Tag Archives: law

Please Consider Supporting Our Legal Challenge to Cambridge Analytica’s Role in the Trump Election

Crowd Justice campaign header

Since December of last year, I have been part of a small group of concerned citizens engaged in a series of actions against Cambridge Analytica (CA) and its parent corporation, SCL Group. I am writing this post in the hopes of gathering support (that is, funds) we need to continue this action. You can support […]

Posted in "social media", materality of computation, privacy, revolution, surveillance, we are building big brother, what are computers for | Also tagged , , , , , , , , , , | Leave a comment

Article: “The Militarization of Language: Cryptographic Politics and the War of All against All”

boundary 2 cover

I have an article in the latest boundary 2 titled “The Militarization of Language: Cryptographic Politics and the War of All against All.” It is my most sustained attempt to locate and critique a political philosophy in the discourse of encryption advocates, a project I’ve addressed as well in pieces like “Code Is Not Speech” […]

Posted in "hacking", cyberlibertarianism, privacy, rhetoric of computation, surveillance | Also tagged , , , , , , , , , , | Leave a comment

Code Is Not Speech

code is speech

Brief version Advocates understand the idea that “code is speech” to create an impenetrable legal shield around anything built of programming code. When they do this they misunderstand, or misrepresent, free speech law (and rights law in general), which rarely creates such impenetrable shields, the principles that underlie that law, and the ways those principles […]

Posted in cyberlibertarianism, rhetoric of computation | Also tagged , , , , , , , , , , , , , , , , , | 5 Responses

Are “Backdoors” Real or Virtual? The Logical Flaw in #AppleVsFBI

Apple Vs FBI protest

I’ve been working for quite a while on a longer piece about the argument that “backdoors make us less secure,” an article of faith among cryptographers, hackers and computer scientists that is adhered to with such condescension, vehemence (and at times, venom) that I can’t help but want to subject it to the closest scrutiny […]

Posted in "hacking", cyberlibertarianism, surveillance | Also tagged , , , , , , , , , | 1 Response

The Volkswagen Scandal: The DMCA Is Not the Problem and Open Source Is Not the Solution

VW Super Beetle (1972)

tl;dr The solution to the VW scandal is to empower regulators and make sure they have access to any and all parts of the systems they oversee. The solution is not to open up those systems to everyone. There is no “right to repair,” at least for individuals. Whether or not it deserves to be […]

Posted in "hacking", cyberlibertarianism, materality of computation | Also tagged , , , , , , , , , , , , , , , , | 3 Responses

Opt-Out Citizenship: End-to-End Encryption and Constitutional Governance

Silk Road

Among the digital elite, one of the more common reactions to the recent shocking disclosures about intelligence surveillance programs has been to suggest that the way to prevent government snooping is to encrypt all of our communications. While I think encryption might be an important part of a solution to the total surveillance problem, it […]

Posted in cyberlibertarianism, privacy, rhetoric of computation, surveillance, what are computers for | Also tagged , , , , , , , , , , , , , | 2 Responses