[Script Info] Title: [Events] Format: Layer, Start, End, Style, Name, MarginL, MarginR, MarginV, Effect, Text Dialogue: 0,0:00:00.00,0:00:14.99,Default,,0000,0000,0000,,{\i1}34c3 intro{\i0} Dialogue: 0,0:00:14.99,0:00:22.77,Default,,0000,0000,0000,,Herald: And now please join me in welcoming\NCaleb, for his talk BGP and the Rule of Custom Dialogue: 0,0:00:22.77,0:00:26.12,Default,,0000,0000,0000,,{\i1}Applause{\i0}\N Dialogue: 0,0:00:26.12,0:00:30.05,Default,,0000,0000,0000,,Caleb James DeLisle: Thank you. Dialogue: 0,0:00:30.05,0:00:32.79,Default,,0000,0000,0000,,Thank you and thanks for Dialogue: 0,0:00:32.79,0:00:38.87,Default,,0000,0000,0000,,coming. Tonight I'm going to speak to you\Nabout the BGP protocol but it's not going Dialogue: 0,0:00:38.87,0:00:44.47,Default,,0000,0000,0000,,to be that technical. Specifically I'm\Ngoing to concentrate on the way that BGP Dialogue: 0,0:00:44.47,0:00:53.97,Default,,0000,0000,0000,,molds human interactions. So there I'm\Naiming at making this a reasonably Dialogue: 0,0:00:53.97,0:00:58.53,Default,,0000,0000,0000,,accessible talk so if you catch me using\Nslightly incorrect terms for something Dialogue: 0,0:00:58.53,0:01:04.16,Default,,0000,0000,0000,,consider that I'm optimizing not only for\Nthe clarity of the correctness but also Dialogue: 0,0:01:04.16,0:01:10.86,Default,,0000,0000,0000,,for the widest possible audience. So\Nprotocols that are at their root systems Dialogue: 0,0:01:10.86,0:01:16.75,Default,,0000,0000,0000,,of governance. So I'm gonna propose a\Nframework to think about governance and Dialogue: 0,0:01:16.75,0:01:22.82,Default,,0000,0000,0000,,then as I describe BGP we can we will be\Nable to analyze it through the lens of Dialogue: 0,0:01:22.82,0:01:31.24,Default,,0000,0000,0000,,that framework and so as my slide shows\Nhere I find it useful to dichotomize Dialogue: 0,0:01:31.24,0:01:36.75,Default,,0000,0000,0000,,governance systems into either\Ninstitutional like democracy or network Dialogue: 0,0:01:36.75,0:01:42.89,Default,,0000,0000,0000,,like the family or like the CCC, and when\Nyou think about institutional governance Dialogue: 0,0:01:42.89,0:01:46.93,Default,,0000,0000,0000,,think about democracy, think about law,\Nthink about rights, equality, these are Dialogue: 0,0:01:46.93,0:01:52.58,Default,,0000,0000,0000,,all concepts which are protected for us by\Nan institution in this case it's the state Dialogue: 0,0:01:52.58,0:01:55.69,Default,,0000,0000,0000,,and when you think about networks think\Nmore about the family, think about Dialogue: 0,0:01:55.69,0:02:00.48,Default,,0000,0000,0000,,reputation, honor, mutual respect. These\Nare representations of the network Dialogue: 0,0:02:00.48,0:02:04.22,Default,,0000,0000,0000,,governance model, and the network\Ngovernance model turns out to be very Dialogue: 0,0:02:04.22,0:02:09.42,Default,,0000,0000,0000,,important to BGP. Now I'm gonna argue that\Nwe need both institutional and networks Dialogue: 0,0:02:09.42,0:02:19.08,Default,,0000,0000,0000,,governance and each one should be used for\Nwhat it's best for. So but first I'm going Dialogue: 0,0:02:19.08,0:02:25.21,Default,,0000,0000,0000,,to talk about where BGP came from. The\Nyear was 1989 and there were two people Dialogue: 0,0:02:25.21,0:02:30.93,Default,,0000,0000,0000,,named Kirk Lougheed and Yaakov Rekhter and\Nthey were having lunch and at the time the Dialogue: 0,0:02:30.93,0:02:37.39,Default,,0000,0000,0000,,Internet of the day, then known as NSFNET\Nwas facing impending collapse let's say. Dialogue: 0,0:02:37.39,0:02:42.62,Default,,0000,0000,0000,,The NSFNET was at the time, experiencing\Nexplosive growth and the EGP Dialogue: 0,0:02:42.62,0:02:47.68,Default,,0000,0000,0000,,routing protocol was reaching the point\Nwhere it just could no longer work. So Dialogue: 0,0:02:47.68,0:02:52.29,Default,,0000,0000,0000,,during that lunch they defined a new\Nprotocol, which they jokingly referred to Dialogue: 0,0:02:52.29,0:02:55.51,Default,,0000,0000,0000,,as a two napkin protocol, because they had\Ndrawn their Dialogue: 0,0:02:55.51,0:03:02.48,Default,,0000,0000,0000,,diagrams out on those napkins. And we have\Nhere some photographs of those napkins. Dialogue: 0,0:03:02.48,0:03:08.60,Default,,0000,0000,0000,,Something to understand about BGP at the\Ntime, and it was that at this time the so- Dialogue: 0,0:03:08.60,0:03:13.75,Default,,0000,0000,0000,,called Internet was considered kind of\Nthis weird anarchist experiment. You see Dialogue: 0,0:03:13.75,0:03:20.27,Default,,0000,0000,0000,,real networks used grown-up protocols such\Nas X.25 which among other things made sure Dialogue: 0,0:03:20.27,0:03:25.19,Default,,0000,0000,0000,,at the protocol level that when you sent a\Npiece of data it would actually reach its Dialogue: 0,0:03:25.19,0:03:31.75,Default,,0000,0000,0000,,destination. By contrast, Internet Protocol\Nwas what we call a best-effort protocol Dialogue: 0,0:03:31.75,0:03:35.93,Default,,0000,0000,0000,,meaning that sometimes a packet might\Narrive mangled or maybe it wouldn't arrive Dialogue: 0,0:03:35.93,0:03:42.47,Default,,0000,0000,0000,,at all. Computers on the Internet usually\Njust use the TCP protocol to put the Dialogue: 0,0:03:42.47,0:03:47.79,Default,,0000,0000,0000,,pieces back together and to resend the\Nbroken ones but TCP is not really part of Dialogue: 0,0:03:47.79,0:03:51.72,Default,,0000,0000,0000,,the Internet itself. It's more an\Napplication that runs over it and it's Dialogue: 0,0:03:51.72,0:03:57.44,Default,,0000,0000,0000,,telling that in this era the Internet was\Nreferred to as TCP / IP because at the Dialogue: 0,0:03:57.44,0:04:04.61,Default,,0000,0000,0000,,time it was expected that any network must\Nbe providing reliable transport. Now the Dialogue: 0,0:04:04.61,0:04:09.41,Default,,0000,0000,0000,,effect