Category Archives: cyberlibertarianism

The Terribly Thin Conception of Ethics in Digital Technology

robot teacher fooled students

Thanks in part to ongoing revelations about Facebook, there is today a louder discussion than there has been for a while about the need for deep thinking about ethics in the fields of engineering, computer science, and the commercial businesses built out of them. In the Boston Globe, Yonatan Zunger wrote about an “ethics crisis” […]

Also posted in privacy, rhetoric of computation, what are computers for | Tagged , , , , , , , , , , , , , | Leave a comment

Article: “The Militarization of Language: Cryptographic Politics and the War of All against All”

boundary 2 cover

I have an article in the latest boundary 2 titled “The Militarization of Language: Cryptographic Politics and the War of All against All.” It is my most sustained attempt to locate and critique a political philosophy in the discourse of encryption advocates, a project I’ve addressed as well in pieces like “Code Is Not Speech” […]

Also posted in "hacking", privacy, rhetoric of computation, surveillance | Tagged , , , , , , , , , , , | Leave a comment

The Destructiveness of the Digital Humanities (‘Traditional’ Part II)

We don’t want to save the humanities as they are traditionally constituted

In what purport to be responses or rebuttals to critiques I and others have offered of Digital Humanities (DH), my argument is routinely misrepresented in a fundamental way. I am almost always said to oppose the use of digital technology in the humanities. This happens despite the fact that I and those I have worked […]

Also posted in definitions that matter, digital humanities, rhetoric of computation, theory | Tagged , , , , , , , , | Comments closed

The Destructiveness of the Digital

EVE Online

I’ve argued for a long time along different ways that despite its overt claims to creativity, “building,” “democratization,” and so on, digital culture is at least partly also characterized by profoundly destructive impulses. While digital promoters love to focus on the great things that will come from some new version of something over its existing […]

Also posted in games, rhetoric of computation | Tagged , , , , , , , , , , , | 2 Responses

The Politics of Bitcoin: Expanded Bibliography with Live Links

Politics of Bitcoin

Production constraints and editorial guidelines required The Politics of Bitcoin, in both its print and electronic versions, to include only the base URLs of online materials referenced in the book, and even in the electronic version these aren’t live links. In addition, space constraints meant that some work valuable to me in composing the book […]

Also posted in bitcoin | Tagged , , , , , , , | Leave a comment

Trump, Clinton, and the Electoral Politics of Bitcoin

blockchain transformation CGI

My new book, The Politics of Bitcoin, is not directly about electoral politics, but rather the political and political-economic theories that inform the development of Bitcoin and its underlying blockchain software. My argument does not require that there be direct connections between promoting Bitcoin and supporting one candidate or party or another. Rather, what concerns […]

Also posted in bitcoin, rhetoric of computation | Tagged , , , , , , , , , , , , , | 17 Responses

“Neoliberalism” Has Two Meanings


The word “neoliberalism” comes up frequently in discussions on and of digital media and politics. Use of the term is frequently derided by actors across the political spectrum, especially but not only by those at whom the term has been directed. (Nobody wants to be called a neoliberal and everyone always denies it, much as […]

Also posted in theory | Tagged , , , , , , , , , , , , , , | 2 Responses

Code Is Not Speech

code is speech

Brief version Advocates understand the idea that “code is speech” to create an impenetrable legal shield around anything built of programming code. When they do this they misunderstand, or misrepresent, free speech law (and rights law in general), which rarely creates such impenetrable shields, the principles that underlie that law, and the ways those principles […]

Also posted in rhetoric of computation | Tagged , , , , , , , , , , , , , , , , , , | 5 Responses

Are “Backdoors” Real or Virtual? The Logical Flaw in #AppleVsFBI

Apple Vs FBI protest

I’ve been working for quite a while on a longer piece about the argument that “backdoors make us less secure,” an article of faith among cryptographers, hackers and computer scientists that is adhered to with such condescension, vehemence (and at times, venom) that I can’t help but want to subject it to the closest scrutiny […]

Also posted in "hacking", surveillance | Tagged , , , , , , , , , , | 1 Response

The Volkswagen Scandal: The DMCA Is Not the Problem and Open Source Is Not the Solution

VW Super Beetle (1972)

tl;dr The solution to the VW scandal is to empower regulators and make sure they have access to any and all parts of the systems they oversee. The solution is not to open up those systems to everyone. There is no “right to repair,” at least for individuals. Whether or not it deserves to be […]

Also posted in "hacking", materality of computation | Tagged , , , , , , , , , , , , , , , , , | 3 Responses