Category Archives: “hacking”

Article: “The Militarization of Language: Cryptographic Politics and the War of All against All”

boundary 2 cover

I have an article in the latest boundary 2 titled “The Militarization of Language: Cryptographic Politics and the War of All against All.” It is my most sustained attempt to locate and critique a political philosophy in the discourse of encryption advocates, a project I’ve addressed as well in pieces like “Code Is Not Speech” […]

Also posted in "hacking", cyberlibertarianism, privacy, rhetoric of computation, surveillance | Tagged , , , , , , , , , , , | Leave a comment

Are “Backdoors” Real or Virtual? The Logical Flaw in #AppleVsFBI

Apple Vs FBI protest

I’ve been working for quite a while on a longer piece about the argument that “backdoors make us less secure,” an article of faith among cryptographers, hackers and computer scientists that is adhered to with such condescension, vehemence (and at times, venom) that I can’t help but want to subject it to the closest scrutiny […]

Also posted in "hacking", cyberlibertarianism, surveillance | Tagged , , , , , , , , , , | 1 Response

The Volkswagen Scandal: The DMCA Is Not the Problem and Open Source Is Not the Solution

VW Super Beetle (1972)

tl;dr The solution to the VW scandal is to empower regulators and make sure they have access to any and all parts of the systems they oversee. The solution is not to open up those systems to everyone. There is no “right to repair,” at least for individuals. Whether or not it deserves to be […]

Also posted in "hacking", cyberlibertarianism, materality of computation | Tagged , , , , , , , , , , , , , , , , , | 3 Responses

Tor, Technocracy, Democracy

freedom is slavery

As important as the technical issues regarding Tor are, at least as important—probably more important—is the political worldview that Tor promotes (as do other projects like it). While it is useful and relevant to talk about formations that capture large parts of the Tor community, like “geek culture” and “cypherpunks” and libertarianism and anarchism, one […]

Also posted in "hacking", cyberlibertarianism, privacy, rhetoric of computation, what are computers for | Tagged , , , , , , , , , , , , , , , , , , , , | Leave a comment

Tor Is Not a “Fundamental Law of the Universe”

Tor for freedom

In what I consider a very welcome act of journalistic open-mindedness, Pando Daily recently published a piece by Quinn Norton that responded both to Yasha Levine’s excellent and necessary piece on the US Government’s funding of the Tor Project, and perhaps even more so his even more necessary piece on the amazing attacks his piece […]

Also posted in "hacking", cyberlibertarianism, revolution, rhetoric of computation | Tagged , , , , , , , , , , , , , , , , , , , | 1 Response

All Cybersecurity Technology Is Dual-Use

geer at black hat

Dan Geer is one of the more interesting thinkers about digital security and privacy around. Geer is a sophisticated technologist with an extremely varied and rich background who has also, fairly recently, become a spook of some kind. Geer is currently the Chief Information Security Officer for In-Q-Tel, the technology investment subsidiary of the CIA, […]

Also posted in "hacking", "social media", cyberlibertarianism, materality of computation, privacy, rhetoric of computation, surveillance | Tagged , , , , , , , , , , , , , , , , | Leave a comment

Bitcoinsanity 2: Revolutions in Rhetoric

bitcoin on reddit

Bitcoin is touted, publicized and promoted as an innovation in financial technology. Usually those doing the promoting have very little experience with finance in general or with financial technology in particular–a huge, booming industry mostly made up of proprietary technologies that those of us who don’t work for major banks or trading firms know very […]

Also posted in "hacking", "social media", bitcoin, cyberlibertarianism, rhetoric of computation, what are computers for | Tagged , , , , , , , , , , , , , , | Leave a comment

Crawling from the Wreckage

I am slowly in the process of resurrecting my site manually from the database that suffered SQL injection and a number of other unspecified attacks over the past few months. It is imperfect, but this temporary archive page provides links to the site’s existing content through archive.org, as I work on recreating the materials that […]

Also posted in "hacking" | Tagged , | Leave a comment

Bitcoin Will Eat Itself: More Contradictions of (Digital) Libertarianism

bitcoin

Bitcoin (BTC), the much in-the-news and up-for-government-discussion cryptocurrency favored by Deep Web drug markets, libertarians, anarchists and would-be assassins everywhere, has been on a tear recently, and as of yesterday has hit an all-time high (albeit briefly) of more than USD $900 mark. It’s not hard to find—in fact it’s difficult to avoid—cyberlibertarians of all […]

Also posted in "hacking", bitcoin, cyberlibertarianism, information doesn't want to be free, materality of computation, revolution, rhetoric of computation | Tagged , , , , , , , , , , , | Leave a comment

Talk: ‘Cyberlibertarianism: The Extremist Foundations of ‘Digital Freedom”

lib soc fed

Talk delivered at Clemson University, September 5, 2013 Full paper: Cyberlibertarianism: The Extremist Foundations of ‘Digital Freedom’ Abstract Cyberlibertarianism has rapidly become the dominant mode of political thought of our time. Especially in the US, but also around the world, the view that might be summed in the slogan “computerization will set you free” has […]

Also posted in "hacking", cyberlibertarianism, materality of computation, revolution, rhetoric of computation, theory | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , | 3 Responses