Code: And Other Laws of Cyberspace, Version 2.0There's a common belief that cyberspace cannot be regulated-that it is, in its very essence, immune from the government's (or anyone else's) control. Code, first published in 2000, argues that this belief is wrong. It is not in the nature of cyberspace to be unregulable; cyberspace has no "nature." It only has code-the software and hardware that make cyberspace what it is. That code can create a place of freedom-as the original architecture of the Net did-or a place of oppressive control. Under the influence of commerce, cyberspace is becoming a highly regulable space, where behavior is much more tightly controlled than in real space. But that's not inevitable either. We can-we must-choose what kind of cyberspace we want and what freedoms we will guarantee. These choices are all about architecture: about what kind of code will govern cyberspace, and who will control it. In this realm, code is the most significant form of law, and it is up to lawyers, policymakers, and especially citizens to decide what values that code embodies. Since its original publication, this seminal book has earned the status of a minor classic. This second edition, or Version 2.0, has been prepared through the author's wiki, a web site that allows readers to edit the text, making this the first reader-edited revision of a popular book. |
Contents
PART ONE regulability | |
FOUR architectures of control | |
FIVE regulating code | |
PART TWO regulation by code | |
SEVEN what things regulate | |
ELEVEN privacy | |
TWELVE free speech | |
THIRTEEN interlude | |
PART FOUR competing sovereigns | |
FIFTEEN competition among sovereigns | |
PART FIVE responses | |
SEVENTEEN responses | |
EIGHTEEN what declan doesnt | |
Other editions - View all
Common terms and phrases
American anonymity architecture argued argument authentication available at link behavior block chapter choice citizens Clipper Chip commerce Congress constitutional constraint context copy copyright law cost Court create culture cyberspace Dan Hunter democracy described effect Electronic Frontier Foundation email enable encryption enforcement example filtering Fourth Amendment framers free software free speech Google government’s iCraveTV idea imagine important individuals intellectual property Internet Internet Protocol Jake John Perry Barlow LambdaMOO Law Journal Law Review Lawrence Lessig layer least liberty limited machine mean MMOG modalities monitoring norms open code packets political porn problem produce protection protocol question real space realspace regime regulation require rules sense server simply social someone spam story TCP/IP there’s threat trusted systems University values virtual Yochai Benkler York