{"id":637,"date":"2018-09-19T08:59:08","date_gmt":"2018-09-19T12:59:08","guid":{"rendered":"http:\/\/web.thinkingcat.com\/wordpress\/?p=637"},"modified":"2018-09-18T17:05:38","modified_gmt":"2018-09-18T21:05:38","slug":"mobile-agents-man","status":"publish","type":"post","link":"https:\/\/www.thinkingcat.com\/wordpress\/2018\/09\/mobile-agents-man\/","title":{"rendered":"Mobile Agents, man!"},"content":{"rendered":"<p>Over twenty years ago, we said it was a bad idea. Then the tables were turned, in the name of making the Internet commercially viable, and we\u2019ve been living with the consequences ever since. The current \u201cinformation economy\u201d (aka, software and services spying on users) is \u201cmobile agents\u201d in reverse.<\/p>\n<p>A quarter of a century ago, when the Internet was just blooming in the world, and technology innovation was everywhere, there was discussion of software agents. These were typically outlined as bits of code that would \u201cact on your behalf\u201d, by transporting themselves to servers or other computing devices to do some computation, and then bring the results back to your device. Even then, there was enough security awareness to perceive that remote systems were not going to be interested in hosting these foreign code objects, no matter how \u201csandboxed\u201d. They would consume resources, and could potentially access sensitive data or take down the remote system, inadvertently or otherwise.<\/p>\n<p>I know, right? The idea of shipping code snippets around to other machines sounds completely daft, even as I type it! For those reasons, among others, systems like General Magic\u2019s <a href=\"https:\/\/en.wikipedia.org\/wiki\/Magic_Cap\">\u201cMagic Cap\u201d<\/a> never got off the ground.<\/p>\n<p>And here is the irony: in the end, we wound up inviting agents (literally) into our homes. Plugins like <a href=\"https:\/\/en.wikipedia.org\/wiki\/Ghostery\">ghostery<\/a> will show you how many suspicious bits of code are executing on your computer when you load different webpages in your browser. Those bits of code are among the chief actors in the great exposition of private data in today\u2019s web usage. You\u2019re looking at cute cat pictures, while that code is busily shipping your browser history off to some random server in another country. Programs like Firefox do attempt to sandbox some of the worst offenders (e.g., Facebook), but the problems are exactly the same as with the old \u201cagent avatar\u201d idea: the code is consuming resources on your machine, possibly accessing data it shouldn\u2019t be, and generally undermining your system in ways that have nothing to do with your interests.<\/p>\n<p>With the growing sense of unease over this sort of invasive behaviour, the trend is already being slowed. Here are two of the current countervailing trends:<\/p>\n<ul>\n<li>Crypto, crypto everywhere \u2014 blockchain your transactions and encrypt your transmissions. That may be necessary, but it\u2019s really not getting at the heart of the problem, which is that there is no respect in information sharing in transactions. Take your pick of analogy \u2014 highway robbers, thumbs on the scale at the bazaar, smash-and-grab for your browser history, whatever.<\/li>\n<li>Visiting increasingly specific, extra-territorial regulation on the Internet, without regard for feasibility of implementation (GDPR, I\u2019m looking at you\u2026). Even if some limited application of this approach helps address a current problem, it\u2019s not an approach that scales: more such regulation will lead to conflicting, impossible to implement requirements that will ultimately favour only the largest players, and generally pare the Internet and its services down to a limited shadow of what we\u2019ve known.<\/li>\n<\/ul>\n<p>A different approach is to take a page from the <a href=\"https:\/\/tools.ietf.org\/html\/rfc2016\">old URA (&#8220;Uniform Resource Agent&#8221;) approach<\/a> \u2014 not the actual technology proposal, but the idea that computation should happen (only) on the computing resources of the interested party, and everything else is an explicit transaction. Combined with the work done on <a href=\"https:\/\/en.wikipedia.org\/wiki\/Liberty_Alliance\">federated identity management,\u00a0<\/a> those transactions can include appropriate permissions and access control. And, while the argument is made that it is hard to come up with the specifics of interesting transactions, the amount of effort that has gone into creating existing systems belies a level of cleverness in the industry that is certainly up to the challenge.<\/p>\n<p>Who\u2019s up for that challenge?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over twenty years ago, we said it was a bad idea. Then the tables were turned, in the name of making the Internet commercially viable, and we\u2019ve been living with the consequences ever since. The current \u201cinformation economy\u201d (aka, software and services spying on users) is \u201cmobile agents\u201d in reverse. A quarter of a century [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_ef_editorial_meta_date_first-draft-date":"","_ef_editorial_meta_paragraph_assignment":"","_ef_editorial_meta_checkbox_needs-photo":"","_ef_editorial_meta_number_word-count":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6,36],"tags":[],"class_list":["post-637","post","type-post","status-publish","format-standard","hentry","category-internet","category-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbjRsG-ah","_links":{"self":[{"href":"https:\/\/www.thinkingcat.com\/wordpress\/wp-json\/wp\/v2\/posts\/637","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.thinkingcat.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thinkingcat.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thinkingcat.com\/wordpress\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thinkingcat.com\/wordpress\/wp-json\/wp\/v2\/comments?post=637"}],"version-history":[{"count":4,"href":"https:\/\/www.thinkingcat.com\/wordpress\/wp-json\/wp\/v2\/posts\/637\/revisions"}],"predecessor-version":[{"id":641,"href":"https:\/\/www.thinkingcat.com\/wordpress\/wp-json\/wp\/v2\/posts\/637\/revisions\/641"}],"wp:attachment":[{"href":"https:\/\/www.thinkingcat.com\/wordpress\/wp-json\/wp\/v2\/media?parent=637"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thinkingcat.com\/wordpress\/wp-json\/wp\/v2\/categories?post=637"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thinkingcat.com\/wordpress\/wp-json\/wp\/v2\/tags?post=637"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}