Skip to main content

Home/ Dystopias/ Group items tagged information

Rss Feed Group items tagged

Ed Webb

The Digital Maginot Line - 0 views

  • The Information World War has already been going on for several years. We called the opening skirmishes “media manipulation” and “hoaxes”, assuming that we were dealing with ideological pranksters doing it for the lulz (and that lulz were harmless). In reality, the combatants are professional, state-employed cyberwarriors and seasoned amateur guerrillas pursuing very well-defined objectives with military precision and specialized tools. Each type of combatant brings a different mental model to the conflict, but uses the same set of tools.
  • There are also small but highly-skilled cadres of ideologically-motivated shitposters whose skill at information warfare is matched only by their fundamental incomprehension of the real damage they’re unleashing for lulz. A subset of these are conspiratorial — committed truthers who were previously limited to chatter on obscure message boards until social platform scaffolding and inadvertently-sociopathic algorithms facilitated their evolution into leaderless cults able to spread a gospel with ease.
  • There’s very little incentive not to try everything: this is a revolution that is being A/B tested.
  • ...17 more annotations...
  • The combatants view this as a Hobbesian information war of all against all and a tactical arms race; the other side sees it as a peacetime civil governance problem.
  • Our most technically-competent agencies are prevented from finding and countering influence operations because of the concern that they might inadvertently engage with real U.S. citizens as they target Russia’s digital illegals and ISIS’ recruiters. This capability gap is eminently exploitable; why execute a lengthy, costly, complex attack on the power grid when there is relatively no cost, in terms of dollars as well as consequences, to attack a society’s ability to operate with a shared epistemology? This leaves us in a terrible position, because there are so many more points of failure
  • Cyberwar, most people thought, would be fought over infrastructure — armies of state-sponsored hackers and the occasional international crime syndicate infiltrating networks and exfiltrating secrets, or taking over critical systems. That’s what governments prepared and hired for; it’s what defense and intelligence agencies got good at. It’s what CSOs built their teams to handle. But as social platforms grew, acquiring standing audiences in the hundreds of millions and developing tools for precision targeting and viral amplification, a variety of malign actors simultaneously realized that there was another way. They could go straight for the people, easily and cheaply. And that’s because influence operations can, and do, impact public opinion. Adversaries can target corporate entities and transform the global power structure by manipulating civilians and exploiting human cognitive vulnerabilities at scale. Even actual hacks are increasingly done in service of influence operations: stolen, leaked emails, for example, were profoundly effective at shaping a national narrative in the U.S. election of 2016.
  • The substantial time and money spent on defense against critical-infrastructure hacks is one reason why poorly-resourced adversaries choose to pursue a cheap, easy, low-cost-of-failure psy-ops war instead
  • Information war combatants have certainly pursued regime change: there is reasonable suspicion that they succeeded in a few cases (Brexit) and clear indications of it in others (Duterte). They’ve targeted corporations and industries. And they’ve certainly gone after mores: social media became the main battleground for the culture wars years ago, and we now describe the unbridgeable gap between two polarized Americas using technological terms like filter bubble. But ultimately the information war is about territory — just not the geographic kind. In a warm information war, the human mind is the territory. If you aren’t a combatant, you are the territory. And once a combatant wins over a sufficient number of minds, they have the power to influence culture and society, policy and politics.
  • This shift from targeting infrastructure to targeting the minds of civilians was predictable. Theorists  like Edward Bernays, Hannah Arendt, and Marshall McLuhan saw it coming decades ago. As early as 1970, McLuhan wrote, in Culture is our Business, “World War III is a guerrilla information war with no division between military and civilian participation.”
  • The 2014-2016 influence operation playbook went something like this: a group of digital combatants decided to push a specific narrative, something that fit a long-term narrative but also had a short-term news hook. They created content: sometimes a full blog post, sometimes a video, sometimes quick visual memes. The content was posted to platforms that offer discovery and amplification tools. The trolls then activated collections of bots and sockpuppets to blanket the biggest social networks with the content. Some of the fake accounts were disposable amplifiers, used mostly to create the illusion of popular consensus by boosting like and share counts. Others were highly backstopped personas run by real human beings, who developed standing audiences and long-term relationships with sympathetic influencers and media; those accounts were used for precision messaging with the goal of reaching the press. Israeli company Psy Group marketed precisely these services to the 2016 Trump Presidential campaign; as their sales brochure put it, “Reality is a Matter of Perception”.
  • If an operation is effective, the message will be pushed into the feeds of sympathetic real people who will amplify it themselves. If it goes viral or triggers a trending algorithm, it will be pushed into the feeds of a huge audience. Members of the media will cover it, reaching millions more. If the content is false or a hoax, perhaps there will be a subsequent correction article – it doesn’t matter, no one will pay attention to it.
  • Combatants are now focusing on infiltration rather than automation: leveraging real, ideologically-aligned people to inadvertently spread real, ideologically-aligned content instead. Hostile state intelligence services in particular are now increasingly adept at operating collections of human-operated precision personas, often called sockpuppets, or cyborgs, that will escape punishment under the the bot laws. They will simply work harder to ingratiate themselves with real American influencers, to join real American retweet rings. If combatants need to quickly spin up a digital mass movement, well-placed personas can rile up a sympathetic subreddit or Facebook Group populated by real people, hijacking a community in the way that parasites mobilize zombie armies.
  • Attempts to legislate away 2016 tactics primarily have the effect of triggering civil libertarians, giving them an opportunity to push the narrative that regulators just don’t understand technology, so any regulation is going to be a disaster.
  • The entities best suited to mitigate the threat of any given emerging tactic will always be the platforms themselves, because they can move fast when so inclined or incentivized. The problem is that many of the mitigation strategies advanced by the platforms are the information integrity version of greenwashing; they’re a kind of digital security theater, the TSA of information warfare
  • Algorithmic distribution systems will always be co-opted by the best resourced or most technologically capable combatants. Soon, better AI will rewrite the playbook yet again — perhaps the digital equivalent of  Blitzkrieg in its potential for capturing new territory. AI-generated audio and video deepfakes will erode trust in what we see with our own eyes, leaving us vulnerable both to faked content and to the discrediting of the actual truth by insinuation. Authenticity debates will commandeer media cycles, pushing us into an infinite loop of perpetually investigating basic facts. Chronic skepticism and the cognitive DDoS will increase polarization, leading to a consolidation of trust in distinct sets of right and left-wing authority figures – thought oligarchs speaking to entirely separate groups
  • platforms aren’t incentivized to engage in the profoundly complex arms race against the worst actors when they can simply point to transparency reports showing that they caught a fair number of the mediocre actors
  • What made democracies strong in the past — a strong commitment to free speech and the free exchange of ideas — makes them profoundly vulnerable in the era of democratized propaganda and rampant misinformation. We are (rightfully) concerned about silencing voices or communities. But our commitment to free expression makes us disproportionately vulnerable in the era of chronic, perpetual information war. Digital combatants know that once speech goes up, we are loathe to moderate it; to retain this asymmetric advantage, they push an all-or-nothing absolutist narrative that moderation is censorship, that spammy distribution tactics and algorithmic amplification are somehow part of the right to free speech.
  • We need an understanding of free speech that is hardened against the environment of a continuous warm war on a broken information ecosystem. We need to defend the fundamental value from itself becoming a prop in a malign narrative.
  • Unceasing information war is one of the defining threats of our day. This conflict is already ongoing, but (so far, in the United States) it’s largely bloodless and so we aren’t acknowledging it despite the huge consequences hanging in the balance. It is as real as the Cold War was in the 1960s, and the stakes are staggeringly high: the legitimacy of government, the persistence of societal cohesion, even our ability to respond to the impending climate crisis.
  • Influence operations exploit divisions in our society using vulnerabilities in our information ecosystem. We have to move away from treating this as a problem of giving people better facts, or stopping some Russian bots, and move towards thinking about it as an ongoing battle for the integrity of our information infrastructure – easily as critical as the integrity of our financial markets.
Ed Webb

