Difference between revisions of "Save WiFi/Joint Letter"

From LibrePlanet
Jump to: navigation, search
(Group Introductions)
m (Contents: fixed typo)
 
(9 intermediate revisions by 3 users not shown)
Line 7: Line 7:
 
Although the signers believe that Commission has the best of intentions, the signers believe that the NPRM is a dangerous intrusion upon the rights of computing users and substantially interferes with innovation in the wireless space.
 
Although the signers believe that Commission has the best of intentions, the signers believe that the NPRM is a dangerous intrusion upon the rights of computing users and substantially interferes with innovation in the wireless space.
  
The signers are concerned about two changes in the NPRM:
+
The signers are concerned about three changes in the NPRM:
* § 2.1033 Application for grant of certification. Paragraph 4(i) "Paragraph 4(i)" and
+
* § 2.1033 Application for grant of certification. Paragraph 4(i),
* § 2.935 Electronic labeling of radiofrequency devices. Clause (d) "Clause (d)"
+
* § 2.935 Electronic labeling of radiofrequency devices. Clause (d) and
 +
* § 2.1042 Certified modular transmitters. Section 8(e)
  
The NPRM removes the ability of computing users to control and modify their devices in both Paragraph 4(i). In Paragraph 4(i), the manufacturer is required to describe how the software of the device is secured against modification. Additionally, Clause (d) implies that the device must be secured against modification due to the requirement to prevent label information from being modified. These requirements combined prevent most modifications to the device even when the user wants to improve on the security on the device or even to correct problems with the wireless radio software itself.
+
The NPRM removes the ability of computing users to control and modify their devices in both Paragraph 4(i). In Paragraph 4(i), the manufacturer is required to describe how the software of the device is secured against modification. Additionally, Clause (d) implies that the device must be secured against modification due to the requirement to prevent label information from being modified. Finally, Section 8(e) requires manufacturers to only allow "approved" software to be installed on a device. These requirements combined prevent most modifications to the device even when the user wants to improve on the security of the device or even to correct problems with the wireless radio software itself.
  
 
===Infringing upon computing users rights===
 
===Infringing upon computing users rights===
 
Until now, users of computing devices have had the ability to install the software of their choice. In particular, users have had the ability to install free and open source operating systems and software which most appropriately fits their needs. Whether the user wants to install OpenWrt on a router or a distribution based upon the Linux kernel on their laptop computer or smartphone, users have been able to control the devices they own. Through this control, users can explore how their computing devices work, educate themselves on the design of hardware, protect themselves from invasive spying by competitors and foreign governments and enrich their own lives and the lives of others through improved software.
 
Until now, users of computing devices have had the ability to install the software of their choice. In particular, users have had the ability to install free and open source operating systems and software which most appropriately fits their needs. Whether the user wants to install OpenWrt on a router or a distribution based upon the Linux kernel on their laptop computer or smartphone, users have been able to control the devices they own. Through this control, users can explore how their computing devices work, educate themselves on the design of hardware, protect themselves from invasive spying by competitors and foreign governments and enrich their own lives and the lives of others through improved software.
  
===Interfering With Innovation in the Wireless Space===
+
===Interfering with innovation in the wireless space===
 
Innovation in network and wireless technology depends on the ability of users and resellers to experiment with software and hardware at the deepest levels. CeroWrt, an open source router firmware, [http://www.bufferbloat.net/news/54 developed a fix] for an important form of network congestion called Bufferbloat. This fix is was [http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4b549a2ef4bef9965d97cbd992ba67930cd3e0fe added] to the Linux kernel to be used by the billions of users of Linux.
 
Innovation in network and wireless technology depends on the ability of users and resellers to experiment with software and hardware at the deepest levels. CeroWrt, an open source router firmware, [http://www.bufferbloat.net/news/54 developed a fix] for an important form of network congestion called Bufferbloat. This fix is was [http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4b549a2ef4bef9965d97cbd992ba67930cd3e0fe added] to the Linux kernel to be used by the billions of users of Linux.
  
