{"id":10432,"date":"2012-06-13T10:57:56","date_gmt":"2012-06-13T14:57:56","guid":{"rendered":"http:\/\/thesocietypages.org\/cyborgology\/?p=10432"},"modified":"2012-06-14T15:37:28","modified_gmt":"2012-06-14T19:37:28","slug":"a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont","status":"publish","type":"post","link":"https:\/\/thesocietypages.org\/cyborgology\/2012\/06\/13\/a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont\/","title":{"rendered":"A New Privacy, Pt. 2: Disclosure (Damned If You Do, Damned If You Don\u2019t)"},"content":{"rendered":"<div class=\"mceTemp mceIEcenter\">\n<figure id=\"attachment_10461\" aria-describedby=\"caption-attachment-10461\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/06\/13\/a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont\/peeping-tom-bathroom-2\/\" rel=\"attachment wp-att-10461\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-10461\" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/peeping-tom-bathroom1.jpg\" alt=\"\" width=\"500\" height=\"355\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/peeping-tom-bathroom1.jpg 500w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/peeping-tom-bathroom1-300x213.jpg 300w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><figcaption id=\"caption-attachment-10461\" class=\"wp-caption-text\">This image is on the Internet. Whose fault is that? (Is it anyone&#39;s fault, per se?)<\/figcaption><\/figure>\n<\/div>\n<p>Last month in Part I (<a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/05\/21\/a-new-privacy-pt-i-distributed-agency-the-myth-of-autonomy\/\">Distributed Agency and the Myth of Autonomy<\/a>), I used the TtW2012 \u201c<a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/05\/10\/ttw12-panel-spotlight-logging-off-disconnection\/\">Logging Off and Disconnection<\/a>\u201d panel as a starting point to consider whether it is possible to abstain completely from digital social technologies, and came to the conclusion that the answer is \u201cno.\u201d Rejecting digital social technologies can mean significant losses in social capital; depending on the expectations of the people closest to us, rejecting digital social technologies can mean seeming to reject our loved ones (or &#8220;liked ones&#8221;) as well. Even if we choose to take those risks, digital social technologies are <a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/05\/10\/social-media-you-can-log-off-but-you-cant-opt-out\/\">non-optional systems<\/a>; we can choose not to use them, but we cannot choose to live in a world where we are not affected by other people\u2019s choices to use digital social technologies.<\/p>\n<p>I used Facebook as an example to show that we are always <em>connected<\/em> to digital social technologies, whether we are <em>connecting<\/em> through them or not. Facebook (and other companies) collect what I call <em>second-hand data<\/em>, or data about people other those from whom the data is collected. This means that <strong>whether we leave digital traces is not a decision we can make autonomously, as our friends, acquaintances, and contacts also make these decisions for us<\/strong>. We cannot escape being connected to digital social technologies anymore than we can escape society itself.<\/p>\n<p>This week, I examine two prevailing privacy discourses\u2014one championed by journalists and bloggers, the other championed by digital technology companies\u2014to show that, although our connections to digital social technology are out of our hands, we still conceptualize privacy as a matter of individual choice and control, <a href=\"http:\/\/thenewinquiry.com\/essays\/your-friends-and-neighbors\/\">as something individuals can \u2018own\u2019<\/a>. <strong>Clinging to the myth of individual autonomy, however, leads us to think about privacy in ways that mask both structural inequality and larger issues of power.<!