The Web Means the End of Forgetting - NYTimes.com - 1 views

  • for a great many people, the permanent memory bank of the Web increasingly means there are no second chances — no opportunities to escape a scarlet letter in your digital past. Now the worst thing you’ve done is often the first thing everyone knows about you.
  • a collective identity crisis. For most of human history, the idea of reinventing yourself or freely shaping your identity — of presenting different selves in different contexts (at home, at work, at play) — was hard to fathom, because people’s identities were fixed by their roles in a rigid social hierarchy. With little geographic or social mobility, you were defined not as an individual but by your village, your class, your job or your guild. But that started to change in the late Middle Ages and the Renaissance, with a growing individualism that came to redefine human identity. As people perceived themselves increasingly as individuals, their status became a function not of inherited categories but of their own efforts and achievements. This new conception of malleable and fluid identity found its fullest and purest expression in the American ideal of the self-made man, a term popularized by Henry Clay in 1832.
  • the dawning of the Internet age promised to resurrect the ideal of what the psychiatrist Robert Jay Lifton has called the “protean self.” If you couldn’t flee to Texas, you could always seek out a new chat room and create a new screen name. For some technology enthusiasts, the Web was supposed to be the second flowering of the open frontier, and the ability to segment our identities with an endless supply of pseudonyms, avatars and categories of friendship was supposed to let people present different sides of their personalities in different contexts. What seemed within our grasp was a power that only Proteus possessed: namely, perfect control over our shifting identities. But the hope that we could carefully control how others view us in different contexts has proved to be another myth. As social-networking sites expanded, it was no longer quite so easy to have segmented identities: now that so many people use a single platform to post constant status updates and photos about their private and public activities, the idea of a home self, a work self, a family self and a high-school-friends self has become increasingly untenable. In fact, the attempt to maintain different selves often arouses suspicion.
  • ...20 more annotations...
  • All around the world, political leaders, scholars and citizens are searching for responses to the challenge of preserving control of our identities in a digital world that never forgets. Are the most promising solutions going to be technological? Legislative? Judicial? Ethical? A result of shifting social norms and cultural expectations? Or some mix of the above?
  • These approaches share the common goal of reconstructing a form of control over our identities: the ability to reinvent ourselves, to escape our pasts and to improve the selves that we present to the world.
  • many technological theorists assumed that self-governing communities could ensure, through the self-correcting wisdom of the crowd, that all participants enjoyed the online identities they deserved. Wikipedia is one embodiment of the faith that the wisdom of the crowd can correct most mistakes — that a Wikipedia entry for a small-town mayor, for example, will reflect the reputation he deserves. And if the crowd fails — perhaps by turning into a digital mob — Wikipedia offers other forms of redress
  • In practice, however, self-governing communities like Wikipedia — or algorithmically self-correcting systems like Google — often leave people feeling misrepresented and burned. Those who think that their online reputations have been unfairly tarnished by an isolated incident or two now have a practical option: consulting a firm like ReputationDefender, which promises to clean up your online image. ReputationDefender was founded by Michael Fertik, a Harvard Law School graduate who was troubled by the idea of young people being forever tainted online by their youthful indiscretions. “I was seeing articles about the ‘Lord of the Flies’ behavior that all of us engage in at that age,” he told me, “and it felt un-American that when the conduct was online, it could have permanent effects on the speaker and the victim. The right to new beginnings and the right to self-definition have always been among the most beautiful American ideals.”
  • In the Web 3.0 world, Fertik predicts, people will be rated, assessed and scored based not on their creditworthiness but on their trustworthiness as good parents, good dates, good employees, good baby sitters or good insurance risks.
  • “Our customers include parents whose kids have talked about them on the Internet — ‘Mom didn’t get the raise’; ‘Dad got fired’; ‘Mom and Dad are fighting a lot, and I’m worried they’ll get a divorce.’ ”
  • as facial-recognition technology becomes more widespread and sophisticated, it will almost certainly challenge our expectation of anonymity in public
  • Ohm says he worries that employers would be able to use social-network-aggregator services to identify people’s book and movie preferences and even Internet-search terms, and then fire or refuse to hire them on that basis. A handful of states — including New York, California, Colorado and North Dakota — broadly prohibit employers from discriminating against employees for legal off-duty conduct like smoking. Ohm suggests that these laws could be extended to prevent certain categories of employers from refusing to hire people based on Facebook pictures, status updates and other legal but embarrassing personal information. (In practice, these laws might be hard to enforce, since employers might not disclose the real reason for their hiring decisions, so employers, like credit-reporting agents, might also be required by law to disclose to job candidates the negative information in their digital files.)
  • research group’s preliminary results suggest that if rumors spread about something good you did 10 years ago, like winning a prize, they will be discounted; but if rumors spread about something bad that you did 10 years ago, like driving drunk, that information has staying power
  • many people aren’t worried about false information posted by others — they’re worried about true information they’ve posted about themselves when it is taken out of context or given undue weight. And defamation law doesn’t apply to true information or statements of opinion. Some legal scholars want to expand the ability to sue over true but embarrassing violations of privacy — although it appears to be a quixotic goal.
  • Researchers at the University of Washington, for example, are developing a technology called Vanish that makes electronic data “self-destruct” after a specified period of time. Instead of relying on Google, Facebook or Hotmail to delete the data that is stored “in the cloud” — in other words, on their distributed servers — Vanish encrypts the data and then “shatters” the encryption key. To read the data, your computer has to put the pieces of the key back together, but they “erode” or “rust” as time passes, and after a certain point the document can no longer be read.
  • Plenty of anecdotal evidence suggests that young people, having been burned by Facebook (and frustrated by its privacy policy, which at more than 5,000 words is longer than the U.S. Constitution), are savvier than older users about cleaning up their tagged photos and being careful about what they post.
  • norms are already developing to recreate off-the-record spaces in public, with no photos, Twitter posts or blogging allowed. Milk and Honey, an exclusive bar on Manhattan’s Lower East Side, requires potential members to sign an agreement promising not to blog about the bar’s goings on or to post photos on social-networking sites, and other bars and nightclubs are adopting similar policies. I’ve been at dinners recently where someone has requested, in all seriousness, “Please don’t tweet this” — a custom that is likely to spread.
  • There’s already a sharp rise in lawsuits known as Twittergation — that is, suits to force Web sites to remove slanderous or false posts.
  • strategies of “soft paternalism” that might nudge people to hesitate before posting, say, drunken photos from Cancún. “We could easily think about a system, when you are uploading certain photos, that immediately detects how sensitive the photo will be.”
  • It’s sobering, now that we live in a world misleadingly called a “global village,” to think about privacy in actual, small villages long ago. In the villages described in the Babylonian Talmud, for example, any kind of gossip or tale-bearing about other people — oral or written, true or false, friendly or mean — was considered a terrible sin because small communities have long memories and every word spoken about other people was thought to ascend to the heavenly cloud. (The digital cloud has made this metaphor literal.) But the Talmudic villages were, in fact, far more humane and forgiving than our brutal global village, where much of the content on the Internet would meet the Talmudic definition of gossip: although the Talmudic sages believed that God reads our thoughts and records them in the book of life, they also believed that God erases the book for those who atone for their sins by asking forgiveness of those they have wronged. In the Talmud, people have an obligation not to remind others of their past misdeeds, on the assumption they may have atoned and grown spiritually from their mistakes. “If a man was a repentant [sinner],” the Talmud says, “one must not say to him, ‘Remember your former deeds.’ ” Unlike God, however, the digital cloud rarely wipes our slates clean, and the keepers of the cloud today are sometimes less forgiving than their all-powerful divine predecessor.
  • On the Internet, it turns out, we’re not entitled to demand any particular respect at all, and if others don’t have the empathy necessary to forgive our missteps, or the attention spans necessary to judge us in context, there’s nothing we can do about it.
  • Gosling is optimistic about the implications of his study for the possibility of digital forgiveness. He acknowledged that social technologies are forcing us to merge identities that used to be separate — we can no longer have segmented selves like “a home or family self, a friend self, a leisure self, a work self.” But although he told Facebook, “I have to find a way to reconcile my professor self with my having-a-few-drinks self,” he also suggested that as all of us have to merge our public and private identities, photos showing us having a few drinks on Facebook will no longer seem so scandalous. “You see your accountant going out on weekends and attending clown conventions, that no longer makes you think that he’s not a good accountant. We’re coming to terms and reconciling with that merging of identities.”
  • a humane society values privacy, because it allows people to cultivate different aspects of their personalities in different contexts; and at the moment, the enforced merging of identities that used to be separate is leaving many casualties in its wake.
  • we need to learn new forms of empathy, new ways of defining ourselves without reference to what others say about us and new ways of forgiving one another for the digital trails that will follow us forever
Ed Webb

