Category Archives: cyberlibertarianism

Right Reaction and the Digital Humanities

UKIP

A while back, I had an encounter that struck me at the time, and continues to strike me, as perfectly emblematic of the Digital Humanities as an ideological formation. While it includes a kind of brutal incivility that I associate with much of the politics that persists very near the “nice” surface of DH (of […]

Also posted in digital humanities, rhetoric of computation, what are computers for | Tagged , , , , , , , , , | Comments closed

Crowdforcing: When What I “Share” Is Yours

a crowd

Among the many default, background, often unexamined assumptions of the digital revolution is that sharing is good. A major part of the digital revolution in rhetoric is to repurpose existing language in ways that advantage the promoters of one scheme or another. It is no surprise that while it may well have been the case […]

Also posted in "social media", materality of computation, rhetoric of computation, what are computers for | Tagged , , , , , , , , , , , , , , , , , , , , , , , , | 9 Responses

Tor, Technocracy, Democracy

freedom is slavery

As important as the technical issues regarding Tor are, at least as important—probably more important—is the political worldview that Tor promotes (as do other projects like it). While it is useful and relevant to talk about formations that capture large parts of the Tor community, like “geek culture” and “cypherpunks” and libertarianism and anarchism, one […]

Also posted in "hacking", privacy, rhetoric of computation, what are computers for | Tagged , , , , , , , , , , , , , , , , , , , , | Leave a comment

‘Is It Compromised?’ Is the Wrong Question about US Government Funding of Tor

cia dissemination of propaganda

In many ways, the most surprising thing about Yasha Levine’s powerful reporting on US government funding of Tor at Pando Daily has been the response to it. From the trolling attacks and ad hominem insults by apparently respectable, senior digital privacy activists and journalists, to repeated, climate-denialist-style “I’m rubber you’re glue”-type (or, as I like […]

Also posted in privacy, revolution, rhetoric of computation, what are computers for | Tagged , , , , , , , , , , , , , , , , , | 2 Responses

Wikipedia and the Oligarchy of Ignorance

wikipedia

In a recent story on Medium called “One Man’s Quest to Rid Wikipedia of Exactly One Grammatical Mistake: Meet the Ultimate WikiGnome,” Andrew McMillen tells the story of Wikipedia editor “Giraffedata”—beyond the world of Wikipedia, a software engineer named Bryan Henderson—who has edited thousands of Wikipedia pages to correct a single grammatical error and is […]

Also posted in "social media", rhetoric of computation | Tagged , , , , , , , , , , , , , , , , , , , , | 3 Responses

Tor Is Not a “Fundamental Law of the Universe”

Tor for freedom

In what I consider a very welcome act of journalistic open-mindedness, Pando Daily recently published a piece by Quinn Norton that responded both to Yasha Levine’s excellent and necessary piece on the US Government’s funding of the Tor Project, and perhaps even more so his even more necessary piece on the amazing attacks his piece […]

Also posted in "hacking", revolution, rhetoric of computation | Tagged , , , , , , , , , , , , , , , , , , , | 1 Response

All Cybersecurity Technology Is Dual-Use

geer at black hat

Dan Geer is one of the more interesting thinkers about digital security and privacy around. Geer is a sophisticated technologist with an extremely varied and rich background who has also, fairly recently, become a spook of some kind. Geer is currently the Chief Information Security Officer for In-Q-Tel, the technology investment subsidiary of the CIA, […]

Also posted in "hacking", "social media", materality of computation, privacy, rhetoric of computation, surveillance | Tagged , , , , , , , , , , , , , , , , | Leave a comment

Social Media as Political Control: The Facebook Study, Acxiom, & NSA

NSA Facebook

Although it didn’t break the major media until last week, around June 2 researchers led by Adam Kramer of Facebook published a study in the Proceedings of the National Academy of Sciences (PNAS) entitled “Experimental Evidence of Massive-Scale Emotional Contagion Through Social Networks.” The publication has triggered an flood of complaints and concerns: is Facebook […]

Also posted in "social media", digital humanities, privacy, surveillance, we are building big brother | Tagged , , , , , , , , , , , , , , , , , , , , , , , | 1 Response

Bitcoinsanity 2: Revolutions in Rhetoric

bitcoin on reddit

Bitcoin is touted, publicized and promoted as an innovation in financial technology. Usually those doing the promoting have very little experience with finance in general or with financial technology in particular–a huge, booming industry mostly made up of proprietary technologies that those of us who don’t work for major banks or trading firms know very […]

Also posted in "hacking", "social media", bitcoin, rhetoric of computation, what are computers for | Tagged , , , , , , , , , , , , , , | Leave a comment

‘Permissionless Innovation’: Using Technology to Dismantle the Republic

polluted WV water

There may be no more pernicious and dishonest doctrine among Silicon Valley’s avatars than the one they call “permissionless innovation.” The phrase entails the view that entrepreneurs and “innovators” are the lifeblood of society, and must be allowed to push forward without needing to ask for “permission” from government, for the good of society. The […]

Also posted in google, materality of computation, rhetoric of computation | Tagged , , , , , , , , , , , , , , , , , | 8 Responses