--more--><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Disclosure: Damned If You Do, and Damned If You Don&#8217;t<\/strong><\/p>\n<figure id=\"attachment_10437\" aria-describedby=\"caption-attachment-10437\" style=\"width: 300px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/06\/13\/a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont\/privacy-not-up-to-you\/\" rel=\"attachment wp-att-10437\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-10437\" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/privacy-not-up-to-you-300x225.jpg\" alt=\"\" width=\"300\" height=\"225\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/privacy-not-up-to-you-300x225.jpg 300w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/privacy-not-up-to-you.jpg 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><figcaption id=\"caption-attachment-10437\" class=\"wp-caption-text\">Your privacy is out of your hands, but protecting it is still your responsibility.<\/figcaption><\/figure>\n<p>Inescapable connection notwithstanding, we still largely conceptualize disclosure as an individual choice, and privacy as a personal responsibility. This is particularly unsurprising in the United States, where an obsession with self-determination is foundational not only to the radical individualism that increasingly characterizes American culture, but also to much of our national mythology (to let go of the \u2018autonomous individual\u2019 would be to relinquish the \u201cbootstrap\u201d narrative, the mirage of meritocracy, and the shaky belief that bad things don\u2019t happen to good people, among other things).<\/p>\n<p>Though the intersection of digital interaction and personal information is hardly localized to the United States, major digital social technology companies such as Facebook and Google are headquartered in the U.S.; perhaps relatedly, the two primary discourses of privacy within that intersection share a good deal of underlying ideology with U.S. national mythology. The first of these discourses centers on a paradigm that I\u2019ll call <em>Shame On You<\/em>, and spotlights issues of privacy and agency; the second centers on a paradigm that I\u2019ll call <em>Look At Me<\/em>, and spotlights issues of privacy and identity.<\/p>\n<figure id=\"attachment_10445\" aria-describedby=\"caption-attachment-10445\" style=\"width: 300px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/06\/13\/a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont\/dear-victim\/\" rel=\"attachment wp-att-10445\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-10445 \" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/dear-victim-300x228.jpg\" alt=\"\" width=\"300\" height=\"228\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/dear-victim-300x228.jpg 300w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/dear-victim-500x381.jpg 500w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/dear-victim.jpg 620w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><figcaption id=\"caption-attachment-10445\" class=\"wp-caption-text\">Blaming the victim.<\/figcaption><\/figure>\n<p>\u201cYou shouldn\u2019t have put it on the Internet, stupid!\u201d Within the <em>Shame On You<\/em> paradigm, <strong>the control of personal information and the protection of personal privacy are not just individual responsibilities, but also moral obligations<\/strong>. Choosing to disclose is at best a risk and a liability; at worst, it is the moment we bring upon ourselves any unwanted social, emotional, or economic impacts that will stem (at any point, and in any way) from either an intended or an unintended audience\u2019s access to something we have made digitally available. Disclosure is framed as an individual choice, though we need not choose intentionally or even knowingly; it can be the choice to disclose information, the choice to make incorrect assumptions about to whom information is (or will be) accessible, or the choice to remain ignorant of what, when, by whom, how, and to what end that information can be made accessible.<\/p>\n<p>A privacy violation is therefore ultimately a failure of vigilance, a failure of prescience; it redefines as disclosure the instant in which we should have known better, regardless of what it is we should have known. Accordingly, <strong>the greatest shame in compromised privacy is not what is exposed, but the fact of exposure itself<\/strong>. We judge people less for <a href=\"http:\/\/swampland.time.com\/2011\/05\/31\/weinergate-anatomy-of-a-social-media-scandal\/\">showing women their genitals<\/a>, and more for being reckless enough <a href=\"http:\/\/abcnews.go.com\/Politics\/rep-anthony-weiner-picture\/story?id=13774605\">to get caught<\/a> <a href=\"http:\/\/thehill.com\/capital-living\/in-the-know\/217437-a-year-after-scandal-anthony-weiners-twitter-page-still-up\">doing so on Twitter<\/a>.