Does the Digital Classroom Enfeeble the Mind? - NYTimes.com - 0 views

  • My father would have been unable to “teach to the test.” He once complained about errors in a sixth-grade math textbook, so he had the class learn math by designing a spaceship. My father would have been spat out by today’s test-driven educational regime.
  • A career in computer science makes you see the world in its terms. You start to see money as a form of information display instead of as a store of value. Money flows are the computational output of a lot of people planning, promising, evaluating, hedging and scheming, and those behaviors start to look like a set of algorithms. You start to see the weather as a computer processing bits tweaked by the sun, and gravity as a cosmic calculation that keeps events in time and space consistent. This way of seeing is becoming ever more common as people have experiences with computers. While it has its glorious moments, the computational perspective can at times be uniquely unromantic. Nothing kills music for me as much as having some algorithm calculate what music I will want to hear. That seems to miss the whole point. Inventing your musical taste is the point, isn’t it? Bringing computers into the middle of that is like paying someone to program a robot to have sex on your behalf so you don’t have to. And yet it seems we benefit from shining an objectifying digital light to disinfect our funky, lying selves once in a while. It’s heartless to have music chosen by digital algorithms. But at least there are fewer people held hostage to the tastes of bad radio D.J.’s than there once were. The trick is being ambidextrous, holding one hand to the heart while counting on the digits of the other.
  • The future of education in the digital age will be determined by our judgment of which aspects of the information we pass between generations can be represented in computers at all. If we try to represent something digitally when we actually can’t, we kill the romance and make some aspect of the human condition newly bland and absurd. If we romanticize information that shouldn’t be shielded from harsh calculations, we’ll suffer bad teachers and D.J.’s and their wares.
  • ...5 more annotations...
  • Some of the top digital designs of the moment, both in school and in the rest of life, embed the underlying message that we understand the brain and its workings. That is false. We don’t know how information is represented in the brain. We don’t know how reason is accomplished by neurons. There are some vaguely cool ideas floating around, and we might know a lot more about these things any moment now, but at this moment, we don’t. You could spend all day reading literature about educational technology without being reminded that this frontier of ignorance lies before us. We are tempted by the demons of commercial and professional ambition to pretend we know more than we do.
  • Outside school, something similar happens. Students spend a lot of time acting as trivialized relays in giant schemes designed for the purposes of advertising and other revenue-minded manipulations. They are prompted to create databases about themselves and then trust algorithms to assemble streams of songs and movies and stories for their consumption. We see the embedded philosophy bloom when students assemble papers as mash-ups from online snippets instead of thinking and composing on a blank piece of screen. What is wrong with this is not that students are any lazier now or learning less. (It is probably even true, I admit reluctantly, that in the presence of the ambient Internet, maybe it is not so important anymore to hold an archive of certain kinds of academic trivia in your head.) The problem is that students could come to conceive of themselves as relays in a transpersonal digital structure. Their job is then to copy and transfer data around, to be a source of statistics, whether to be processed by tests at school or by advertising schemes elsewhere.
  • If students don’t learn to think, then no amount of access to information will do them any good.
  • To the degree that education is about the transfer of the known between generations, it can be digitized, analyzed, optimized and bottled or posted on Twitter. To the degree that education is about the self-invention of the human race, the gargantuan process of steering billions of brains into unforeseeable states and configurations in the future, it can continue only if each brain learns to invent itself. And that is beyond computation because it is beyond our comprehension.
  • Roughly speaking, there are two ways to use computers in the classroom. You can have them measure and represent the students and the teachers, or you can have the class build a virtual spaceship. Right now the first way is ubiquitous, but the virtual spaceships are being built only by tenacious oddballs in unusual circumstances. More spaceships, please.
  •  
    How do we get this right - use the tech for what it can do well, develop our brains for what the tech can't do? Who's up for building a spaceship?
Ed Webb