of IP's simplicity as compared to\Nother networking protocols cannot be Dialogue: 0,0:04:09.41,0:04:17.11,Default,,0000,0000,0000,,overstated and to consider a different\Nprotocol even the one used in telephone Dialogue: 0,0:04:17.11,0:04:22.38,Default,,0000,0000,0000,,networks even to this day it's so mind-\Nnumbingly complex that it actually Dialogue: 0,0:04:22.38,0:04:27.28,Default,,0000,0000,0000,,encourages the telephone companies to\Nmonopolize in order to manage the protocol Dialogue: 0,0:04:27.28,0:04:32.75,Default,,0000,0000,0000,,that they use. In fact the SONET protocol\Nthat's used in the American telephone Dialogue: 0,0:04:32.75,0:04:36.59,Default,,0000,0000,0000,,companies - there's an equivalent one here\Nin Europe - it actually requires Dialogue: 0,0:04:36.59,0:04:41.19,Default,,0000,0000,0000,,synchronized atomic clocks in the routers\Nin order to schedule the messages so that Dialogue: 0,0:04:41.19,0:04:45.58,Default,,0000,0000,0000,,there's an empty moment in each line\Nthat's just for the message to pass Dialogue: 0,0:04:45.58,0:04:52.19,Default,,0000,0000,0000,,through. And in contrast the simplicity of\NIP and the political design of BGP have Dialogue: 0,0:04:52.19,0:05:03.15,Default,,0000,0000,0000,,allowed for just about anybody to become a\Nnetwork operator. So what is BGP? BGP is Dialogue: 0,0:05:03.15,0:05:09.09,Default,,0000,0000,0000,,a protocol which every Internet router\Nuses to talk to other routers when they're Dialogue: 0,0:05:09.09,0:05:15.21,Default,,0000,0000,0000,,talking across an organizational boundary.\NSee inside an organization you control all Dialogue: 0,0:05:15.21,0:05:18.86,Default,,0000,0000,0000,,the computers so you can have them talk\Nany way they want Dialogue: 0,0:05:18.86,0:05:25.11,Default,,0000,0000,0000,,but when you talk across boundaries\Nthe lingua franca of Dialogue: 0,0:05:25.11,0:05:33.10,Default,,0000,0000,0000,,routing protocols is BGP. And BGP involves\Ntwo types of identifiers which Dialogue: 0,0:05:33.10,0:05:39.00,Default,,0000,0000,0000,,organizations need to apply for. These are\NIP addresses which most people know about Dialogue: 0,0:05:39.00,0:05:44.05,Default,,0000,0000,0000,,and there are the lesser-known autonomous\Nsystem numbers and each network provider Dialogue: 0,0:05:44.05,0:05:49.78,Default,,0000,0000,0000,,has an AS number. Both IP addresses and\NAS numbers are issued by ICANN through its Dialogue: 0,0:05:49.78,0:05:56.32,Default,,0000,0000,0000,,regional registries which manage this an\Nissuance kind of in accordance to need. Dialogue: 0,0:05:56.32,0:06:02.13,Default,,0000,0000,0000,,And an autonomous system is a network\Noperator such as an ISP or hosting Dialogue: 0,0:06:02.13,0:06:07.92,Default,,0000,0000,0000,,provider and having the AS number\Nmeans that they're able to speak as equals Dialogue: 0,0:06:07.92,0:06:13.82,Default,,0000,0000,0000,,with all the other network operators. It\Nalso means that when they interconnect Dialogue: 0,0:06:13.82,0:06:18.08,Default,,0000,0000,0000,,with another network operator the fact\Nthat they're interconnected is public and Dialogue: 0,0:06:18.08,0:06:26.03,Default,,0000,0000,0000,,that's a very important little piece of\NBGP. Now BGP is unlike the EGP routing Dialogue: 0,0:06:26.03,0:06:31.19,Default,,0000,0000,0000,,protocol before it, a mesh protocol and\Nthis fact has proven highly significant Dialogue: 0,0:06:31.19,0:06:36.84,Default,,0000,0000,0000,,because it's created what I call the\Nimperative to peer. And to understand the Dialogue: 0,0:06:36.84,0:06:42.03,Default,,0000,0000,0000,,imperative to peer, I'll give you a scenario.\NLet's say that you and I are each Dialogue: 0,0:06:42.03,0:06:47.49,Default,,0000,0000,0000,,a medium-sized network operator. So your\Ncustomers want to talk to my customers, my Dialogue: 0,0:06:47.49,0:06:52.26,Default,,0000,0000,0000,,customers want to talk to your customers\Nbut as medium-sized network operators we Dialogue: 0,0:06:52.26,0:06:56.27,Default,,0000,0000,0000,,both need to buy Internet from somebody\Nelse that's bigger than us. In the Dialogue: 0,0:06:56.27,0:07:01.65,Default,,0000,0000,0000,,industry we call this the upstream\Nprovider and if my customers are asking Dialogue: 0,0:07:01.65,0:07:06.51,Default,,0000,0000,0000,,for web sites hosted by your customers\Nnormally what's going to happen is I'm Dialogue: 0,0:07:06.51,0:07:10.14,Default,,0000,0000,0000,,going to get those requests and I'm gonna\Nhave to send them to my upstream provider, Dialogue: 0,0:07:10.14,0:07:12.59,Default,,0000,0000,0000,,they're going to give them to your\Nupstream provider who is going to give Dialogue: 0,0:07:12.59,0:07:18.38,Default,,0000,0000,0000,,them to you. But since we're both paying\Nfor those links to our upstream providers Dialogue: 0,0:07:18.38,0:07:26.06,Default,,0000,0000,0000,,there's, we're sort of paying for that\Ntraffic in a way, and now if you and I Dialogue: 0,0:07:26.06,0:07:30.42,Default,,0000,0000,0000,,happen to have routers in the same\Ndatacenter then we could just run a wire Dialogue: 0,0:07:30.42,0:07:35.95,Default,,0000,0000,0000,,across the room and then peer with one\Nanother and BGP will bypass our upstream Dialogue: 0,0:07:35.95,0:07:38.33,Default,,0000,0000,0000,,providers and route the traffic between me\Nand you and Dialogue: 0,0:07:38.33,0:07:42.58,Default,,0000,0000,0000,,you and me. And it's much more\Nefficient. Now it's important to Dialogue: 0,0:07:42.58,0:07:48.37,Default,,0000,0000,0000,,understand that peering means you and your\Ncustomers will talk directly to me and my Dialogue: 0,0:07:48.37,0:07:54.52,Default,,0000,0000,0000,,customers. What it doesn't mean is that you\Ncan use me to reach my other peers, or Dialogue: 0,0:07:54.52,0:07:59.29,Default,,0000,0000,0000,,my peers