<\/p>\n<figure id=\"attachment_10436\" aria-describedby=\"caption-attachment-10436\" style=\"width: 245px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/06\/13\/a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont\/location-pinpoint\/\" rel=\"attachment wp-att-10436\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-10436  \" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/location-pinpoint.jpg\" alt=\"\" width=\"245\" height=\"183\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/location-pinpoint.jpg 425w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/location-pinpoint-300x224.jpg 300w\" sizes=\"auto, (max-width: 245px) 100vw, 245px\" \/><\/a><figcaption id=\"caption-attachment-10436\" class=\"wp-caption-text\">Your location data can be used in ways you never anticipated. Is that your fault?<\/figcaption><\/figure>\n<p><em>Shame On You<\/em> was showcased most recently in the commentary surrounding the controversial iPhone app \u201cGirls Around Me,\u201d which used a combination of public Google Maps data, public Foursquare check-ins, and \u2018publicly available\u2019<a title=\"\" href=\"#_edn1\">[i]<\/a> Facebook information to create a display of nearby women. The creators of Girls Around Me claimed their so-called \u201ccreepy\u201d app was being <a href=\"http:\/\/mashable.com\/2012\/04\/02\/girls-around-me-defense\/\">targeted as a scapegoat<\/a>, and insisted that the app could just as well be used to locate men instead of women. Nonetheless, the creators\u2019 use of the diminutive term \u201cgirls\u201d rather than the more accurate term \u201cwomen\u201d exemplifies <a href=\"http:\/\/www.wakemag.org\/voices\/i%E2%80%99m-a-woman-not-a-girl-you-sexist-shit-head\/\">the sexism<\/a> and the objectification of women on which the app was designed to capitalize. (If the app\u2019s graphic design somehow failed to make this clear, see also one developer\u2019s comments about using Girls Around Me to \u201c<a href=\"http:\/\/www.cultofmac.com\/158764\/developers-behind-girls-around-me-stalking-app-explain-themselves-exclusive-interview\/\">[avoid] ugly women on a night out<\/a>\u201d).<\/p>\n<p>The telling use of \u201cgirls\u201d seemed to pass uncommented upon, however, and most accounts of the controversy (with <a href=\"http:\/\/www.huffingtonpost.co.uk\/helen-crane\/girls-around-me-dont-blame-the-technology_b_1401124.html\">few<\/a> <a href=\"http:\/\/www.forbes.com\/sites\/kashmirhill\/2012\/04\/02\/the-reaction-to-girls-around-me-was-far-more-disturbing-than-the-creepy-app-itself\/\">exceptions<\/a>) omitted gender and power dynamics from the discussion\u2014as well as \u201c<a href=\"http:\/\/www.theatlantic.com\/technology\/archive\/12\/04\/the-girls-around-me-problem-isnt-just-about-data-but-sexism\/255424\/\">society, norms, politics, values and everything else confusing about the analogue world<\/a>.\u201d The result was <strong>a powerful but unexamined synergy between <em>Shame On You<\/em> and the politics of sex and visibility, one that cast as transgressors women who had dared not only to go out in public, but to publicly declare where they had gone<\/strong>.<\/p>\n<p><a href=\"http:\/\/www.pcworld.com\/article\/253089\/girls_around_me_one_womans_defense_of_the_stalking_app.html\">Women<\/a> and <a href=\"http:\/\/www.cultofmac.com\/157641\/this-creepy-app-isnt-just-stalking-women-without-their-knowledge-its-a-wake-up-call-about-facebook-privacy\/\">men<\/a> alike <a href=\"http:\/\/open.salon.com\/blog\/spelzmann\/2012\/03\/30\/girls_around_me_creeper_app_just_might_get_people_to_pay_attention_to_privacy_settings\">uncritically reproduced<\/a> the app\u2019s demeaning language by referring to \u201cgirls\u201d throughout their commentaries; many argued that <a href=\"http:\/\/www.antipope.org\/charlie\/blog-static\/2012\/03\/not-an-april-fool-1.html\">the app was not the problem<\/a>, and insisted furthermore that its developers<a href=\"http:\/\/www.theatlantic.com\/technology\/archive\/2012\/04\/deconstructing-the-creepiness-of-the-girls-around-me-app-151-and-what-facebook-could-do-about-it\/255351\/\"> had