psec_ov.htm (cached: http://www.webcitation.org/5Iwt19135). For a more extensive discussion, see Cisco Systems, Inc., 'Cisco IOS Software Feature: Network-Layer Encryption — White Paper'; Cisco Systems, Inc. 'IPSec — White Paper,' available at http://web.archive.org/web/20020202003100/http://www.cisco.com/warp/public/cc/techno/protocol/ipsecur/ipsec /tech/ipsec_wp.htm (cached: http://www.webcitation.org/5Iwt3l7WB); see also Dawn Bushaus, 'Encryption Can Help ISPs Deliver Safe Services,'
33.
See Internet Architectural Board statement on 'private doorbell' encryption, available at http://www.iab.org/documents/docs/121898.html (cached: http://www.webcitation.org/5Iwt6RMid).
34.
Little, but not nothing. Through conditional spending grants, the government was quite effective initially in increasing Net participation, and it was effective in resisting the development of encryption technologies; see Whitfield Diffie and Susan Eva Landau,
35.
On virtual private networks, see Richard Smith,
36.
Jonathan L. Zittrain, 'The Generative Internet,' 119
37.
Ibid., 2010.
38.
Ibid., 2012.
39.
Ibid.
40.
Ibid.
41.
Ibid., 2011.
42.
Ibid.
43.
Uniting and Strengthening America by Providing Appropriate Tools Required to Inter cept and Obstruct Terrorism (USA PATRIOT ACT) Act, Pub. L. No. 107–56, 155 STAT. 272 (2001); American Civil Liberties Union,
44.
Roberto Mangabeira Unger,
45.
In Bruce Ackerman,
46.
William J. Mitchell,