peers, or my upstream, or someone\Nelse. To have to do that, you'd have to be Dialogue: 0,0:07:59.29,0:08:05.08,Default,,0000,0000,0000,,my customer because peering has this\Nlimitation it's usually mutually Dialogue: 0,0:08:05.08,0:08:10.83,Default,,0000,0000,0000,,beneficial for two ISPs to just peer and\Nusually it happens with no money changing Dialogue: 0,0:08:10.83,0:08:16.55,Default,,0000,0000,0000,,hands and in fact it almost always happens\Nthere's not even any paper contract Dialogue: 0,0:08:16.55,0:08:23.43,Default,,0000,0000,0000,,that they just say that makes sense let's\Nrun a wire. Now in this scenario you and I Dialogue: 0,0:08:23.43,0:08:28.20,Default,,0000,0000,0000,,needed to have the upstream provider and\Nyou might wonder well who doesn't need an Dialogue: 0,0:08:28.20,0:08:33.26,Default,,0000,0000,0000,,upstream provider there must be someone at\Nthe top where is the core. Well the core Dialogue: 0,0:08:33.26,0:08:46.71,Default,,0000,0000,0000,,is a series of what we call Tier 1\Nproviders. And in this picture we have Dialogue: 0,0:08:46.71,0:08:51.89,Default,,0000,0000,0000,,white lines which represent the peering\Nagreements and the red lines represent the Dialogue: 0,0:08:51.89,0:08:57.17,Default,,0000,0000,0000,,customer agreements. The Tier 1's are the\Npeople up at the top and they can reach Dialogue: 0,0:08:57.17,0:09:03.41,Default,,0000,0000,0000,,anywhere on the Internet using a peering\Nagreement or a customer. They don't need Dialogue: 0,0:09:03.41,0:09:10.23,Default,,0000,0000,0000,,to buy Internet from anyone. However they\Ndo need to pay the upkeep on their massive Dialogue: 0,0:09:10.23,0:09:14.51,Default,,0000,0000,0000,,fiber-optic networks which give them the\Nglobal reach to get these peering Dialogue: 0,0:09:14.51,0:09:17.89,Default,,0000,0000,0000,,agreements and to get these customers\Nwhich makes them a Tier 1 in the first Dialogue: 0,0:09:17.89,0:09:23.64,Default,,0000,0000,0000,,place. And you can also see some\Ninteresting things in the case you can Dialogue: 0,0:09:23.64,0:09:29.51,Default,,0000,0000,0000,,have you can be a customer and also a peer\Nand you can also have multiple upstream Dialogue: 0,0:09:29.51,0:09:38.06,Default,,0000,0000,0000,,providers. But with Tier 1 there's a bit\Nof politics, see Tier 1's are hesitant to Dialogue: 0,0:09:38.06,0:09:43.00,Default,,0000,0000,0000,,peer with smaller operators if there is a\Nchance that if they refuse to peer the Dialogue: 0,0:09:43.00,0:09:48.21,Default,,0000,0000,0000,,smaller one might alternatively become a\Ncustomer and so it's a bit like marriages Dialogue: 0,0:09:48.21,0:09:53.96,Default,,0000,0000,0000,,between wealthy families because peering\Nbetween Tier 1's it's a complex process and Dialogue: 0,0:09:53.96,0:09:59.48,Default,,0000,0000,0000,,they're each striving to ensure reciprocity\Nof value. Now small networks Dialogue: 0,0:09:59.48,0:10:03.03,Default,,0000,0000,0000,,on the other hand they're not so concerned\Nabout this and so they're ready Dialogue: 0,0:10:03.03,0:10:07.72,Default,,0000,0000,0000,,to peer with each other quite liberally\Nand this has created a situation known in Dialogue: 0,0:10:07.72,0:10:11.94,Default,,0000,0000,0000,,the industry as doughnut peering where in\Nthe Tier 1's are actually increasingly Dialogue: 0,0:10:11.94,0:10:18.20,Default,,0000,0000,0000,,being routed around and it's worthy of\Nreflection the fact that while SONET with Dialogue: 0,0:10:18.20,0:10:24.46,Default,,0000,0000,0000,,a synchronized atomic clocks has made an\Nincentive to monopoly. BGP with it's Dialogue: 0,0:10:24.46,0:10:31.52,Default,,0000,0000,0000,,imperative to peer has created a situation\Nwhere monopoly is discouraged. However Dialogue: 0,0:10:31.52,0:10:37.73,Default,,0000,0000,0000,,this system also has means of preventing\Nbad behavior on the Internet which it Dialogue: 0,0:10:37.73,0:10:42.90,Default,,0000,0000,0000,,works astonishingly well while at the same\Ntime preserving almost absolute free Dialogue: 0,0:10:42.90,0:10:51.76,Default,,0000,0000,0000,,expression. So this is a chart of the\Npercentage of all email that is spam and Dialogue: 0,0:10:51.76,0:10:57.48,Default,,0000,0000,0000,,to understand why this chart is remarkable\Nconsider what a bad protocol email Dialogue: 0,0:10:57.48,0:11:03.66,Default,,0000,0000,0000,,is. Email is basically a push protocol\Nwith an unlimited free speech. So all you Dialogue: 0,0:11:03.66,0:11:07.98,Default,,0000,0000,0000,,got to do is get on the Internet, fire up a\Nmail server and you can just send spam to Dialogue: 0,0:11:07.98,0:11:20.75,Default,,0000,0000,0000,,anyone. It's magic. So really this\Npercentage should be like over 99% but Dialogue: 0,0:11:20.75,0:11:29.06,Default,,0000,0000,0000,,it's not. Well email is an old and heavily\Nused protocol and the network operators Dialogue: 0,0:11:29.06,0:11:33.96,Default,,0000,0000,0000,,have made it kind of a special case. Email\Nis actually one of the few protocols where Dialogue: 0,0:11:33.96,0:11:38.64,Default,,0000,0000,0000,,messing with it can get you kicked off the\Nwhole Internet even if you have your own Dialogue: 0,0:11:38.64,0:11:43.19,Default,,0000,0000,0000,,network AS number even if you are a\Nnetwork operator with peers and everything Dialogue: 0,0:11:43.19,0:11:51.80,Default,,0000,0000,0000,,you can still get chucked off the Internet\Nif you mess around with mail. So I'm gonna Dialogue: 0,0:11:51.80,0:11:56.81,Default,,0000,0000,0000,,try to explain how this works and I'm\Ngoing to do it by trying to think of Dialogue: 0,0:11:56.81,0:12:07.81,Default,,0000,0000,0000,,different types of actors that are, that\Nexist in the Internet service sphere. So Dialogue: 0,0:12:07.81,0:12:14.28,Default,,0000,0000,0000,,there is a lot of actors of course but\NI've made these four main categories which Dialogue: 0,0:12:14.28,0:12:19.23,Default,,0000,0000,0000,,I think helps to explain the situation.