done nothing wrong<\/a>. The blogger who broke the Girls Around Me story explicitly states that \u201c<a href=\"http:\/\/www.cultofmac.com\/157641\/this-creepy-app-isnt-just-stalking-women-without-their-knowledge-its-a-wake-up-call-about-facebook-privacy\/\">the real problem<\/a>\u201d is not the app (which was made by \u201cguys\u201d who are \u201csuper nice,\u201d and which was \u201cmeant to be all in good fun\u201d), but rather people who, \u201cout of ignorance, apathy or laziness,\u201d do not opt-out of allowing strangers to view their information. He and a number of others hope Girls Around Me will serve as \u201ca wake up call\u201d to \u201c<a href=\"http:\/\/open.salon.com\/blog\/spelzmann\/2012\/03\/30\/girls_around_me_creeper_app_just_might_get_people_to_pay_attention_to_privacy_settings\">girls who have failed to lock down their info<\/a>\u201d and to \u201c<a href=\"http:\/\/www.pcworld.com\/article\/253089\/girls_around_me_one_womans_defense_of_the_stalking_app.html\">those who publicly overshare<\/a>,\u201d since \u201c<a href=\"http:\/\/www.huffingtonpost.com\/larry-magid\/girls-around-me-app_b_1419123.html\">we all have a responsibility to protect our own privacy<\/a>\u201d instead of leaving \u201c<a href=\"http:\/\/www.forbes.com\/sites\/rogerkay\/2012\/04\/02\/what-girls-around-me-says-about-us\/\">all our information out there waving in the wind<\/a>.\u201d<\/p>\n<p>Another blogger admonishes that, \u201c<a href=\"http:\/\/www.cultofmac.com\/158170\/stop-apps-from-tracking-you-using-foursquare-and-facebook-how-to\/\">the only way to really stay off the grid<\/a> is to never sign up for these services in the first place. Failing that, you really should take your online privacy seriously. After all, Facebook isn\u2019t going to help you, as the more you share, the more valuable you are to its real customers, the advertisers. You really need to take responsibility for yourself.\u201d Still another argues that conventional standards of morality and behavior no longer apply to digitally mediated actions, because \u201c<a href=\"http:\/\/news.cnet.com\/8301-31322_3-57408165-256\/girls-around-me-and-the-end-of-internet-innocence\/\">publishing anything <em>publicly<\/em> online means you have, in fact, opted in<\/a>\u201d\u2014to any and every conceivable (or inconceivable) use of whatever one might have made available. The pervasive tone of moral superiority, both in these articles and in others like them, proclaims loudly and clearly: <em>Shame On You<\/em>\u2014for being foolish, ignorant, careless, na\u00efve, or (worst of all) <a href=\"http:\/\/www.forbes.com\/sites\/kashmirhill\/2012\/04\/02\/the-reaction-to-girls-around-me-was-far-more-disturbing-than-the-creepy-app-itself\/\">deliberately choosing<\/a> to put yourself on digital display.<\/p>\n<figure id=\"attachment_10442\" aria-describedby=\"caption-attachment-10442\" style=\"width: 150px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/06\/13\/a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont\/anti-woman\/\" rel=\"attachment wp-att-10442\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-10442 \" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/anti-woman.jpg\" alt=\"\" width=\"150\" height=\"150\" \/><\/a><figcaption id=\"caption-attachment-10442\" class=\"wp-caption-text\">Sexism: still alive and well.<\/figcaption><\/figure>\n<p><strong>Accounts such as these serve not only to deflect attention away from problems like sexism and objectification, but to normalize and naturalize a veritable litany of questionable phenomena:<\/strong> pervasive surveillance, predatory data collection, targeted ads, deliberately obtuse privacy policies, <a href=\"http:\/\/howto.cnet.com\/8301-11310_39-20033968-285\/how-to-take-back-your-privacy-from-data-brokers\/\">onerous opt-out procedures<\/a>, neoliberal self-interest, the <a href=\"http:\/\/news.cnet.com\/8301-1023_3-57407347-93\/no-joke-al-franken-rings-alarm-over-facebook-google\/\">expanding power of social media companies<\/a>, the <a href=\"http:\/\/www.antipope.org\/charlie\/blog-static\/2012\/03\/not-an-april-fool-1.html\">repackaging of users as products<\/a>, and the simultaneous monetization and commoditization of information, to name just a few. These accounts perpetuate the myth that we are all autonomous individuals, isolated and distinct, endowed with indomitable agency and afforded infinite arrays of choices.