Category Archives: privacy

Please Consider Supporting Our Legal Challenge to Cambridge Analytica’s Role in the Trump Election

Crowd Justice campaign header

Since December of last year, I have been part of a small group of concerned citizens engaged in a series of actions against Cambridge Analytica (CA) and its parent corporation, SCL Group. I am writing this post in the hopes of gathering support (that is, funds) we need to continue this action. You can support […]

Also posted in "social media", materality of computation, revolution, surveillance, we are building big brother, what are computers for | Tagged , , , , , , , , , , , | Leave a comment

Article: “The Militarization of Language: Cryptographic Politics and the War of All against All”

boundary 2 cover

I have an article in the latest boundary 2 titled “The Militarization of Language: Cryptographic Politics and the War of All against All.” It is my most sustained attempt to locate and critique a political philosophy in the discourse of encryption advocates, a project I’ve addressed as well in pieces like “Code Is Not Speech” […]

Also posted in "hacking", cyberlibertarianism, rhetoric of computation, surveillance | Tagged , , , , , , , , , , , | Leave a comment

Encryption and Responsibility: A Note on Symphony

Typically, those of us concerned about the widespread use of encryption and anonymization technologies like Tor are depicted by crypto advocates as “anti-encryption” or “freedom haters” or “mind-murdering censors” or worse. Despite the level of detail these people can bring to technological matters, they often portray the political options as very stark: either “encryption” or […]

Also posted in cyberlibertarianism, materality of computation, surveillance | Tagged , , , , , , , , , , , , , , , | 1 Response

Tor, Technocracy, Democracy

freedom is slavery

As important as the technical issues regarding Tor are, at least as important—probably more important—is the political worldview that Tor promotes (as do other projects like it). While it is useful and relevant to talk about formations that capture large parts of the Tor community, like “geek culture” and “cypherpunks” and libertarianism and anarchism, one […]

Also posted in "hacking", cyberlibertarianism, rhetoric of computation, what are computers for | Tagged , , , , , , , , , , , , , , , , , , , , | Leave a comment

‘Is It Compromised?’ Is the Wrong Question about US Government Funding of Tor

cia dissemination of propaganda

In many ways, the most surprising thing about Yasha Levine’s powerful reporting on US government funding of Tor at Pando Daily has been the response to it. From the trolling attacks and ad hominem insults by apparently respectable, senior digital privacy activists and journalists, to repeated, climate-denialist-style “I’m rubber you’re glue”-type (or, as I like […]

Also posted in cyberlibertarianism, revolution, rhetoric of computation, what are computers for | Tagged , , , , , , , , , , , , , , , , , | 2 Responses

All Cybersecurity Technology Is Dual-Use

geer at black hat

Dan Geer is one of the more interesting thinkers about digital security and privacy around. Geer is a sophisticated technologist with an extremely varied and rich background who has also, fairly recently, become a spook of some kind. Geer is currently the Chief Information Security Officer for In-Q-Tel, the technology investment subsidiary of the CIA, […]

Also posted in "hacking", "social media", cyberlibertarianism, materality of computation, rhetoric of computation, surveillance | Tagged , , , , , , , , , , , , , , , , | Leave a comment

Social Media as Political Control: The Facebook Study, Acxiom, & NSA

NSA Facebook

Although it didn’t break the major media until last week, around June 2 researchers led by Adam Kramer of Facebook published a study in the Proceedings of the National Academy of Sciences (PNAS) entitled “Experimental Evidence of Massive-Scale Emotional Contagion Through Social Networks.” The publication has triggered an flood of complaints and concerns: is Facebook […]

Also posted in "social media", cyberlibertarianism, digital humanities, surveillance, we are building big brother | Tagged , , , , , , , , , , , , , , , , , , , , , , , | 1 Response

Glasslinks: Privacy, Glassholes, Panics, & Take-Backs

google glass

A colleague asked if I had any links to writings about Google Glass, so I dug around in my files and found quite a few things. I thought they might come in handy for others doing research on the topic. I have even more, but this is overwhelming enough as it is. The final pair […]

Also posted in cyberlibertarianism, google, materality of computation, rhetoric of computation, surveillance, we are building big brother | Tagged , , , , , , , , , , , , | Leave a comment

Opt-Out Citizenship: End-to-End Encryption and Constitutional Governance

Silk Road

Among the digital elite, one of the more common reactions to the recent shocking disclosures about intelligence surveillance programs has been to suggest that the way to prevent government snooping is to encrypt all of our communications. While I think encryption might be an important part of a solution to the total surveillance problem, it […]

Also posted in cyberlibertarianism, rhetoric of computation, surveillance, what are computers for | Tagged , , , , , , , , , , , , , , | 2 Responses

Completely Different and Exactly the Same

I was flattered to see Nicholas Carr picking up on a blog entry I wrote about the Cartesian dualism underlying most thinking about the Singularity. I was equally pleased to read this comment on Carr’s post from CS Clark, who is otherwise unknown to me: I’m reminded that many tech/law debates depend on the new […]

Also posted in "social media", cyberlibertarianism, google, materality of computation, rhetoric of computation, surveillance | Tagged , , , , , , , , , , , | 5 Responses