A Cypherpunk's Manifesto - 0 views

  • Privacy is the power to selectively reveal oneself to the world.
  • privacy in an open society requires anonymous transaction systems
  • Privacy in an open society also requires cryptography. If I say something, I want it heard only by those for whom I intend it. If the content of my speech is available to the world, I have no privacy. To encrypt is to indicate the desire for privacy, and to encrypt with weak cryptography is to indicate not too much desire for privacy. Furthermore, to reveal one's identity with assurance when the default is anonymity requires the cryptographic signature.
  • ...4 more annotations...
  • Information expands to fill the available storage space. Information is Rumor's younger, stronger cousin; Information is fleeter of foot, has more eyes, knows more, and understands less than Rumor.
  • We the Cypherpunks are dedicated to building anonymous systems. We are defending our privacy with cryptography, with anonymous mail forwarding systems, with digital signatures, and with electronic money.
  • We don't much care if you don't approve of the software we write. We know that software can't be destroyed and that a widely dispersed system can't be shut down.
  • encryption is fundamentally a private act. The act of encryption, in fact, removes information from the public realm. Even laws against cryptography reach only so far as a nation's border and the arm of its violence. Cryptography will ineluctably spread over the whole globe, and with it the anonymous transactions systems that it makes possible
Ed Webb

Project Vigilant and the government/corporate destruction of privacy - Glenn Greenwald ... - 0 views

  • it's the re-packaging and transfer of this data to the U.S. Government -- combined with the ability to link it not only to your online identity (IP address), but also your offline identity (name) -- that has made this industry particularly pernicious.  There are serious obstacles that impede the Government's ability to create these electronic dossiers themselves.  It requires both huge resources and expertise.  Various statutes enacted in the mid-1970s -- such as the Privacy Act of 1974 -- impose transparency requirements and other forms of accountability on programs whereby the Government collects data on citizens.  And the fact that much of the data about you ends up in the hands of private corporations can create further obstacles, because the tools which the Government has to compel private companies to turn over this information is limited (the fact that the FBI is sometimes unable to obtain your "transactional" Internet data without a court order -- i.e., whom you email, who emails you, what Google searches you enter, and what websites you visit --is what has caused the Obama administration to demand that Congress amend the Patriot Act to vest them with the power to obtain all of that with no judicial supervision). But the emergence of a private market that sells this data to the Government (or, in the case of Project Vigilance, is funded in order to hand it over voluntarily) has eliminated those obstacles.
  • a wide array of government agencies have created countless programs to encourage and formally train various private workers (such as cable installers, utilities workers and others who enter people's homes) to act as government informants and report any "suspicious" activity; see one example here.  Meanwhile, TIA has been replicated, and even surpassed, as a result of private industries' willingness to do the snooping work on American citizens which the Government cannot do.
  • this arrangement provides the best of all worlds for the Government and the worst for citizens: The use of private-sector data aggregators allows the government to insulate surveillance and information-handling practices from privacy laws or public scrutiny. That is sometimes an important motivation in outsourced surveillance.  Private companies are free not only from complying with the Privacy Act, but from other checks and balances, such as the Freedom of Information Act.  They are also insulated from oversight by Congress and are not subject to civil-service laws designed to ensure that government policymakers are not influenced by partisan politics. . . .
  • ...4 more annotations...
  • There is a long and unfortunate history of cooperation between government security agencies and powerful corporations to deprive individuals of their privacy and other civil liberties, and any program that institutionalizes close, secretive ties between such organizations raises serious questions about the scope of its activities, now and in the future.
  • Many people are indifferent to the disappearance of privacy -- even with regard to government officials -- because they don't perceive any real value to it.  The ways in which the loss of privacy destroys a society are somewhat abstract and difficult to articulate, though very real.  A society in which people know they are constantly being monitored is one that breeds conformism and submission, and which squashes innovation, deviation, and real dissent. 
  • that's what a Surveillance State does:  it breeds fear of doing anything out of the ordinary by creating a class of meek citizens who know they are being constantly watched.
  • The loss of privacy is entirely one-way.  Government and corporate authorities have destroyed most vestiges of privacy for you, while ensuring that they have more and more for themselves.  The extent to which you're monitored grows in direct proportion to the secrecy with which they operate.  Sir Francis Bacon's now platitudinous observation that "knowledge itself is power" is as true as ever.  That's why this severe and always-growing imbalance is so dangerous, even to those who are otherwise content to have themselves subjected to constant monitoring.
Ed Webb

Goodbye petabytes, hello zettabytes | Technology | The Guardian - 0 views

  • Every man, woman and child on the planet using micro-blogging site Twitter for a century. For many people that may sound like a vision of hell, but for watchers of the tremendous growth of digital communications it is a neat way of presenting the sheer scale of the so-called digital universe.
  • the growing desire of corporations and governments to know and store ever more data about everyone
  • experts estimate that all human language used since the dawn of time would take up about 5,000 petabytes if stored in digital form, which is less than 1% of the digital content created since someone first switched on a computer.
  • ...6 more annotations...
  • A zettabyte, incidentally, is roughly half a million times the entire collections of all the academic libraries in the United States.
  • Mobile phones have dramatically widened the range of people who can create, store and share digital information."China now has more visible devices out on the streets being used by individuals than the US does," said McDonald. "We are seeing the democratisation and commoditisation of the use and creation of information."
  • About 70% of the digital universe is generated by individuals, but its storage is then predominantly the job of corporations. From emails and blogs to mobile phone calls, it is corporations that are storing information on behalf of consumers.
  • actions in the offline world that individuals carry out which result in digital content being created by organisations – from cashpoint transactions which a bank must record to walking along the pavement, which is likely to result in CCTV footage
  • "unstructured"
  • "You talk to a kid these days and they have no idea what a kilobyte is. The speed things progress, we are going to need many words beyond zettabyte."
Ed Webb

The Biggest Social Media Operation You've Never Heard Of Is Run Out of Cyprus by Russia... - 0 views