Mesh networking technologies for developing stable distributed internet access are regularly implemented using various versions of Linux installed by an end-user and [http://lists.prplfoundation.org/pipermail/fcc/2015-August/000019.html much research and implementation on mesh networking] has occurred outside of manufacturers. [https://scholar.google.com/scholar?hl=en&q=atheros+802.11&btnG=&as_sdt=1%2C5&as_sdtp= Nearly 7,200 scholarly articles] on wireless networking technologies reference a particular brand of open and modifiable hardware which would be banned under these rules. Mesh networking is [http://www.arrl.org/news/broadband-hamnet-wins-international-association-of-emergency-managers-awards used for data communication by amateur radio operators] responding to natural disasters Without the ability to change the software on the device, these innovations would not have occurred.
+
Mesh networking technologies for developing stable distributed internet access are regularly implemented using various versions of Linux installed by an end-user and [http://lists.prplfoundation.org/pipermail/fcc/2015-August/000019.html much research and implementation on mesh networking] has occurred outside of manufacturers. [https://scholar.google.com/scholar?hl=en&q=atheros+802.11&btnG=&as_sdt=1%2C5&as_sdtp= Nearly 7,200 scholarly articles] on wireless networking technologies reference a particular brand of open and modifiable hardware which would be banned under these rules. Mesh networking is [http://www.arrl.org/news/broadband-hamnet-wins-international-association-of-emergency-managers-awards used for data communication by amateur radio operators] responding to natural disasters. Without the ability to change the software on the device, these innovations would not have occurred.
 +
 
 +
User-access to source code is another innovation in and of itself. It has led to bug fixes, security enhancements, and features that were not part of the original code base. In one instance a user was able to fix a critical bug impacting all wifi adapters based on a particular set of Qualcomm Atheros wireless chipset(s). As users were frequently being disconnected under certain conditions one user took it upon themselves to track down and fix the bug [http://lists.infradead.org/pipermail/ath9k_htc_fw/2014-April/000388.html]. This would not have been possible had the source code for the firmware been unavailable, or had these devices otherwise been locked.
  
 
Finally, numerous companies modify the software on off-the-shelf wireless devices for custom uses. Companies who sell hardware to retailers for WiFi hotspots often install software customized to that task. Additionally many commercial VPN providers sell wireless routers as part of there product offerings. Denying companies and users the option to purchase more secure routers with support for VPN services will put a variety of users at risk.
 
Finally, numerous companies modify the software on off-the-shelf wireless devices for custom uses. Companies who sell hardware to retailers for WiFi hotspots often install software customized to that task. Additionally many commercial VPN providers sell wireless routers as part of there product offerings. Denying companies and users the option to purchase more secure routers with support for VPN services will put a variety of users at risk.
Line 33: Line 36:
  
 
==Conclusion==
 
==Conclusion==
The signers share the commission's interest in protecting the wireless spectrum. As the Commission deliberates on the NPRM, we invite the Commission to meet with signers, the computing industry, users, free and open source software advocates and all interested parties. Through a collaboration between all interested parties, we believe the wireless spectrum can be protected while enabling the innovation and freedom key to American competitiveness in the 21st century.
+
The signers share the commission's interest in protecting the wireless spectrum. As the Commission deliberates on the NPRM, we invite the Commission to meet with signers, the computing industry, users, free and open source software advocates and all interested parties. Through a collaboration we believe the wireless spectrum can be protected while enabling the innovation and freedom key to American competitiveness in the 21st century.
 +
 
 +
==Signatures==
  
==signatures==
+
Here we'd place the signatures/names of the groups signing.

Latest revision as of 13:00, 31 August 2015

This the joint letter that will be submitted by the groups to the FCC in reply to the NPRM for Save WiFi

Group Introductions

Here we'd place the introduction to the signing groups

Contents

Although the signers believe that Commission has the best of intentions, the signers believe that the NPRM is a dangerous intrusion upon the rights of computing users and substantially interferes with innovation in the wireless space.