\NAnd they're the customer, the provider, Dialogue: 0,0:12:19.23,0:12:25.13,Default,,0000,0000,0000,,the network operator and the civil society\Norganization. So the customer is someone Dialogue: 0,0:12:25.13,0:12:30.29,Default,,0000,0000,0000,,like me. I take an IP address on loan from\Nmy cable provider at home and I take one Dialogue: 0,0:12:30.29,0:12:36.37,Default,,0000,0000,0000,,from my web hosting provider. It's not my\NIP address and it's not assigned to me. It Dialogue: 0,0:12:36.37,0:12:39.07,Default,,0000,0000,0000,,doesn't have my name on it and they can\Ntake Dialogue: 0,0:12:39.07,0:12:45.49,Default,,0000,0000,0000,,it back when I stop working with them.\NBut that means I have relative anonymity Dialogue: 0,0:12:45.49,0:12:49.94,Default,,0000,0000,0000,,because I'm not out there looking for\Npeers I have my provider they know who I Dialogue: 0,0:12:49.94,0:12:55.78,Default,,0000,0000,0000,,am, they know me, I know them, nobody else\Nneeds to know who that IP address is Dialogue: 0,0:12:55.78,0:13:01.04,Default,,0000,0000,0000,,associated with. However my provider can\Ntrivially turn off my access to the Dialogue: 0,0:13:01.04,0:13:05.95,Default,,0000,0000,0000,,Internet but by the same token I can\Nusually choose which provider to patronize Dialogue: 0,0:13:05.95,0:13:11.98,Default,,0000,0000,0000,,as well modulo the monopolies in the cable\Ncompanies. Providers on the other hand Dialogue: 0,0:13:11.98,0:13:15.45,Default,,0000,0000,0000,,they are not anonymous they have to\Nmaintain relationships with network Dialogue: 0,0:13:15.45,0:13:21.51,Default,,0000,0000,0000,,operators, they have to seek customers.\NThey're out in the public. Providers also Dialogue: 0,0:13:21.51,0:13:27.08,Default,,0000,0000,0000,,have an incentive to keep customers so\Nthey can't be obviously scammy and they Dialogue: 0,0:13:27.08,0:13:31.75,Default,,0000,0000,0000,,shouldn't, they can't provide bad service.\NThey probably shouldn't be scummy Dialogue: 0,0:13:31.75,0:13:36.01,Default,,0000,0000,0000,,and they can't provide bad service. They\Nalso have an imperative to stay friendly Dialogue: 0,0:13:36.01,0:13:40.54,Default,,0000,0000,0000,,with at least one network operator. If all\Nthe network operators just hate them then Dialogue: 0,0:13:40.54,0:13:46.83,Default,,0000,0000,0000,,they can't find Internet. Providers have\Ntheir own IP addresses they're assigned to Dialogue: 0,0:13:46.83,0:13:51.55,Default,,0000,0000,0000,,them from the Internet registries and so\Nthey can connect with multiple network Dialogue: 0,0:13:51.55,0:13:55.93,Default,,0000,0000,0000,,operators including even having peers\Nalthough in practice they often keep their Dialogue: 0,0:13:55.93,0:14:03.03,Default,,0000,0000,0000,,networks fairly simple. But because of the\Nway BGP exchanges information, their peers Dialogue: 0,0:14:03.03,0:14:08.24,Default,,0000,0000,0000,,and their providers are publicly known,\Nwhereas me the little customer borrowing Dialogue: 0,0:14:08.24,0:14:14.54,Default,,0000,0000,0000,,an IP address I'm fairly opaque. Now\Nnetwork operators they're somewhat like Dialogue: 0,0:14:14.54,0:14:19.92,Default,,0000,0000,0000,,providers, they provide a service but in\Ngeneral they make their business around Dialogue: 0,0:14:19.92,0:14:23.80,Default,,0000,0000,0000,,providing raw Internet access to smaller\Nproviders and that's why I've Dialogue: 0,0:14:23.80,0:14:29.16,Default,,0000,0000,0000,,differentiated them. Network operators are\Nvery much not anonymous they have to have Dialogue: 0,0:14:29.16,0:14:34.80,Default,,0000,0000,0000,,large numbers of peering agreements and\Ncustomers which again all of these Dialogue: 0,0:14:34.80,0:14:40.33,Default,,0000,0000,0000,,connections are transparent, because of the\Nway BGP works and they're strongly Dialogue: 0,0:14:40.33,0:14:46.27,Default,,0000,0000,0000,,pressured by the imperative to peer. If\Nthey're not able to find peers then all Dialogue: 0,0:14:46.27,0:14:49.22,Default,,0000,0000,0000,,the network traffic will have to be paid\Nfor. It can even squeeze them out of the Dialogue: 0,0:14:49.22,0:14:53.14,Default,,0000,0000,0000,,market. They do have som\Npowers though they can Dialogue: 0,0:14:53.14,0:14:57.17,Default,,0000,0000,0000,,refuse to peer with a network operator and\Nthey can even disconnect a customer which Dialogue: 0,0:14:57.17,0:15:01.93,Default,,0000,0000,0000,,they might do to maintain their\Nreputation. Last group here is civil Dialogue: 0,0:15:01.93,0:15:07.06,Default,,0000,0000,0000,,society these are organizations like Team\NCymru and Spamhaus. They dedicate their Dialogue: 0,0:15:07.06,0:15:10.83,Default,,0000,0000,0000,,time to shedding light on the bad guys of\Nthe Internet. They're not anonymous as Dialogue: 0,0:15:10.83,0:15:15.58,Default,,0000,0000,0000,,organisations although their members can\Nbe hidden and they also maintain lists of Dialogue: 0,0:15:15.58,0:15:20.06,Default,,0000,0000,0000,,IP addresses and AS numbers which are\Neither known to be operated by spam Dialogue: 0,0:15:20.06,0:15:27.02,Default,,0000,0000,0000,,organizations or which are just unused and\Nshouldn't be existing. Internet civil Dialogue: 0,0:15:27.02,0:15:31.28,Default,,0000,0000,0000,,society doesn't have any direct power but\Ntheir power comes from their reputation Dialogue: 0,0:15:31.28,0:15:36.54,Default,,0000,0000,0000,,for providing valid and useful data.