BYTES & RIGHTS
The web – How we manage it.
Tuesday 4 April
Bytes and Rights is the Web Conference that you never knew you needed!
It will investigate how the Web is governed, and how this is changing; what is happening in cyber-security and how can we protect our personal information and data; and broad topics covering Web content regulation and censorship, Privacy, Encryption, Intellectual Property Protection and Internet Fragmentation.
Included will be discussions on areas such as device security with the growth of the Internet of Things; Mass encryption as a response to mass surveillance, Digital Rights Management, Trusted Computing and Encryption Keys, and lots more.
Curated by Electronic Frontiers Australia, Australia’s leading proponent of digital freedom, access and privacy, this conference will raise controversial issues and question the need for governments to impose restrictive and oppressive laws. Expect interesting speakers on hot topics!
Exploring key issues about the Web and how it affects us and society in important ways.
• A full day of talks, panels and roundtable discussions.
• Be part of the discussion and help set our future Web framework.
Visit: https://www.efa.org.au/events/bytesandrights for program updates
Bytes & Rights Program
Internet Fragmentation: Can the Web Remain Truly Worldwide?
The global open Internet faces many challenges. We will discuss the many ways the Internet appears to be fragmenting and balkanising, and the methods and likelihood we might use to keep it together. We will discuss technical issues that limit interoperability, government policies that limit communication, and business practices (such as ‘walled gardens’) that limit the practical value of a single internet.
Algorithmic Copyright Enforcement
Copyright enforcement is a routine aspect of the modern internet. Copyright enforcement is routinely largely automated and enforcement claims decided by algorithmic system, such as YouTube’s Content ID system. But no algorithm can deal with the complexity of copyright law, both the maze of licensed uses and the many complex fair use conditions. The use of complex algorithms for legal enforcement raises many questions covering technical, legal and policy issues.
A significant debate in recent decades has been to what extent should we allow Intellectual Property considerations to define our choices of technology? Many of these debates centre around the extent to which we allow Digital Rights Management (DRM) technologies to control how we access digital media. Advocates argue that these technologies are essential for commerce in digital media, critics argue that DRM is hostile to the rights of consumers, makes technology less useful and more fragile by design, and is always ultimately futile at halting a dedicated copyright infringer. These DRM technologies have recently been included in the W3C standards for HTML5, and technologies such as 3D printing and VR offer new frontiers for copyright and its enforcement. Are we approaching a accomodation with DRM that will finally succeed in balancing the rights of consumers and rights holders appropriately, or are we simply repeating the mistakes of the past in new standards and new media?
Security Challenges of the Internet of Things
Changes to the way we use the Internet, particularly Internet enabled devices commonly referred to as the Internet of Things, raises many security challenges. Many assumptions we make about traditional computing devices do not necessarily hold true for these connected appliances, and they can present challenging problems for dealing with security, privacy, resiliency and other issues. For example, record breaking DDoS attacks from poorly secured devices connected on a massive scale. Regulation, standards, and other governance questions may end up being as significant a part of the answer as technological approaches.
Keynote – Responding to Mass Surveillance
The technology community has responded to the revelations of routine mass surveillance by a number of efforts to make it more difficult by increasing the encryption and security. Are these efforts effective, are we targeting the right problems, how can we improve?
Gender and the Internet
How can we prevent the Internet being used as a mechanism for intimidation and harassment? How would the Internet of today differ if it had been designed with feminist principles in mind? This panel draws on work done by the Association for Progressive Communications GenderIT project.
The Ethics and Regulation of Privacy
Privacy is frequently discussed publicly in response to a breach, particularly as large breaches that may include the data of millions of people. What should our response to a privacy breach be? To what extent should we regulate a response? How can we reduce the problem of data breaches by design and governance?
Closing Social event
Bytes & Rights
One Day – Tuesday 4 April
Full: $300; Unwaged: $180
This pass is for Bytes & Rights only.
It gives you access to Bytes & Rights, and to the Festival of the Web Welcome Function on Tuesday 4 April.
When you register:
You will be first asked to create your personal profile. This enables us to keep track of your registration and provide you with assistance and new information as and when it may become available.
The FESTIVAL PASSPORT provides access to every day and every event in the Festival of the Web. If you select this Pass, you will be able to attend all days of Bytes & Rights and all other official events held during the Festival of the Web.
This Pass should be activated on Monday 3 April, and will provide access to Bytes & Rights and events and activities planned for Tuesday 4 April, Wednesday 5 April, Thursday 6 April and Friday 7 April, including the WWW2017 Gala Dinner.