Author Archives: David Golumbia

The Politics of Bitcoin: Expanded Bibliography with Live Links

Politics of Bitcoin

Production constraints and editorial guidelines required The Politics of Bitcoin, in both its print and electronic versions, to include only the base URLs of online materials referenced in the book, and even in the electronic version these aren’t live links. In addition, space constraints meant that some work valuable to me in composing the book […]

Posted in bitcoin, cyberlibertarianism | Tagged , , , , , , , | Leave a comment

Trump, Clinton, and the Electoral Politics of Bitcoin

blockchain transformation CGI

My new book, The Politics of Bitcoin, is not directly about electoral politics, but rather the political and political-economic theories that inform the development of Bitcoin and its underlying blockchain software. My argument does not require that there be direct connections between promoting Bitcoin and supporting one candidate or party or another. Rather, what concerns […]

Posted in bitcoin, cyberlibertarianism, rhetoric of computation | Tagged , , , , , , , , , , , , , | 17 Responses

“Neoliberalism” Has Two Meanings

neoliberalism

The word “neoliberalism” comes up frequently in discussions on and of digital media and politics. Use of the term is frequently derided by actors across the political spectrum, especially but not only by those at whom the term has been directed. (Nobody wants to be called a neoliberal and everyone always denies it, much as […]

Posted in cyberlibertarianism, theory | Tagged , , , , , , , , , , , , , , | 2 Responses

Code Is Not Speech

code is speech

Brief version Advocates understand the idea that “code is speech” to create an impenetrable legal shield around anything built of programming code. When they do this they misunderstand, or misrepresent, free speech law (and rights law in general), which rarely creates such impenetrable shields, the principles that underlie that law, and the ways those principles […]

Posted in cyberlibertarianism, rhetoric of computation | Tagged , , , , , , , , , , , , , , , , , , | 5 Responses

Are “Backdoors” Real or Virtual? The Logical Flaw in #AppleVsFBI

Apple Vs FBI protest

I’ve been working for quite a while on a longer piece about the argument that “backdoors make us less secure,” an article of faith among cryptographers, hackers and computer scientists that is adhered to with such condescension, vehemence (and at times, venom) that I can’t help but want to subject it to the closest scrutiny […]

Posted in "hacking", cyberlibertarianism, surveillance | Tagged , , , , , , , , , , | 1 Response

The Volkswagen Scandal: The DMCA Is Not the Problem and Open Source Is Not the Solution

VW Super Beetle (1972)

tl;dr The solution to the VW scandal is to empower regulators and make sure they have access to any and all parts of the systems they oversee. The solution is not to open up those systems to everyone. There is no “right to repair,” at least for individuals. Whether or not it deserves to be […]

Posted in "hacking", cyberlibertarianism, materality of computation | Tagged , , , , , , , , , , , , , , , , , | 3 Responses

Encryption and Responsibility: A Note on Symphony

Typically, those of us concerned about the widespread use of encryption and anonymization technologies like Tor are depicted by crypto advocates as “anti-encryption” or “freedom haters” or “mind-murdering censors” or worse. Despite the level of detail these people can bring to technological matters, they often portray the political options as very stark: either “encryption” or […]

Posted in cyberlibertarianism, materality of computation, privacy, surveillance | Tagged , , , , , , , , , , , , , , , | 1 Response

Right Reaction and the Digital Humanities

UKIP

A while back, I had an encounter that struck me at the time, and continues to strike me, as perfectly emblematic of the Digital Humanities as an ideological formation. While it includes a kind of brutal incivility that I associate with much of the politics that persists very near the “nice” surface of DH (of […]

Posted in cyberlibertarianism, digital humanities, rhetoric of computation, what are computers for | Tagged , , , , , , , , , | Comments closed

Crowdforcing: When What I “Share” Is Yours

a crowd

Among the many default, background, often unexamined assumptions of the digital revolution is that sharing is good. A major part of the digital revolution in rhetoric is to repurpose existing language in ways that advantage the promoters of one scheme or another. It is no surprise that while it may well have been the case […]

Posted in "social media", cyberlibertarianism, materality of computation, rhetoric of computation, what are computers for | Tagged , , , , , , , , , , , , , , , , , , , , , , , , | 9 Responses

Tor, Technocracy, Democracy

freedom is slavery

As important as the technical issues regarding Tor are, at least as important—probably more important—is the political worldview that Tor promotes (as do other projects like it). While it is useful and relevant to talk about formations that capture large parts of the Tor community, like “geek culture” and “cypherpunks” and libertarianism and anarchism, one […]

Posted in "hacking", cyberlibertarianism, privacy, rhetoric of computation, what are computers for | Tagged , , , , , , , , , , , , , , , , , , , , | Leave a comment