\NThey're also able to do their job because Dialogue: 0,0:15:36.54,0:15:42.54,Default,,0000,0000,0000,,of the transparency of providers and\Nnetwork operators which is built into BGP. Dialogue: 0,0:15:42.54,0:15:46.38,Default,,0000,0000,0000,,I'm going to tell you a story about two\Nproviders. One is called McColo and the Dialogue: 0,0:15:46.38,0:15:51.12,Default,,0000,0000,0000,,other is called PRQ, both of these\Norganizations were founded in 2004 and Dialogue: 0,0:15:51.12,0:15:55.41,Default,,0000,0000,0000,,both of them have been subject to certain\Ncontroversy but tellingly one of them Dialogue: 0,0:15:55.41,0:16:03.28,Default,,0000,0000,0000,,still remains with us and the other one is\Nlong gone. So this is a splash page of Dialogue: 0,0:16:03.28,0:16:08.31,Default,,0000,0000,0000,,McColo back in 2008 before it went dark.\NMcColo was founded by a 19 year old Dialogue: 0,0:16:08.31,0:16:13.38,Default,,0000,0000,0000,,student named Nicola McColo and it thrived\Nfor four years before being taken down. Dialogue: 0,0:16:13.38,0:16:16.89,Default,,0000,0000,0000,,McColo provided what's known as\Nbulletproof hosting. That means hosting Dialogue: 0,0:16:16.89,0:16:21.65,Default,,0000,0000,0000,,where the provider will keep your server\Nonline no matter what you do with it. Dialogue: 0,0:16:21.65,0:16:25.95,Default,,0000,0000,0000,,Bulletproof hosting providers choose not\Nto cooperate with civil society or even Dialogue: 0,0:16:25.95,0:16:32.24,Default,,0000,0000,0000,,law enforcement unless they're forced to.\NAnd in November of 2008 the Washington Dialogue: 0,0:16:32.24,0:16:37.41,Default,,0000,0000,0000,,Post gathered some damning evidence that\NMcColo was a hosting provider mostly Dialogue: 0,0:16:37.41,0:16:42.83,Default,,0000,0000,0000,,interested in providing service for\Nspammers. What's interesting is that Dialogue: 0,0:16:42.83,0:16:46.78,Default,,0000,0000,0000,,rather than send this evidence to the\Npolice they sent it to McColo's network Dialogue: 0,0:16:46.78,0:16:51.30,Default,,0000,0000,0000,,operators. Like many providers McColo\Nbought Internet access from two major Dialogue: 0,0:16:51.30,0:16:54.45,Default,,0000,0000,0000,,network operators. In this case it was a\NHurricane Electric and Global Dialogue: 0,0:16:54.45,0:16:58.63,Default,,0000,0000,0000,,Crossing. When Hurricane and Global\NCrossing were given this information from Dialogue: 0,0:16:58.63,0:17:03.05,Default,,0000,0000,0000,,The Washington Post they voluntarily chose\Nto abruptly ceased doing business with Dialogue: 0,0:17:03.05,0:17:08.19,Default,,0000,0000,0000,,McColo and the provider was caught off\Nguard and it and all of its customers went Dialogue: 0,0:17:08.19,0:17:18.68,Default,,0000,0000,0000,,offline. Here is the global volume of spam\Nwhich dropped to that day by as much as Dialogue: 0,0:17:18.68,0:17:24.04,Default,,0000,0000,0000,,75%. Needless to say no other network\Nprovider was beginning or ready to begin Dialogue: 0,0:17:24.04,0:17:32.64,Default,,0000,0000,0000,,selling service to McColo and their\Nbusiness crumbled. Now PRQ is in some ways Dialogue: 0,0:17:32.64,0:17:40.11,Default,,0000,0000,0000,,similar to McColo {\i1}heeey{\i0} and in some ways\Nthey're quite different. PRQ was founded Dialogue: 0,0:17:40.11,0:17:44.78,Default,,0000,0000,0000,,by two Swedish guys known in BitTorrent\Ncircles as anakata and Tiamo and they Dialogue: 0,0:17:44.78,0:17:49.28,Default,,0000,0000,0000,,provide what I call last resort hosting.\NThey've hosted highly controversial Dialogue: 0,0:17:49.28,0:17:53.85,Default,,0000,0000,0000,,websites such as WikiLeaks but they're\Nprobably best known for hosting The Pirate Dialogue: 0,0:17:53.85,0:17:58.75,Default,,0000,0000,0000,,Bay. The Pirate Bay stands out is probably\None of the most famous websites to Dialogue: 0,0:17:58.75,0:18:06.18,Default,,0000,0000,0000,,publicly flaunt copyright. Going to the\Nextent of actually publishing abuse Dialogue: 0,0:18:06.18,0:18:17.78,Default,,0000,0000,0000,,complaints along with their sarcastic and\Nhumiliating responses. This is something Dialogue: 0,0:18:17.78,0:18:22.14,Default,,0000,0000,0000,,that the copyright industry had never seen\Nbefore. High-power lawyers are just not Dialogue: 0,0:18:22.14,0:18:28.53,Default,,0000,0000,0000,,accustomed to getting replies signed go\Nfuck yourself. So all four of the founders Dialogue: 0,0:18:28.53,0:18:31.91,Default,,0000,0000,0000,,have spent some time in prison and the\Nsite's data centers have been raided Dialogue: 0,0:18:31.91,0:18:36.52,Default,,0000,0000,0000,,multiple times and supposedly Hollywood\Neven use threats of trade sanctions Dialogue: 0,0:18:36.52,0:18:43.03,Default,,0000,0000,0000,,against Sweden to force them to shut this\Nthing down. But we find that as McColo has Dialogue: 0,0:18:43.03,0:18:48.44,Default,,0000,0000,0000,,drifted into historical obscurity, The\NPirate Bay is still alive and has even Dialogue: 0,0:18:48.44,0:18:54.44,Default,,0000,0000,0000,,become something of a cultural\Ninstitution. And we also find that unlike Dialogue: 0,0:18:54.44,0:18:59.34,Default,,0000,0000,0000,,McColo, PRQ and The Pirate Bay have never\Nhad any problem with their network Dialogue: 0,0:18:59.34,0:19:05.29,Default,,0000,0000,0000,,operators. So one of the fundamental\Ntenets of the Internet is that network Dialogue: 0,0:19:05.29,0:19:10.67,Default,,0000,0000,0000,,operators are morally but not legally\Nresponsible for the activities of their Dialogue: 0,0:19:10.67,0:19:15.56,Default,,0000,0000,0000,,customers and peers. So they may choose\Nwho they do business with and they will Dialogue: 0,0:19:15.56,0:19:24.56,Default,,0000,0000,0000,,not be held to legal account for these\Ndecisions. What are the lessons that we Dialogue: 0,0:19:24.56,0:19:28.22,Default,,0000,0000,0000,,can take away from this? \NRecently there's been a lot of Dialogue: 0,0:19:28.22,0:19:33.47,Default,,0000,0000,0000,,work done on federated social networking\Nprotocols. I'm sure some of you will take Dialogue: 0,0:19:33.47,0:19:38.86,Default,,0000,0000,0000,,part in this