Tag Archives: constitutional governance

Code Is Not Speech

code is speech

Brief version Advocates understand the idea that “code is speech” to create an impenetrable legal shield around anything built of programming code. When they do this they misunderstand, or misrepresent, free speech law (and rights law in general), which rarely creates such impenetrable shields, the principles that underlie that law, and the ways those principles […]

Posted in cyberlibertarianism, rhetoric of computation | Also tagged , , , , , , , , , , , , , , , , , | 2 Responses

Encryption and Responsibility: A Note on Symphony

Typically, those of us concerned about the widespread use of encryption and anonymization technologies like Tor are depicted by crypto advocates as “anti-encryption” or “freedom haters” or “mind-murdering censors” or worse. Despite the level of detail these people can bring to technological matters, they often portray the political options as very stark: either “encryption” or […]

Posted in cyberlibertarianism, materality of computation, privacy, surveillance | Also tagged , , , , , , , , , , , , , , | 1 Response

All Cybersecurity Technology Is Dual-Use

geer at black hat

Dan Geer is one of the more interesting thinkers about digital security and privacy around. Geer is a sophisticated technologist with an extremely varied and rich background who has also, fairly recently, become a spook of some kind. Geer is currently the Chief Information Security Officer for In-Q-Tel, the technology investment subsidiary of the CIA, […]

Posted in "hacking", "social media", cyberlibertarianism, materality of computation, privacy, rhetoric of computation, surveillance | Also tagged , , , , , , , , , , , , , , , | Leave a comment