  • The vast majority of the company’s content is apolitical—and that is certainly the way the company portrays itself.
  • But here’s the thing: TheSoul Publishing also posts history videos with a strong political tinge. Many of these videos are overtly pro-Russian. One video posted on Feb. 17, 2019, on the channel Smart Banana, which typically posts listicles and history videos, claims that Ukraine is part of Russia
  • the video gives a heavily sanitized version of Josef Stalin’s time in power and, bizarrely, suggests that Alaska was given to the United States by Soviet leader Nikita Khruschev
  • ...10 more annotations...
  • The video ends by displaying a future vision of Russian expansion that includes most of Europe (notably not Turkey), the Middle East and Asia
  • According to Nox Influencer, Bright Side alone is earning between $314,010 and 971,950 monthly, and 5-Minute Crafts is earning between $576,640 and $1,780,000 monthly through YouTube partner earning estimates. As a privately held company, TheSoul Publishing doesn’t have to disclose its earnings. But all the Cypriot-managed company has to do to earn money from YouTube is meet viewing thresholds and have an AdSense account. AdSense, a Google product, just requires that a company have a bank account, an email address and a phone number. To monetize to this magnitude of revenue, YouTube may have also collected tax information, if TheSoul Publishing organization is conducting what it defines as “U.S. activities.” It’s also possible that YouTube verified a physical address by sending a pin mailer.
  • According to publicly available information from the YouTube channels themselves—information provided to YouTube by the people who set up and operate the channels at TheSoul Publishing—as of August 2019, 21 of the 35 channels connected to TheSoul Publishing claim to be based in the U.S. Ten of the channels had no country listed. Zodiac Maniac was registered in the U.K, though TheSoul Publishing emphasizes that all of its operations are run out of Cyprus.
  •  Now I’ve Seen Everything was the only channel registered in the Russian Federation. That channel has more than 400 million views, which, according to the analytics tool Nox Influencer, come from a range of countries, including Russia and Eastern European and Central Asian countries—despite being an English-language channel
  • In another video on Smart Banana, which has more than 1 million views, the titular banana speculates on “12 Countries That May Not Survive the Next 20 Years”—including the United States, which the video argues may collapse because of political infighting and diverse political viewpoints
  • Facebook pages are not a direct way to increase profit unless a company is actively marketing merchandise or sales, which TheSoul Publishing does not appear to do. The pages coordinate posting, so one post will often appear on a number of different pages. To a digital advertiser, this makes perfect sense as a way to increase relevance and visibility, but it’s far from obvious what TheSoul Publishing might be advertising. Likewise, there’s no obvious financial benefit to posting original videos within Facebook. The company did not meaningfully clarify its Facebook strategy in response to questions on the subject.
  • Facebook forbids what it describes as “coordinated inauthentic behavior,” as its head of cybersecurity describes in this video. While TheSoul’s Publishing’s behavior is clearly coordinated, it is unclear that any of its behavior is inauthentic based on information I have reviewed.
  • One thing that TheSoul is definitely doing on Facebook, however, is buying ads—and, at least sometimes, it’s doing so in rubles on issues of national importance, targeting audiences in the United States. The page Bright Side has 44 million followers and currently lists no account administrators located in the United States, but as of Aug. 8, 2019, it had them in Cyprus, Russia, the United Kingdom, El Salvador, India, Ukraine and in locations “Not Available.” It used Facebook to post six political advertisements paid for in the Russian currency.
  • the point here is not that the ad buy is significant in and of itself. The point, rather, is that the company has developed a massive social media following and has a history of at least experimenting with distributing both pro-Russian and paid political content to that following
  • TheSoul’s political ads included the one below. The advertisement pushes viewers to an article about how “wonderful [it is] that Donald Trump earns less in a year than you do in a month.” The advertisement reached men, women, and people of unknown genders over the ages of 18, and began running on May 15, 2018. TheSoul Publishing spent less than a dollar on this advertisement, raising the question: why bother advertising at all?
Ed Webb

DK Matai: The Rise of The Bio-Info-Nano Singularity - 0 views

  • The human capability for information processing is limited, yet there is an accelerating change in the development and deployment of new technology. This relentless wave upon wave of new information and technology causes an overload on the human mind by eventually flooding it. The resulting acopia -- inability to cope -- has to be solved by the use of ever more sophisticated information intelligence. Extrapolating these capabilities suggests the near-term emergence and visibility of self-improving neural networks, "artificial" intelligence, quantum algorithms, quantum computing and super-intelligence. This metamorphosis is so much beyond present human capabilities that it becomes impossible to understand it with the pre-conceptions and conditioning of the present mindset, societal make-up and existing technology
  • The Bio-Info-Nano Singularity is a transcendence to a wholly new regime of mind, society and technology, in which we have to learn to think in a new way in order to survive as a species.
  • What is globalized human society going to do with the mass of unemployed human beings that are rendered obsolete by the approaching super-intelligence of the Bio-Info-Nano Singularity?
  • ...5 more annotations...
  • Nothing futurists predict ever comes true, but, by the time the time comes, everybody has forgotten they said it--and then they are free to say something else that never will come true but that everybody will have forgotten they said by the time the time come
  • Most of us will become poisoned troglodytes in a techno dystopia
  • Any engineer can make 'stuff' go faster, kill deader, sort quicker, fly higher, record sharper, destroy more completely, etc.. We have a surfeit of that kind of creativity. What we need is some kind of genius to create a society that treats each other with equality, justice, caring and cooperativeness. The concept of 'singularity' doesn't excite me nearly as much as the idea that sometime we might be able to move beyond the civilization level of a troop of chimpanzees. I'm hoping that genius comes before we manage to destroy what little civilization we have with all our neat "stuff"
  • There's a lot of abstraction in this article, which is a trend of what I have read of a number of various movements taking up the Singularity cause. This nebulous but optimistic prediction of an incomprehensibly advanced future, wherein through technology and science we achieve quasi-immortality, or absolute control of thought, omniscience, or transcendence from the human entirely
  • Welcome to the Frankenstein plot. This is a very common Hollywood plot, the idea of a manmade creation running amok. The concept that the author describes can also be described as an asymtotic curve on a graph where scientific achievement parallels time at first then gradually begins to go vertical until infinite scientific knowledge and invention occurs in an incredibly short time.
Ed Webb

Tracking The Companies That Track You Online : NPR - 1 views

  • A visit to Dictionary.com resulted in 234 trackers being installed on our test computer, and only 11 of those were installed by Dictionary.com.
  • Every time I have a thought, I take an action online and Google it. So [online tracking] does build up these incredibly rich dossiers. One question is: Is knowing your name the right definition of anonymity? Right now, that is considered anonymous. If they don't know your name, they're not covered by laws that regulate personally identifiable information. And that's what the Federal Trade Commission is considering — that the definition of personal information should be expanded beyond name and Social Security number. Another thing that [online tracking] raises is sensitive information. So if you're looking at gay websites, then you're labeled as gay in some database somewhere and then you're followed around and sold on some exchange as gay, and you just may not want that to happen. So I feel like there are some categories that we as a society may not want collected: our political affiliation, our diseases, our income levels and many other things."
  • you can go to the websites of all of these tracking companies and ask them not to track you — which is absurd, because you'd have to know who they are. There is a list of all of them on the ad industry's webpage, and you can opt out of all of them at the same time. But one thing to know about tracking is they actually put a tracker on your computer saying don't track me. So you're opting in to being tracked for not being tracked
Ed Webb

P.J. O'Rourke: 'Very Little That Gets Blogged Is Of Very Much Worth' - Radio ... - 0 views