development but the vast\Nmajority of you will be evaluating them to Dialogue: 0,0:19:38.86,0:19:43.90,Default,,0000,0000,0000,,make decisions about which technology to\Nadopt and I urge you to give some thought Dialogue: 0,0:19:43.90,0:19:48.88,Default,,0000,0000,0000,,toward the political identities of the\Nprotocols which you make or which you Dialogue: 0,0:19:48.88,0:19:55.85,Default,,0000,0000,0000,,choose to make your own. Like many things\Nsystems of communication are defined Dialogue: 0,0:19:55.85,0:20:02.31,Default,,0000,0000,0000,,largely by what they reject, whether that\Nbe packets larger than 1500 bytes or Nazi Dialogue: 0,0:20:02.31,0:20:08.61,Default,,0000,0000,0000,,propaganda. And in a protocol I identify\Nthree main ways that these rules can be Dialogue: 0,0:20:08.61,0:20:13.98,Default,,0000,0000,0000,,defined. The first is what we hard code\Ninto the software source code. Some Dialogue: 0,0:20:13.98,0:20:18.26,Default,,0000,0000,0000,,examples are message formats and\Npermission systems but hardcoded rules Dialogue: 0,0:20:18.26,0:20:23.95,Default,,0000,0000,0000,,can be extended further with cryptography\Nand especially with block chains. Hard Dialogue: 0,0:20:23.95,0:20:29.06,Default,,0000,0000,0000,,coded rules are a perfect example of\Ninstitutional governance they can be very Dialogue: 0,0:20:29.06,0:20:34.33,Default,,0000,0000,0000,,fair. They are very fair because code\Napplies the rules equally to everyone and Dialogue: 0,0:20:34.33,0:20:38.82,Default,,0000,0000,0000,,for things which we consider a basic human\Nright such as private communications and Dialogue: 0,0:20:38.82,0:20:43.15,Default,,0000,0000,0000,,things which are easily quantifiable in\Nsoftware, hardcoding can be the best Dialogue: 0,0:20:43.15,0:20:49.89,Default,,0000,0000,0000,,solution. However hard rules do have a\Ndownside, Ethereum a cryptocurrency based Dialogue: 0,0:20:49.89,0:20:54.12,Default,,0000,0000,0000,,heavily on the libertarian philosophy of\Nfreedom of contract found itself in a bit Dialogue: 0,0:20:54.12,0:20:59.05,Default,,0000,0000,0000,,of a quandary when a bug was discovered in\None of the very significant contract Dialogue: 0,0:20:59.05,0:21:03.33,Default,,0000,0000,0000,,allowing for all the money to be stolen\Nout of that contract. For those who don't Dialogue: 0,0:21:03.33,0:21:07.95,Default,,0000,0000,0000,,follow the topic Ethereum was hard forked\Nin order to stop the errant contract and Dialogue: 0,0:21:07.95,0:21:14.38,Default,,0000,0000,0000,,everybody had to update and while the fork\Nitself protected the participants in the Dialogue: 0,0:21:14.38,0:21:21.23,Default,,0000,0000,0000,,contract it struck a serious blow to the\Nfundamental philosophy of Ethereum and it Dialogue: 0,0:21:21.23,0:21:25.62,Default,,0000,0000,0000,,serves as a warning that we have a\Ndownside to hardcoding. The second source Dialogue: 0,0:21:25.62,0:21:30.23,Default,,0000,0000,0000,,is of course the central authority. The\NInternet uses ICANN as a central authority Dialogue: 0,0:21:30.23,0:21:35.65,Default,,0000,0000,0000,,to manage allocation of domain names, IP\Naddresses and autonomous system numbers. Dialogue: 0,0:21:35.65,0:21:38.53,Default,,0000,0000,0000,,The central authority\Nis kind of a poster child of institutional Dialogue: 0,0:21:38.53,0:21:43.24,Default,,0000,0000,0000,,governance. Like hardcoded rules, rule by\Ncentral authority also tends to be Dialogue: 0,0:21:43.24,0:21:49.75,Default,,0000,0000,0000,,egalitarian. Moreover a central authority\Nis actually capable of equity because it Dialogue: 0,0:21:49.75,0:21:54.06,Default,,0000,0000,0000,,can comprehend people's different\Nsituations and adapt to them. Something Dialogue: 0,0:21:54.06,0:22:00.22,Default,,0000,0000,0000,,that a hardcoded rule cannot do but a\Ncentral authority like a hardcoded rule Dialogue: 0,0:22:00.22,0:22:06.01,Default,,0000,0000,0000,,is prone to coldness and bureaucracy and\Nmoreover it's quite difficult to create Dialogue: 0,0:22:06.01,0:22:11.17,Default,,0000,0000,0000,,central authorities which do not give\Ncertain individuals unaccountable power Dialogue: 0,0:22:11.17,0:22:16.73,Default,,0000,0000,0000,,over others. The third source of rules or\Nin this case customs where this talk gets Dialogue: 0,0:22:16.73,0:22:22.80,Default,,0000,0000,0000,,its name is from the network and this is\Nhow the network operators and how BGP Dialogue: 0,0:22:22.80,0:22:26.89,Default,,0000,0000,0000,,mostly managed to keep email spam and\Nother bad things off the Internet. The Dialogue: 0,0:22:26.89,0:22:31.58,Default,,0000,0000,0000,,network is by far the most humane form of\Ngovernance. Social norms are passed along Dialogue: 0,0:22:31.58,0:22:36.34,Default,,0000,0000,0000,,from friend to friend rather than rules\Nbeing forced down upon people by central Dialogue: 0,0:22:36.34,0:22:41.35,Default,,0000,0000,0000,,authority or source code. And we see\Nnetwork-like systems in families ancient Dialogue: 0,0:22:41.35,0:22:46.67,Default,,0000,0000,0000,,tribal societies as well as royalty and\Nelite in kingdoms and of course online. Dialogue: 0,0:22:46.67,0:22:53.99,Default,,0000,0000,0000,,However in electronic networks we tend to\Nassociate it with, we get to choose who Dialogue: 0,0:22:53.99,0:23:00.06,Default,,0000,0000,0000,,we associate with from any connected\Nperson in the world and but networks also Dialogue: 0,0:23:00.06,0:23:04.83,Default,,0000,0000,0000,,have a downside they're not egalitarian in\Nany way. Those central in the network are Dialogue: 0,0:23:04.83,0:23:10.14,Default,,0000,0000,0000,,simply more powerful than those on the\Nedges. In the feudal system law was often Dialogue: 0,0:23:10.14,0:23:14.41,Default,,0000,0000,0000,,applied differently to a person based on\Nhow they were dressed or what family they