There is no reason to believe that something like tax codes can’t be replaced by AI. In the future, systems will have embedded AI; Internet can provide access to these systems at a commodity level.</p><p>JT: You’ve talked about replacing commodity activities, used more broadly. I think about the development of trust that it will take for these technologies to become widespread. I’m skeptical.</p><p>JT: how can we develop trust ? How should we think about building trust for broader adoption?</p><p>AG: There’s the issue of the market being ready. Do i trust my cancer diagnosis from a machine? Building trust is case specific.</p><p>Let’s use radiology: You can start by having a machine operate alongside a human; look at the agreement rates. With medical diagnosis you eventually know for sure. So over time, articles are published, the machine as a track record. If it’s high-performing, maybe it takes over. There is no general answer; very use-case specific.</p><p>WT: Agree. I think you have to build these on some principles, ie transparency. As a consumer you want to know if you are dealing with a human or a system. If a system, who taught it? And when it generates a recommendation, you want to know the data set that recommendation was generated from. Human-assisted is important; will yield the type of system people can trust.</p><p>JT: Also, no human is perfect; so what are our expectations of the system vs. the human?</p><p>AG: “And no algorithm is perfect.” The Tesla will have an accident, just as humans do. The question is: Does the Tesla have accidents at a lower rate than humans? You can be sure that when a non-human has an accident, we’ll view it differently.</p><p><b>Q&amp;A:</b></p><p>Q: I’m a physician at Stanford. Doctors spend only 30% of our time taking care of patients, 70% on data. Are we developing AI at the expense of human intelligence?</p><p>WT: not at the expense---how is AI giving you more time to actually make you more efficient and give you data to better make decisions? Data-entry will be takenIn some cases, we’re giving you more leverage in terms of your data set and efficiency. You won’t have to key in data; it will be learned / read / listened to by a machine.</p><p>AG: Future lives will be more interesting when you take mundane, repetitive tasks away.</p><p>Let’s say a our mundane roles go away; does that mean fewer of us are needed? Historically we’ve gone through waves of automation and more professions are created. It’s hard to know in this case; is the disruption happening too quickly to adapt? It’s a little scary. If the structure does change, I think all our lives will be more interesting minus the mundane tasks.</p><p>Q: I have a 20-year old daughter in college. With so many jobs potentially being replaced, what career advice do you have for her?</p><p>AG: Computer programming and machine learning are good bets.If the job involves creativity, and connecting dots in disparate ways, no machine learning technique can replace that even remotely. I don’t know any machine learning techniques capable of doing that.</p><p>WT: In the major revolutions, there’s always been the fear that occupations will be replaced.We’re in the same era.</p><p>Q: Use-cases have been scientific and medical; what about social and political limitations of AI implementations? E.g. Law that involves rules that are like algorithms: would you be willing to replace jury trials with AI, why or why not?</p><p>AG: At low levels of the legal system, yes; it’s only once you get to the Supreme Court that those should still be conducted by humans. But there are so many rote cases that come to court again and again; so it seems feasible.Rote cases could very well be replaced by AI.</p><p>WT: Reasoning is still important. You may have data sets that assist the jury to help them make a better decision; but you can’t replace the human factor on the judgment call.</p><p>All our sessions will be streamed live! If you can't make it to Summit, here's the link: <a href="http://www.cloudflare.com/summit17">cloudflare.com/summit17</a></p> ]]></content:encoded>
            <category><![CDATA[Internet Summit]]></category>
            <guid isPermaLink="false">1bf4U58iJGOsasUWF7o4Cr</guid>
            <dc:creator>Internet Summit Team</dc:creator>
        </item>
        <item>
            <title><![CDATA[The View from Washington: The State of Cybersecurity]]></title>
            <link>https://blog.cloudflare.com/the-view-from-washington-the-state-of-cybersecurity/</link>
            <pubDate>Thu, 14 Sep 2017 17:08:20 GMT</pubDate>
            <description><![CDATA[ Avril Haines, Former Deputy National Security Advisor, Obama Administration ]]></description>
            <content:encoded><![CDATA[ <p><a href="https://en.wikipedia.org/wiki/Avril_Haines">Avril Haines</a>, Former Deputy National Security Advisor, Obama Administration</p><p>Moderator: Doug Kramer, General Counsel, Cloudflare</p><p>Avril began her career on the National Security Council, and went on to become the first female deputy at the CIA.</p><p>DK: How will cyber will play a role in military operations?</p><p>AH: We look at it from the perspective of “asymmetric threats”; state actors (those who have high-value assets that they can hold at risk with no threat to them). The US is more technologically advanced and relies on cyber more and more; we are as a consequence more vulnerable to cyber threats. Asymmetric threats thus hold at risk those things that are most important to us.</p><p>In the cyber realm we can’t quite define what constitutes a use of force, and saying so can be used against us. So this is an area that is crucial to continue working in; in many respects the US has the most to lose from using a framework that doesn’t work.</p><p>“The private sector is utterly critical in creating a framework that is going to work.”</p><p>We want to have widely-accepted norms and rules so that we can ask other countries to help us take an appropriate response.</p><p>The NSA spent so much time and effort training people in Cybercom that they weren’t spending time on other aspects that they needed to.</p><p>DK: Discuss the terrifying possibilities of the murkiness of these terms.</p><p>AH: It’s easy to think about cyber as a battlefield; I think of it as part of conflict; a state actor does not perform a cyber attack in a vacuum. This is part of the way we need to think about these issues: comprehensively.