  • I'm no expert,
  • One thing a professional reporter knows that I'm not always sure that a person who isn't a reporter knows is that it is very easy to see part of an event and miss the more important part of an event, to see one thing when something else has happened. You have to be very aware of how complex most events are, and how narrow one's vision of most events are. And the police will tell you -- my father-in-law is a retired FBI agent -- and he will certainly tell you that there's nothing as unreliable as an eyewitness. You don't even have to go to the movies to see Rashomon. Just take any couple that you know that's been divorced and ask for his story of what happened, and then ask for her story of what happened.
  • It really isn't any one person. It's the experienced news organization that filters this out.
  • ...3 more annotations...
  • If I have a gripe with the Internet, it isn't short attention spans, it isn't blogging, or it isn't ease of idiot communication. It would be that the initial effect of the Internet, probably because it has academic origins rather than economic origins, was to devalue content. And I mean that in a gross monetary sense. The idea was that information was suddenly free. Information is not free. You [always] pay a price for information. Sometimes the price is just paying attention or being careful. But usually there's a monetary price involved because it costs money to get people out there who know what they're doing and have reasonable judgment and knowledge and perspective and background, and you don't want it to be free. It's not going to be terribly expensive, it's probably going to be cheaper than what newspapers have come to cost.
  • when it comes to the more important analytical side of news, where it is important say for instance for a news organization to have a team of experienced reporters in place with the background knowledge of the place they're in and contacts they've developed over time, you can't replace that with a random backpacker tweeting from Tajikistan
  • The job wasn't to speak truth to power. Anybody can speak truth to power if they're far enough away from the power.
Ed Webb

ARM Chips May Spread Into Everyday Items - NYTimes.com - 0 views

  • the so-called Internet of Things, when all sorts of everyday objects will have tiny chips placed inside them and gain the ability to process information and talk to the Web
  • Even conservative estimates predict billions of devices coming online soon
  • when talking about the Internet of Things, Mr. Flautner and other ARM executives are anything but laid-back as they argue that Intel stands as an unwanted guest in the new world. Intel and Microsoft secure the vast majority of profits available in computers and servers, they say, leaving the likes of Hewlett-Packard, Dell and Acer to fight over a few dollars per machine. Consumers electronics companies and others fail to see the merits in a repeat performance. “Who cares about the PC?” Mr. Flautner said. “I would love to lose mine. Now, it’s all about penetrating these weird markets that we can’t even fully fathom yet.”
Ed Webb

Anti-piracy tool will harvest and market your emotions - Computerworld Blogs - 0 views

  • After being awarded a grant, Aralia Systems teamed up with Machine Vision Lab in what seems like a massive invasion of your privacy beyond "in the name of security." Building on existing cinema anti-piracy technology, these companies plan to add the ability to harvest your emotions. This is the part where it seems that filmgoers should be eligible to charge movie theater owners. At the very least, shouldn't it result in a significantly discounted movie ticket?  Machine Vision Lab's Dr Abdul Farooq told PhysOrg, "We plan to build on the capabilities of current technology used in cinemas to detect criminals making pirate copies of films with video cameras. We want to devise instruments that will be capable of collecting data that can be used by cinemas to monitor audience reactions to films and adverts and also to gather data about attention and audience movement. ... It is envisaged that once the technology has been fine tuned it could be used by market researchers in all kinds of settings, including monitoring reactions to shop window displays."  
  • The 3D camera data will "capture the audience as a whole as a texture."
  • the technology will enable companies to cash in on your emotions and sell that personal information as marketing data
  • ...4 more annotations...
  • "Within the cinema industry this tool will feed powerful marketing data that will inform film directors, cinema advertisers and cinemas with useful data about what audiences enjoy and what adverts capture the most attention. By measuring emotion and movement film companies and cinema advertising agencies can learn so much from their audiences that will help to inform creativity and strategy.” 
  • hey plan to fine-tune it to monitor our reactions to window displays and probably anywhere else the data can be used for surveillance and marketing.
  • Muslim women have got the right idea. Soon well all be wearing privacy tents.
  • In George Orwell's novel 1984, each home has a mandatory "telescreen," a large flat panel, something like a TV, but with the ability for the authorities to observer viewers in order to ensure they are watching all the required propaganda broadcasts and reacting with appropriate emotions. Problem viewers would be brought to the attention of the Thought Police. The telescreen, of course, could not be turned off. It is reassuring to know that our technology has finally caught up with Oceania's.
Ed Webb

FT.com / UK - Towards the empathic civilisation - 0 views

  • The great turning points occur when new, more complex energy regimes converge with communications revolutions, fundamentally altering human consciousness in the process. This happened in the late 18th century, when coal and steam power ushered in the industrial age. Print technology was vastly improved and became the medium to organise myriad new activities. It also changed the wiring of the human brain, leading to a great shift from theological to ideological consciousness. Enlightenment philosophers - with some exceptions - peered into the psyche and saw a rational creature obsessed with autonomy and driven by the desire to acquire property and wealth.Today, we are on the verge of another seismic shift. Distributed information and communication technologies are converging with distributed renewable energies, creating the infrastructure for a third industrial revolution. Over the next 40 years, millions of buildings will be overhauled to collect the surrounding renewable energies. These energies will be stored in the form of hydrogen and any surplus electricity will be shared over continental inter-grids managed by internet technologies. People will generate their own energy, just as they now create their own information and, as with information, share it with millions of others.
  • the early stages of a transformation from ideological consciousness to biosphere consciousness
  • This new understanding goes hand-in-hand with discoveries in evolutionary biology, neuro-cognitive science and child development that reveal that human beings are biologically predisposed to be empathic.
  • ...2 more annotations...
  • The millennial generation is celebrating the global commons every day, apparently unmindful of Hardin's warning. For millennials, the notion of collaborating to advance the collective interest in networks often trumps "going it alone" in markets
  • We think of property as the right to exclude others from something. But property has also meant the right of access to goods held in common - the right to navigate waterways, enjoy public parks and beaches, and so on. This second definition is particularly important now because quality of life can only be realised collectively - for example, by living in unpolluted environments and safe communities. In the new era, the right to be included in "a full life" - the right to access - becomes the most important "property value
Ed Webb

Smartphones are making us stupid - and may be a 'gateway drug' | The Lighthouse - 0 views

