In all seriousness, I appreciated that after commenting on the flaws with security inherent in the PC that Zittrain addressed the usefulness of the system. While there are aspects of PCs being distributed to new mediums, there are still plenty of opportunities on PCs. Like Zittrain mentions on 59:
"Eliminate the PC from many dens or living rooms, and we eliminate the test bed and distribution point of new, useful software from any corner of the globe."
The devices meant to focus on certain PC functions, whether it is gaming for an Xbox 360 or videos for the "Telmex Internet Box", drastically reduce the options available to the user. I can access the internet and play games on my Xbox 360, but I would hate to type anything to anyone through that console.
What we are seeing to some extent is the level of innovation through applications made for PCs with the security of consoles and other similar systems. New features are still being added for Xbox users, though they certainly are not being created at the same rate or on the same scale as PCs.
Security can be a very fascinating topic in regards to PCs. Depending on the means for protecting a computer, there is just as much a chance of preventing your own applications from working properly as there is for preventing attempts to compromise the computer. Norton products and Windows Vista are fantastic examples. While bringing more protection to the table, personally I have no interest in affirming my intent to open a program every single time I try to access it. When firewalls cannot be modified to allow your own programs to pass through short of disabling the entire firewall, there might be a problem. Yet many choose to grin and bear it and may be better off for it.
I must admit I appreciate von Hippel's graph. Especially the prime example of Wile E. Coyote. R&D can research possible advances in their technology, but they are nowhere near as motivated as an individual who needs to make their workplace more efficient. The payoff for these individuals is in the work and the personal effect it has on them is more significant than the work of researchers that may have no direct experience with the individual's issues.
By far, my favorite section of the book is the one boldly labeled "Solutions". I could have really used this section in The Exploit, though it most certainly would have read differently. Being able to revert to previous settings is insanely useful; without it I would have lost my portfolio several times over the course of my undergraduate experience, and this functionality online makes life a lot easier. Though I can also attest to the dangers of a corrupted Red PC, after saving and restoring a backup on my computer from a corrupted file. The security no longer needs to be focused on the access to tools for modification, but on the undo button.
I can only imagine what it would be like to be banned from a site because someone in the same city did something stupid; Qatar has a very fascinating system working there. In that vein, the idea of spy versus spy withing computer networks is a fascinating concept; what better way to gather information on spyware than by spreading in a similar fashion? If computers could be saturated with this type of toolkit, the information made available would be invaluable. Strangely, it seems as though this would almost be more effective if distributed exactly like a virus; volunteers for this sort of program probably are already conscious of threats to their computer. By quietly monitoring the effects of various files on computers belonging to users who obviously don't concern themselves with security, I'd think malicious elements would be much more visible.
But I'm not a computer scientist, nor am I truly fit to make assertions regarding this material. I am content with the knowledge that we are seeing examples of these solutions and am interested in observing these issues play out through instances online.