Dialogue: 0,0:23:14.41,0:23:20.61,Default,,0000,0000,0000,,were from. And the origin of the term rule\Nof law it was initially described as a Dialogue: 0,0:23:20.61,0:23:27.34,Default,,0000,0000,0000,,better alternative to rule of the king or\Nrule of man. We have the law we Dialogue: 0,0:23:27.34,0:23:33.38,Default,,0000,0000,0000,,have the state because people demanded\Nthem as in this case the inequity of the Dialogue: 0,0:23:33.38,0:23:38.26,Default,,0000,0000,0000,,network rule proved unacceptable. But\Nthere's an important difference between Dialogue: 0,0:23:38.26,0:23:45.58,Default,,0000,0000,0000,,BGP's rule of custom and the patently\Nunjust feudal system. BGP is transparent. Dialogue: 0,0:23:45.58,0:23:49.63,Default,,0000,0000,0000,,We know which network operators are\Ninterconnected with whom and we know who Dialogue: 0,0:23:49.63,0:23:55.08,Default,,0000,0000,0000,,is protecting the bad actors\Nand in every case we find dystopia Dialogue: 0,0:23:55.08,0:23:59.55,Default,,0000,0000,0000,,whenever there's power without\Ntransparency either in opaque proprietary Dialogue: 0,0:23:59.55,0:24:05.24,Default,,0000,0000,0000,,code, unaccountable central authorities or\Nin networks which form mafias, secret Dialogue: 0,0:24:05.24,0:24:11.35,Default,,0000,0000,0000,,societies in the feudal system. And I\Nthink the key message from BGP has to be Dialogue: 0,0:24:11.35,0:24:17.93,Default,,0000,0000,0000,,that whether in central authorities or in\Nnetworks. Power and privacy do not mix. Dialogue: 0,0:24:17.93,0:24:23.82,Default,,0000,0000,0000,,With any measure of power there must be\Nequal transparency and accountability. Dialogue: 0,0:24:23.82,0:24:29.96,Default,,0000,0000,0000,,{\i1}Applause{\i0} Dialogue: 0,0:24:29.96,0:24:36.15,Default,,0000,0000,0000,,So in closing. I hope you go out there and\Nmake protocols and make systems which far Dialogue: 0,0:24:36.15,0:24:43.86,Default,,0000,0000,0000,,surpass what we have today and to do that\NI suggest looking at the past and what Dialogue: 0,0:24:43.86,0:24:49.27,Default,,0000,0000,0000,,protocols have been highly successful and\Ntry to identify why they worked. Also look Dialogue: 0,0:24:49.27,0:24:56.62,Default,,0000,0000,0000,,at the ones that didn't work. Look at the\Nthings that died in a hell storm of spam Dialogue: 0,0:24:56.62,0:25:01.64,Default,,0000,0000,0000,,and try to keep it simple. I developed\Nsome software before and something I Dialogue: 0,0:25:01.64,0:25:06.75,Default,,0000,0000,0000,,learned the hard way is that complexity\Nbecomes the enemy of adoption so maybe Dialogue: 0,0:25:06.75,0:25:11.41,Default,,0000,0000,0000,,it's a good idea we all write our\Nprotocols on napkins. Thank you. Dialogue: 0,0:25:11.41,0:25:21.92,Default,,0000,0000,0000,,{\i1}Applause{\i0}\N Dialogue: 0,0:25:21.92,0:25:24.26,Default,,0000,0000,0000,,Herald: Thank you Caleb. \NWe now have five minutes Dialogue: 0,0:25:24.26,0:25:28.33,Default,,0000,0000,0000,,for questions you know the drill. Please\Nline up at the microphones there's four Dialogue: 0,0:25:28.33,0:25:32.43,Default,,0000,0000,0000,,microphones two in the middle, one there,\None there. please don't leave the room Dialogue: 0,0:25:32.43,0:25:36.22,Default,,0000,0000,0000,,until the talk is over. If you stood up\Nyou can leave but the rest please Dialogue: 0,0:25:36.22,0:25:39.36,Default,,0000,0000,0000,,stay seated you can spare five minutes\Nit's a lot of noise that people keep Dialogue: 0,0:25:39.36,0:25:43.49,Default,,0000,0000,0000,,leaving during the Q&A. \NMicrophone number one please.\N Dialogue: 0,0:25:43.49,0:25:49.94,Default,,0000,0000,0000,,Question: Hello I'm from Sweden. I\Nreally like to talk to have a overview of Dialogue: 0,0:25:49.94,0:25:56.57,Default,,0000,0000,0000,,this I think it was mostly correct. I\Nwould say that I'm working with both the Dialogue: 0,0:25:56.57,0:26:05.87,Default,,0000,0000,0000,,BGP and DNS and those association with\NICANN but I think you put them all on the Dialogue: 0,0:26:05.87,0:26:10.26,Default,,0000,0000,0000,,you give them a bit too much power they\Nare not that powerful unless you describe Dialogue: 0,0:26:10.26,0:26:16.18,Default,,0000,0000,0000,,them. They don't decide everything about\NDNS and everything. They're running the Dialogue: 0,0:26:16.18,0:26:21.08,Default,,0000,0000,0000,,IANA contract for these domain names and\Nnumbers and stuff like that. On behalf of Dialogue: 0,0:26:21.08,0:26:27.24,Default,,0000,0000,0000,,the community like the IETF and other\Nmulti-stakeholder organizations. So they Dialogue: 0,0:26:27.24,0:26:33.04,Default,,0000,0000,0000,,only have the power over the new top-level\Ndomains they don't have the power over the Dialogue: 0,0:26:33.04,0:26:41.10,Default,,0000,0000,0000,,common domain or .se domain in Sweden or\N.ch in Switzerland so if .se or .ch would Dialogue: 0,0:26:41.10,0:26:46.10,Default,,0000,0000,0000,,like to have The Pirate Bay, ICANN has\Nnothing to do with that. Dialogue: 0,0:26:46.10,0:26:47.73,Default,,0000,0000,0000,,Herald: Could you get to the question please? Dialogue: 0,0:26:47.73,0:26:50.59,Default,,0000,0000,0000,,Question: No it's not a question. \NMore to show that ICANN is Dialogue: 0,0:26:50.59,0:26:55.68,Default,,0000,0000,0000,,not the king.\NHerald: There are other people queueing please. Dialogue: 0,0:26:55.68,0:27:00.20,Default,,0000,0000,0000,,Herald: Microphone number two please.\NQuestion 2: Thank you. Great great Dialogue: 0,0:27:00.20,0:27:09.38,Default,,0000,0000,0000,,lecture. So what actually is the reason\Nwhy some illegal activities are tolerated Dialogue: 0,0:27:09.38,0:27:16.84,Default,,0000,0000,0000,,by ISPs and some like child abuse is not?