<\/p>\n<p>With other variables obfuscated or reduced to the background noise of normalcy, the only things left to blame for unanticipated or unwanted outcomes&#8211;or for our disquietude at observing such outcomes&#8211;are those individuals who choose to expose themselves in the first place. <em>Of course<\/em> corporations try to coerce us into \u201cputting out\u201d information, and <em>of course <\/em>they will take anything they can get if we are not careful; this is just their nature. It is up to us to be good users, to keep telling them no, to remain vigilant and distrustful (even if we like them), and <em>never<\/em> to let them go all the way. <strong>We are to <a href=\"http:\/\/www.washingtonpost.com\/blogs\/the-fix\/post\/foster-freiss-santorum-backer-jokes-about-using-aspirin-as-birth-control\/2012\/02\/16\/gIQA5yoAIR_blog.html\">keep the aspirin between our knees<\/a>, and our data to ourselves<\/strong>.<\/p>\n<p><em>Shame On You<\/em> extends beyond disclosure to corporations, and\u2014for all its implicit digital dualism\u2014beyond digitally mediated disclosure as well. Case in point: during the course of writing this essay, I received a mass-emailed \u201cCommunity Alert Bulletin\u201d in which the Chief of Police at my university campus warned of \u201csuspicious activity.\u201d On several occasions, it seems, two men have been seen \u201croaming the library;\u201d one of them typically \u201cacts as a look out,\u201d while the other approaches a woman who is sitting or studying by herself. What does one man do while the other keeps watch? He \u201cengages\u201d the woman, and \u201casks for personal information.\u201d The \u201cexact\u00a0intent or motives of the subjects\u201d is unknown, but the \u2018Safety Reminders\u2019 at the end of the message instruct, \u201cNever provide personal information to anyone you do not know or trust.\u201d<\/p>\n<figure id=\"attachment_10444\" aria-describedby=\"caption-attachment-10444\" style=\"width: 300px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/06\/13\/a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont\/dont-rape-sign\/\" rel=\"attachment wp-att-10444\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-10444\" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/dont-rape-sign-300x263.jpg\" alt=\"\" width=\"300\" height=\"263\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/dont-rape-sign-300x263.jpg 300w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/dont-rape-sign-500x439.jpg 500w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/dont-rape-sign.jpg 580w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><figcaption id=\"caption-attachment-10444\" class=\"wp-caption-text\">Who escapes blame when we blame the victim?<\/figcaption><\/figure>\n<p>If ill-advised disclosure were always this simple\u2014suspicious people asking us outright to reveal information about ourselves\u2014perhaps the moral mandate of <em>Shame On You<\/em> would seem slightly less ridiculous. As it stands, holding individuals primarily responsible for violations of their own privacy expands the operative definition of \u201cdisclosure\u201d to absurd extremes. If we post potentially discrediting photos of ourselves, we are guilty of disclosure through posting; if friends (<a href=\"http:\/\/thenewinquiry.com\/essays\/your-friends-and-neighbors\/\">or former lovers<\/a>) post discrediting photos of us, we are guilty of disclosure through allowing ourselves to be photographed; if we did not know that we were being photographed, we are guilty of disclosure through our failure to assume that we would be photographed and to alter our actions accordingly. If we do not want Facebook to have our names or our phone numbers, we should terminate our friendships with Facebook users, forcibly erase our contact information from those users\u2019 phones, and thereafter give false information to any suspected Facebook users we might encounter. This is untenable, to say the least. <strong>The inescapable connection of life in an augmented world means that exclusive control of our personal information, as well as full protection of our personal privacy, is quite simply out of our personal hands<\/strong>.