</p><p>This is one area where there is consistency between the Obama and Trump administrations; we cannot think about responses to cyber solely in cyber.</p><p>There is an increasing tension between political structures and the way we organize ourselves as human beings. For instance, we think our political structures are based on geographies. And yet, we are all part of virtual communities with people not in our geographic area. That creates tension between the way we are governed and the way we locate ourselves.</p><p>There are also governance challenges: it used to be that people would get their news through a local news network. If you were a politician, you knew where your constituents were getting their news. This is no longer the case.</p><p>DK: When you think about the evolution of law and legal standards: traditionally in terms of borders, which don’t exist at all online… as you move to a world without borders, the application of law becomes challenging. Where do you see the challenges around that: enforcing laws and having conversations across nation-states?</p><p>AH: I see two sets of issues. Let’s use the law of the seas example. The law of the seas has been developed across time. It’s a great example of how we dealt with a situation of many nebulous issues. The US government has an enormous interest in freedom of navigation across the world. We don’t have the right to create international laws; and yet they’re crucial. There is now an extraordinary amount of detail to it, to what we can and cannot do across the world. This is one reason I have optimism about us being able to get into these issues and think them through.</p><p>We have seen how the regulatory structures that we apply are unenforceable in the context of cyber.</p><p>DK: How are you seeing people identify their base allegiances in virtual communities?</p><p>AH: Two of the mega-trends identified are individual empowerment and diffusion of power. What people are discussing is the role of non-state actors; to my mind this is part of what we’re seeing in terms of the challenge of what it presents to government. As we see governments relying on public institutions less and less, you can see how non-state actors are increasingly having power in this area. And I don’t just mean terrorist groups, but cabals of companies, and so on. Those actors are not subject to the same rules that we subject our institutions to. Are we comfortable with those actors filling the gap of what governments use to do? This is a very interesting space.</p><p>DK: Going back to asymmetric threats: do you you have a prediction about when we might cross the line? Within the last four years there are reports that the US government may have listened into conversations of Angela Merkel. Then there are recent allegations about Russia influencing the US election. These things are becoming more tangible; the impacts more real. What do you think could be the first cyber attack that would provoke a military response? You can’t just keep poking at the virtual world and have it not eventually lead to military action, right?</p><p>AH: In trying to define what’s a use of force, we’re already taking a position. If you do through cyber what you could have done through dropping a bomb... Russia is a great example of not just using military, but also using cyber. (This might warrant an attack)</p><p>DK: What do you see in the next 5-10 years in terms of challenges?</p><p>AH: Most of the conversation around cyber and the intelligence community has to do with the amount of information it can collect. There is digital footprint that everybody makes and the near impossibility of keeping things secret. The big crisis is about keeping things secret and how to even do the job of intelligence anymore.</p><p>Cyber presents enormous challenges; it is increasingly difficult to keep things secret. On the other hand, there needs to be transparency about the framework in which the intelligence community is operating.</p><p>There is great value in being as transparent as possible about what the intelligence community does. And yet the details have to remain secret if they are going to be valuable.</p><p>There is a recent article in Wired by Mike Dempsey about this, worth reading: about the importance of the US maintaining an information edge. It’s difficult for the intelligence community to bring something new to the table.</p><p>“One of the things I thought I would miss was the daily access to the PDB; but then I started reading the New York Times…”</p><p><b>Q&amp;A:</b></p><p>Q: What will it take to do a Y2K-style investment in security infrastructure to protect old hardware that is vulnerable to security issues?</p><p>AH: We spent a lot of time working with Congress on this. I think it’s not just about investing in upgrading, but really thinking through in a comprehensive way how to institute security practices that span the US government. This is an extraordinarily difficult challenge--- it will not happen in the life of any one administration, but over years through continued and consistent investment. I don’t know whether it will happen or not.</p><p>Q: Could you talk about the classic tension between privacy and security from a government perspective and how that relates to the eroding faith that people have in government at this point?</p><p>AH: I can’t really do this answer justice.</p><ol><li><p>I wish that it hadn’t taken Snowden to start this conversation, but we should still keep having it.</p></li><li><p>I worry that the conversation often occurs in the context of a particular attack that has arisen; the discussion requires a level of risk that is not where we should be, meaning that the demand for perfection is extraordinary.</p></li></ol><p>We need to have a public conversation different from the one we’re having, that takes into account the fact that there are some values (liberty, etc.) that we value so much that we are willing to live with a little bit of risk..</p><p>All our sessions will be streamed live! If you can't make it to Summit, here's the link: <a href="http://www.cloudflare.com/summit17">cloudflare.com/summit17</a></p> ]]></content:encoded>
            <category><![CDATA[Internet Summit]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Politics]]></category>
            <guid isPermaLink="false">3Qrnjm2xxAAdpu3fNczep9</guid>
            <dc:creator>Internet Summit Team</dc:creator>
        </item>
    </channel>
</rss>