  • rather than making us smarter, mobile devices reduce our cognitive ability in measurable ways
  • “There’s lots of evidence showing that the information you learn on a digital device, doesn’t get retained very well and isn’t transferred across to the real world,”
  • “You’re also quickly conditioned to attend to lots of attention-grabbing signals, beeps and buzzes, so you jump from one task to the other and you don’t concentrate.”
  • ...16 more annotations...
  • Not only do smartphones affect our memory and our concentration, research shows they are addictive – to the point where they could be a ‘gateway drug’ making users more vulnerable to other addictions.
  • Smartphones are also linked to reduced social interaction, inadequate sleep, poor real-world navigation, and depression.
  • “The more time that kids spend on digital devices, the less empathetic they are, and the less they are able to process and recognise facial expressions, so their ability to actually communicate with each other is decreased.”
  • “Casino-funded research is designed to keep people gambling, and app software developers use exactly the same techniques. They have lots of buzzes and icons so you attend to them, they have things that move and flash so you notice them and keep your attention on the device.”
  • Around 90 per cent of US university students are thought to experience ‘phantom vibrations', so the researcher took a group to a desert location with no cell reception – and found that even after four days, around half of the students still thought their pocket was buzzing with Facebook or text notifications.
  • “Collaboration is a buzzword with software companies who are targeting schools to get kids to use these collaboration tools on their iPads – but collaboration decreases when you're using these devices,”
  • “All addiction is based on the same craving for a dopamine response, whether it's drug, gambling, alcohol or phone addiction,” he says. “As the dopamine response drops off, you need to increase the amount you need to get the same result, you want a little bit more next time. Neurologically, they all look the same.“We know – there are lots of studies on this – that once we form an addiction to something, we become more vulnerable to other addictions. That’s why there’s concerns around heavy users of more benign, easily-accessed drugs like alcohol and marijuana as there’s some correlation with usage of more physically addictive drugs like heroin, and neurological responses are the same.”
  • parents can also fall victim to screens which distract from their child’s activities or conversations, and most adults will experience this with friends and family members too.
  • “We also know that if you learn something on an iPad you are less likely to be able to transfer that to another device or to the real world,”
  • a series of studies have tested this with children who learn to construct a project with ‘digital’ blocks and then try the project with real blocks. “They can’t do it - they start from zero again,”
  • “Our brains can’t actually multitask, we have to switch our attention from one thing to another, and each time you switch, there's a cost to your attentional resources. After a few hours of this, we become very stressed.” That also causes us to forget things
  • A study from Norway recently tested how well kids remembered what they learned on screens. One group of students received information on a screen and were asked to memorise it; the second group received the same information on paper. Both groups were tested on their recall.Unsurprisingly, the children who received the paper version remembered more of the material. But the children with the electronic version were also found to be more stressed,
  • The famous ‘London taxi driver experiments’ found that memorising large maps caused the hippocampus to expand in size. Williams says that the reverse is going to happen if we don’t use our brain and memory to navigate. “Our brains are just like our muscles. We ‘use it or lose it’ – in other words, if we use navigation devices for directions rather than our brains, we will lose that ability.”
  • numerous studies also link smartphone use with sleeplessness and anxiety. “Some other interesting research has shown that the more friends you have on social media, the less friends you are likely to have in real life, the less actual contacts you have and the greater likelihood you have of depression,”
  • 12-month-old children whose carers regularly use smartphones have poorer facial expression perception
  • turning off software alarms and notifications, putting strict time limits around screen use, keeping screens out of bedrooms, minimising social media and replacing screens with paper books, paper maps and other non-screen activities can all help minimise harm from digital devices including smartphones
Ed Webb

Supreme court cellphone case puts free speech - not just privacy - at risk | Opinion | ... - 0 views

  • scholars are watching Carpenter’s case closely because it may require the supreme court to address the scope and continuing relevance of the “third-party-records doctrine”, a judicially developed rule that has sometimes been understood to mean that a person surrenders her constitutional privacy interest in information that she turns over to a third party. The government contends that Carpenter lacks a constitutionally protected privacy interest in his location data because his cellphone was continually sharing that data with his cellphone provider.
  • Privacy advocates are rightly alarmed by this argument. Much of the digital technology all of us rely on today requires us to share information passively with third parties. Visiting a website, sending an email, buying a book online – all of these things require sharing sensitive data with internet service providers, merchants, banks and others. If this kind of commonplace and unavoidable information-sharing is sufficient to extinguish constitutional privacy rights, the digital-age fourth amendment will soon be a dead letter.
  • “Awareness that the government may be watching chills associational and expressive freedoms,” Chief Justice John Roberts wrote. Left unchecked, he warned, new forms of surveillance could “alter the relationship between citizen and government in a way that is inimical to democratic society”.
Ed Webb

Glenn Greenwald: How America's Surveillance State Breeds Conformity and Fear | Civil Li... - 0 views