<\/p>\n<p align=\"center\">*\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 *\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 *\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 *\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 *<\/p>\n<figure id=\"attachment_10438\" aria-describedby=\"caption-attachment-10438\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/06\/13\/a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont\/nothing-to-hide-2\/\" rel=\"attachment wp-att-10438\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-10438 \" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/nothing-to-hide-500x333.jpg\" alt=\"\" width=\"500\" height=\"333\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/nothing-to-hide-500x333.jpg 500w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/nothing-to-hide-300x200.jpg 300w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/nothing-to-hide.jpg 768w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><figcaption id=\"caption-attachment-10438\" class=\"wp-caption-text\">This couple has &quot;nothing to hide.&quot;<\/figcaption><\/figure>\n<p>The second paradigm, <em>Look At Me<\/em>, at first seems to represent a competing discourse. Its most vocal proponents are executives at social- and other digital media companies, along with assorted technologists and other Silicon Valley \u2018<a href=\"http:\/\/en.wikipedia.org\/wiki\/Digerati\">digerati<\/a>\u2019. This paradigm looks at you askance not for putting information on the Internet, but for forgetting that \u201c<a href=\"http:\/\/www.wired.com\/wired\/archive\/2.03\/economy.ideas_pr.html\">information wants to be free<\/a>\u201d\u2014because within this paradigm, <strong><em>disclosure<\/em> is the new moral imperative<\/strong>. Disclosure is no longer an action that disrupts the guarded default state, but the default state itself; it is not something one chooses or does, but something one is, something one has always-already done. <strong>Privacy, on the other hand, is a homespun relic of a bygone era, as droll as notions of a flat earth<\/strong>; it is particularly impractical in the 21<sup>st<\/sup> century. After all, who really <a href=\"http:\/\/www.ethanzuckerman.com\/blog\/2011\/05\/29\/kevin-kelly-on-context-for-the-quantified-self\/\">owns a friendship<\/a>? \u201c<a href=\"https:\/\/twitter.com\/#%21\/phenatypical\/statuses\/74991203350884352\">Who owns your face if you go out in public?<\/a>\u201d<\/p>\n<p>Called both \u201copenness\u201d and \u201cradical transparency,\u201d disclosure-by-default is touted as a social and political panacea; it will promote kindness and tolerance toward others, fuel progress and innovation, create accountability, and bring everyone closer to a better world. Alternatively, clinging to privacy will merely harbor <a href=\"https:\/\/plus.google.com\/117378076401635777570\/posts\/2y7vqXBtLny\">evil people<\/a> and condemn us to \u201c<a href=\"http:\/\/www.ethanzuckerman.com\/blog\/2011\/05\/29\/kevin-kelly-on-context-for-the-quantified-self\/\">generic relationships<\/a>.\u201d The enlightened \u201c<a href=\"http:\/\/techcrunch.com\/2011\/07\/26\/five-things-myspace-google-plus\/\">don&#8217;t believe that privacy is a real issue<\/a>,\u201d and anyone who maintains otherwise is suspect; as even WikiLeaks activist Jacob Appelbaum (<a href=\"https:\/\/twitter.com\/#%21\/ioerror\">@ioerror<\/a>) has lamented, privacy is cast \u201c<a href=\"https:\/\/twitter.com\/#%21\/sfslim\/status\/193498142325485568\">as something that only criminals would want<\/a>.\u201d Our greatest failings are no longer what do or what we choose, but who we are; <strong>our greatest shame is not in exposure, but in having or being something to hide<\/strong>.