The signers are concerned about three changes in the NPRM:

  • § 2.1033 Application for grant of certification. Paragraph 4(i),
  • § 2.935 Electronic labeling of radiofrequency devices. Clause (d) and
  • § 2.1042 Certified modular transmitters. Section 8(e)

The NPRM removes the ability of computing users to control and modify their devices in both Paragraph 4(i). In Paragraph 4(i), the manufacturer is required to describe how the software of the device is secured against modification. Additionally, Clause (d) implies that the device must be secured against modification due to the requirement to prevent label information from being modified. Finally, Section 8(e) requires manufacturers to only allow "approved" software to be installed on a device. These requirements combined prevent most modifications to the device even when the user wants to improve on the security of the device or even to correct problems with the wireless radio software itself.

Infringing upon computing users rights

Until now, users of computing devices have had the ability to install the software of their choice. In particular, users have had the ability to install free and open source operating systems and software which most appropriately fits their needs. Whether the user wants to install OpenWrt on a router or a distribution based upon the Linux kernel on their laptop computer or smartphone, users have been able to control the devices they own. Through this control, users can explore how their computing devices work, educate themselves on the design of hardware, protect themselves from invasive spying by competitors and foreign governments and enrich their own lives and the lives of others through improved software.

Interfering with innovation in the wireless space

Innovation in network and wireless technology depends on the ability of users and resellers to experiment with software and hardware at the deepest levels. CeroWrt, an open source router firmware, developed a fix for an important form of network congestion called Bufferbloat. This fix is was added to the Linux kernel to be used by the billions of users of Linux.

Mesh networking technologies for developing stable distributed internet access are regularly implemented using various versions of Linux installed by an end-user and much research and implementation on mesh networking has occurred outside of manufacturers. Nearly 7,200 scholarly articles on wireless networking technologies reference a particular brand of open and modifiable hardware which would be banned under these rules. Mesh networking is used for data communication by amateur radio operators responding to natural disasters. Without the ability to change the software on the device, these innovations would not have occurred.

User-access to source code is another innovation in and of itself. It has led to bug fixes, security enhancements, and features that were not part of the original code base. In one instance a user was able to fix a critical bug impacting all wifi adapters based on a particular set of Qualcomm Atheros wireless chipset(s). As users were frequently being disconnected under certain conditions one user took it upon themselves to track down and fix the bug [1]. This would not have been possible had the source code for the firmware been unavailable, or had these devices otherwise been locked.

Finally, numerous companies modify the software on off-the-shelf wireless devices for custom uses. Companies who sell hardware to retailers for WiFi hotspots often install software customized to that task. Additionally many commercial VPN providers sell wireless routers as part of there product offerings. Denying companies and users the option to purchase more secure routers with support for VPN services will put a variety of users at risk.

Recommendations

The signers respectfully recommend the following changes:

The regulations on software defined radios should not restrict the ability to replace software on computing devices

As written, the regulations require that manufacturers prevent modification of all software computing devices which use software defined radios. The Commission should amend the regulations in a manner which protects the traditional right of law abiding users to understand and improve the software on their devices.

The regulations on e-labels should not restrict the ability to replace software on computing devices

The signers appreciate the need for proper labeling of wireless devices and the requirements set by Congress in the E-Label Act. The Commission should amend the regulations to guarantee electronic labels do not interfere with the ability of downstream parties to install any software they so choose.

Conclusion

The signers share the commission's interest in protecting the wireless spectrum. As the Commission deliberates on the NPRM, we invite the Commission to meet with signers, the computing industry, users, free and open source software advocates and all interested parties. Through a collaboration we believe the wireless spectrum can be protected while enabling the innovation and freedom key to American competitiveness in the 21st century.

Signatures

Here we'd place the signatures/names of the groups signing.