\NSpeaker: That's a great question. I Dialogue: 0,0:27:16.84,0:27:27.05,Default,,0000,0000,0000,,think that what it comes down to is what\Nis socially acceptable. So when you have Dialogue: 0,0:27:27.05,0:27:31.40,Default,,0000,0000,0000,,why does some activity, why does some\Nillegal activity like smoking a joint Dialogue: 0,0:27:31.40,0:27:38.08,Default,,0000,0000,0000,,outside, not cause you to have the police and\Nother activity like murdering somebody Dialogue: 0,0:27:38.08,0:27:42.54,Default,,0000,0000,0000,,would. It's all about what is socially\Nacceptable to the people around you and Dialogue: 0,0:27:42.54,0:27:46.99,Default,,0000,0000,0000,,what is socially acceptable to the people\Naround them and in the case of ISPs Dialogue: 0,0:27:46.99,0:27:50.60,Default,,0000,0000,0000,,somebody is peering with the the people\Nthat serve The Pirate Bay somebody else Dialogue: 0,0:27:50.60,0:27:55.04,Default,,0000,0000,0000,,looks at that and says it's not, I don't\Nfeel that that's a problem somebody else Dialogue: 0,0:27:55.04,0:27:58.92,Default,,0000,0000,0000,,looks at them and says I don't feel but\Npeople who think that is a problem and so Dialogue: 0,0:27:58.92,0:28:02.12,Default,,0000,0000,0000,,it's okay. I hope this answers your\Nquestion. Dialogue: 0,0:28:02.12,0:28:07.18,Default,,0000,0000,0000,,Herald: Do we have an Internet question?\NNo. Okay microphone number one please. Dialogue: 0,0:28:07.18,0:28:13.59,Default,,0000,0000,0000,,Question 3: Why do you think network\Noperators being morally but not literally Dialogue: 0,0:28:13.59,0:28:18.50,Default,,0000,0000,0000,,responsible for what content they accept\Non the network worked so well for McColo Dialogue: 0,0:28:18.50,0:28:22.69,Default,,0000,0000,0000,,and PRQ and doesn't work at all for social\Nmedia? Dialogue: 0,0:28:22.69,0:28:27.37,Default,,0000,0000,0000,,Speaker: Oh great great question. Why it\Ndoesn't work. If I understand you Dialogue: 0,0:28:27.37,0:28:35.34,Default,,0000,0000,0000,,properly? Why Twitter is still a crap\Nhole. It is. Well here's the thing Twitter Dialogue: 0,0:28:35.34,0:28:42.13,Default,,0000,0000,0000,,has it's - I am probably getting sued\N- it's a, it's basically an Dialogue: 0,0:28:42.13,0:28:46.23,Default,,0000,0000,0000,,institutional governance system. They said\Nlike we're in charge everybody is flat on Dialogue: 0,0:28:46.23,0:28:53.05,Default,,0000,0000,0000,,here so on top of a network governance\Nsystem they built in a institutional Dialogue: 0,0:28:53.05,0:28:57.21,Default,,0000,0000,0000,,governance system and the institutional\Ngovernance system it's like a high school Dialogue: 0,0:28:57.21,0:29:04.94,Default,,0000,0000,0000,,it's just it's terrible. So I should use\Nthis opportunity to plug Mastodon because Dialogue: 0,0:29:04.94,0:29:10.48,Default,,0000,0000,0000,,Mastodon is an example of a system which\Nis federated and looks well it doesn't Dialogue: 0,0:29:10.48,0:29:15.78,Default,,0000,0000,0000,,look exactly like BGP but I think it will\Nin five years. Dialogue: 0,0:29:15.78,0:29:22.52,Default,,0000,0000,0000,,{\i1}Applause{\i0} Dialogue: 0,0:29:22.52,0:29:24.71,Default,,0000,0000,0000,,Herald: One hopefully brief question from\Ntwo please. Dialogue: 0,0:29:24.71,0:29:29.33,Default,,0000,0000,0000,,Question 4: Yes. Hi. Thank you very much\Nfor talking about BGP. As someone who Dialogue: 0,0:29:29.33,0:29:33.10,Default,,0000,0000,0000,,knows a lot about BGP and I was kind of\Nwondering if you could help answer a Dialogue: 0,0:29:33.10,0:29:38.25,Default,,0000,0000,0000,,question and that's that I kind of view\NBGP is kind of like a static protocol and Dialogue: 0,0:29:38.25,0:29:42.19,Default,,0000,0000,0000,,it was stuck it was written on two napkins\Nand it's been a little bit expanded beyond Dialogue: 0,0:29:42.19,0:29:48.42,Default,,0000,0000,0000,,that. My concern is like with, with rogue\Ncountries or someone else harnessing IP Dialogue: 0,0:29:48.42,0:29:53.88,Default,,0000,0000,0000,,blocks and like sync holding traffic for\Ngoogle.com or facebook.com which has Dialogue: 0,0:29:53.88,0:29:57.58,Default,,0000,0000,0000,,happened several times in the last couple\Nyears can you think of a way where you can Dialogue: 0,0:29:57.58,0:30:03.93,Default,,0000,0000,0000,,either get BGP to conquer that problem or\Nwith the new decentralized protocol to Dialogue: 0,0:30:03.93,0:30:08.16,Default,,0000,0000,0000,,conquer that problem?\NSpeaker: Filters, filters, filters. Dialogue: 0,0:30:08.16,0:30:14.11,Default,,0000,0000,0000,,Basically. I don't know that much about\NBGP but I know that some people are in the Dialogue: 0,0:30:14.11,0:30:18.15,Default,,0000,0000,0000,,business of making their filters from the\Ndata that's in the WHOIS database that Dialogue: 0,0:30:18.15,0:30:22.12,Default,,0000,0000,0000,,just say this is what you're allowed to\Nannounce cool this is we'll build a filter Dialogue: 0,0:30:22.12,0:30:27.48,Default,,0000,0000,0000,,that's what your your box can send to us.\NThe problem is that ISPs are lazy and we Dialogue: 0,0:30:27.48,0:30:33.35,Default,,0000,0000,0000,,don't have we don't have standardized\Nstuff for making these filters so we end Dialogue: 0,0:30:33.35,0:30:37.18,Default,,0000,0000,0000,,up with a lot of people just sit putting\Nno filter and saying yeah announce Dialogue: 0,0:30:37.18,0:30:41.10,Default,,0000,0000,0000,,whatever you want and then you know China\Nannounces Google and all the traffic goes Dialogue: 0,0:30:41.10,0:30:45.03,Default,,0000,0000,0000,,like this.\NHerald: And that's all for today. Dialogue: 0,0:30:45.03,0:30:47.51,Default,,0000,0000,0000,,Thank you Caleb. Dialogue: 0,0:30:47.51,0:30:50.06,Default,,0000,0000,0000,,{\i1}Applause{\i0} Dialogue: 0,0:30:50.06,0:30:55.48,Default,,0000,0000,0000,,{\i1}34c3 outro{\i0} Dialogue: 0,0:30:55.48,0:31:12.00,Default,,0000,0000,0000,,subtitles created by c3subtitles.de\Nin the year 2018. Join, and help us!