  • The Surveillance State hovers over any attacks that meaningfully challenge state-appropriated power. It doesn’t just hover over it. It impedes it, it deters it and kills it.  That’s its intent. It does that by design.
  • the realization quickly emerged that, allowing government officials to eavesdrop on other people, on citizens, without constraints or oversight, to do so in the dark, is a power that gives so much authority and leverage to those in power that it is virtually impossible for human beings to resist abusing that power.  That’s how potent of a power it is.
  • If a dictator takes over the United States, the NSA could enable it to impose total tyranny, and there would be no way to fight back.
  • ...23 more annotations...
  • Now it’s virtually a religious obligation to talk about the National Security State and its close cousin, the Surveillance State, with nothing short of veneration.
  • The NSA, beginning 2001, was secretly ordered to spy domestically on the communications of American citizens. It has escalated in all sorts of lawless, and now lawful ways, such that it is now an enormous part of what that agency does. Even more significantly, the technology that it has developed is now shared by a whole variety of agencies, including the FBI
  • Now, the Patriot Act is completely uncontroversial. It gets renewed without any notice every three years with zero reforms, no matter which party is in control.
  • hey are two, as I said, established Democrats warning that the Democratic control of the Executive branch is massively abusing this already incredibly broad Patriot Act. And one of the things they are trying to do is extract some basic information from the NSA about what it is they’re doing in terms of the surveillance on the American people.  Because even though they are on the Intelligence Committee, they say they don’t even know the most basic information about what the NSA does including even how many Americans have had their e-mails read or had their telephone calls intercepted by the NSA.
  • "We can’t tell you how many millions of Americans are having their e-mails read by us, and their telephone calls listened in by us, because for us to tell you that would violate the privacy of American citizens."
  • An article in Popular Mechanics in 2004 reported on a study of American surveillance and this is what it said: “There are an estimated 30 million surveillance cameras now deployed in the United States shooting 4 billion hours of footage a week. Americans are being watched. All of us, almost everywhere.” There is a study in 2006 that estimated that that number would quadruple to 100 million cameras -- surveillance cameras -- in the United States within five years largely because of the bonanza of post-9/11 surveilling. 
  • it’s not just the government that is engaged in surveillance, but just as menacingly, corporations, private corporations, engage in huge amounts of surveillance on us. They give us cell phones that track every moment of where we are physically, and then provide that to law enforcement agencies without so much as a search warrant.  Obviously, credit card and banking transactions are reported, and tell anyone who wants to know everything we do. We talk about the scandal of the Bush eavesdropping program that was not really a government eavesdropping program, so much as it was a private industry eavesdropping program. It was done with the direct and full cooperation of AT&T, Sprint, Verizon and the other telecom giants. In fact, when you talk about the American Surveillance State, what you’re really talking about is no longer public government agencies. What you’re talking about is a full-scale merger between the federal government and industry. That is what the Surveillance State is
  • The principle being that there can be no human interaction, especially no human communication, not just for international between foreign nations but by America citizens on American soils that is beyond the reach of the U.S. government.
  • at exactly the same time that the government has been massively expanding its ability to know everything that we’re doing it has simultaneously erected a wall of secrecy around it that prevents us from knowing anything that they’re doing
  • government now operates with complete secrecy, and we have none
  • it makes people believe that they’re free even though they’ve been subtly convinced that there are things that they shouldn’t do that they might want to do
  • what has happened in the last three to four years is a radical change in the war on terror. The war on terror has now been imported into United States policy. It is now directed at American citizens on American soil. So rather than simply sending drones to foreign soil to assassinate foreign nationals, we are now sending drones to target and kill American citizens without charges or trial. Rather than indefinitely detaining foreign nationals like Guantanamo, Congress last year enacted, and President Obama signed, the National Defense Authorization Act that permits the detention -- without trial, indefinitely -- of American citizens on U.S. soil.
  • this is what the Surveillance State is designed to do.  It’s justified, in the name of terrorism, of course that’s the packaging in which it’s wrapped, that’s been used extremely, and in all sorts of ways, since 9/11 for domestic application. And that’s being, that’s happening even more. It’s happening in terms of the Occupy movement and the infiltration that federal officials were able to accomplish using Patriot Act authorities. It’s happened with pro-Palestinian activists in the United States and all other dissident groups that have themselves [dealt with] with surveillance and law enforcement used by what was originally the war on terror powers.
  • if the government is able to know what we speak about and know who we’re talking to, know what it is that we’re planning, it makes any kind of activism extremely difficult. Because secrecy and privacy are prerequisites to effective actions.
  • we are training our young citizens to live in a culture where the expect they are always being watched. And we want them to be chilled, we want them to be deterred, we want them not to ever challenge orthodoxy or to explore limits where engaging creativity in any kind. This type of surveillance, by design, breeds conformism.  That’s its purpose. that’s what makes surveillance so pernicious.
  • f you go and speak to communities of American Muslims is you find an incredibly pervasive climate of fear.
  • This climate of fear creates limits around the behavior in which they’re willing to engage in very damaging ways
  • governments, when they want to give themselves abusive and radical powers, typically first target people who they think their citizens won’t care very much about, because they’ll think they’re not affected by it
  • the psychological effects on East German people endure until today. The way in which they have been trained for decades to understand that there are limits to their life, even once you remove the limits, they’ve been trained that those are not things they need to transgress.
  • Rosa Luxembourg said, “He who does not move does not notice his chains.”
  • You can acculturate people to believing that tyranny is freedom, that their limits are actually emancipations and freedom, that is what this Surveillance State does, by training people  to accept their own conformity that they are actually free, that they no longer even realize the ways in which they’re being limited.
  • important means of subverting this one-way mirror that I’ve described is forcible, radical transparency. It’s one of the reasons I support, so enthusiastically and unqualafiably, groups like Anonymous and WikiLeaks. I want holes to be blown in the wall of secrecy.
  • There are things like the Tor project and other groups that enable people to use the internet without any detection from government authorities. That has the effect of preventing regimes that actually bar their citizens from using the Internet from doing so since you can no longer trace the origins of the Internet user. But it also protects people who live in countries like ours where the government is trying to constantly monitor what we do by sending our communications through multiple proxies around the world that can’t be invaded. There’s really a war taking place: an arms race where the government and these groups are attempting to stay one tactical step ahead of the other. In terms of ability to shield internet communications from the government and the government’s ability to invade them and participating in this war in ways that are supportive of the “good side” are really critical as is veiling yourself from the technology that exists, to make what you do as tight as possible.
Ed Webb

How the Google/Verizon proposal could kill the internet in 5 years - 0 views

  • Okay, hackers, it's time to use your powers for good.
    • Ed Webb
       
      Here's the cyberpunk response
  • The "public internet" is for the poor Pledging to keep the "public internet" neutral is great, but what happens when companies stop wanting to offer their services on it? Googlezon has the answer: In their proposal, they say that it's perfectly OK for companies and consumers to buy non-neutral, non-public "special services" online. If you're a media company that streams videogames, for example, your customers want a guarantee that the game won't stall out because of a crappy "public internet" connection. So you make your game available only to people with the special service "gamer package." Your customers pay you; you pay Googlezon; now there's a superfast connection for the privileged few with money to burn. And what happens when news websites start delivering their pretty pictures and infographics in 3D? Verizon has already suggested 3D is a perfect "special service" to deliver in a non-neutral way. In five years, the public internet is going to look boring and obsolete. Where's the 3D? Where are all the cool games and streaming viddies? The public internet? Yeah, that's just for poor people. But guess what's going to remain on the public net, the place where you go when you don't have money? Certainly there will be educational resources like Wikipedia. But mostly it's going to be advertisement-saturated free content from major entertainment companies. And of course there will be many opportunities to give your personal information to Facebook, or gamble away your non-existent savings on Zynga games. (Sorry - did I say gamble? I meant "pay for premium poker game content.") Put in brick-and-mortar terms: There won't be any produce markets on the public internet, but there will be plenty of liquor stores.
  • the special "conservative service" package
  • ...3 more annotations...
  • Googlezon will be a gatekeeper not just for new web services but also for content. The companies can choose to support services from any small business they like, and block others. Same goes for sites providing news or entertainment. Googlezon might make an agreement with the New York Times to load its pages faster than the Washington Post. And Googlezon might not load io9 at all, unless of course you're reading this blog via the Google Reader (as part of the "special service" package called "blogs and podcasts")
  • if you access the internet via your Android phone (or other mobile device), there will be no public internet at all. Your access to the web will be determined by your carrier
  • A burning vision of the internet in 2016 The public internet is basically overrun with 4Chan-like social networks that run very slowly and are drenched in advertising and spyware. You can watch some TV on the public internet, if you're willing to wait through long "buffering" times and bad commercials. You can play casual games, especially if you want to fork over a few bucks. There's webmail, though sometimes all your saved messages disappear - for "guaranteed backups" you need to subscribe to the special mail service via Googlezon. Plus, the only way to get to the public internet is with an unwieldy laptop, which sucks. Most people go online with their mobiles. Anybody who wants to get access to games, movies, news, or other services online has to buy separate "special service" packages to make sure they run fast. Premium services guarantee you can watch movies on your Droid, or do your mail and calendaring on your Nexus SE234. An informal market in special service minutes springs up anywhere that people are too poor to get a mobile that does more than make phone calls. Ironically, the public internet is the least public place online: It's an antisocial space, a crumbling, unsupported legacy network, full of ads and graffiti. Googlezon has succeeded in creating a caste system in the online world, and the public is the lowest caste of all.
1 - 20 of 59 Next › Last »
Showing 20 items per page