<\/p>\n<figure id=\"attachment_10435\" aria-describedby=\"caption-attachment-10435\" style=\"width: 325px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/06\/13\/a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont\/screen-shot-2012-05-29-at-1-27-34-am\/\" rel=\"attachment wp-att-10435\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-10435 \" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/Screen-shot-2012-05-29-at-1.27.34-AM.png\" alt=\"\" width=\"325\" height=\"244\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/Screen-shot-2012-05-29-at-1.27.34-AM.png 406w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/Screen-shot-2012-05-29-at-1.27.34-AM-300x225.png 300w\" sizes=\"auto, (max-width: 325px) 100vw, 325px\" \/><\/a><figcaption id=\"caption-attachment-10435\" class=\"wp-caption-text\">if you have nothing to hide, you have nothing to fear...right?<\/figcaption><\/figure>\n<p><em>Look At Me<\/em> has benefitted, to some degree, from a synergy of its own: \u201copenness,\u201d broadly conceived, has gained traction as more \u2018open\u2019 movements and initiatives attract attention and build popular support. In 1998, the <a href=\"http:\/\/www.opensource.org\/docs\/osd\">Open Source Initiative<\/a> was the first to claim \u2018open\u2019 as a moniker; it is now joined by <a href=\"http:\/\/www.wired.com\/wiredscience\/tag\/research-works-act\/\">what one writer has called<\/a> an \u201c<a href=\"http:\/\/thecostofknowledge.com\/\">open science revolt<\/a>,\u201d by <a href=\"http:\/\/opensciencesummit.com\/about\/\">not one<\/a>, <a href=\"http:\/\/www.openscience.org\/blog\/?page_id=44\">but two<\/a> Open Science movements, by <a href=\"http:\/\/www.whitehouse.gov\/open\/about\">President Obama\u2019s Open Government Initiative<\/a>, by the somewhat meta <a href=\"http:\/\/www.openmovements.org\/about-us\/\">Open Movements<\/a> movement, and by a <a href=\"http:\/\/www.arl.org\/sparc\/openaccess\/\">number<\/a> of <a href=\"http:\/\/www.opencontent.org\/definition\/\">other<\/a> <a href=\"http:\/\/www.opendatafoundation.org\/\">initiatives<\/a> <a href=\"http:\/\/www.open-research.org.uk\/\">aimed<\/a> at <a href=\"http:\/\/www.plos.org\/\">reforming<\/a> <a href=\"http:\/\/pkp.sfu.ca\/?q=ojs\">academic<\/a> <a href=\"http:\/\/openwetware.org\/wiki\/Main_Page\">research<\/a> <a href=\"http:\/\/www.doaj.org\/\">and<\/a> <a href=\"http:\/\/peerj.com\/\">publishing<\/a>.<\/p>\n<p>\u201cTransparency,\u201d too, has been popularized into a buzzword (try web-searching \u201cgreater transparency,\u201d with quotes). In an age of what Jurgenson and Rey (<a href=\"https:\/\/twitter.com\/#!\/nathanjurgenson\">@nathanjurgenson<\/a> and <a href=\"https:\/\/twitter.com\/#!\/pjrey\">@pjrey<\/a>) have called <a href=\"http:\/\/www.pjrey.net\/documents\/Liquid%20Information%20Leaks%2011.15.2011.pdf\"><em>liquid politics<\/em><\/a>, people demand transparency from institutions in the hope that <a href=\"http:\/\/www.guardian.co.uk\/commentisfree\/2012\/apr\/21\/digital-era-society-social-media\">exposure will encourage the powerful to be honest<\/a>; in return, institutions offer cryptic policy documents, unreadable reports, and \u201c<a href=\"http:\/\/www.wired.com\/gadgetlab\/2011\/11\/google-ad-transparency-target\/\">rabbit hole[s] of links<\/a>\u201d as transparency simulacra. Yet we continue to push for transparency from corporations and governments alike, which suggests that, to some degree, we do believe in transparency as a means to progressive ends. Perhaps it is not such a stretch, then, for social media companies (and others) to ask that we accept radical transparency for ourselves as well?<\/p>\n<figure id=\"attachment_10433\" aria-describedby=\"caption-attachment-10433\" style=\"width: 360px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/06\/13\/a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont\/googleplus-2\/\" rel=\"attachment wp-att-10433\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-10433  \" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/googleplus-500x262.png\" alt=\"\" width=\"360\" height=\"189\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/googleplus-500x262.png 500w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/googleplus-300x157.png 300w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/googleplus.png 535w\" sizes=\"auto, (max-width: 360px) 100vw, 360px\" \/><\/a><figcaption id=\"caption-attachment-10433\" class=\"wp-caption-text\">G+ was supposed to be the Anti-Facebook...or was it?<\/figcaption><\/figure>\n<p>The 2011 launch of social network-<em>cum<\/em>-\u201c<a href=\"http:\/\/www.sfgate.com\/cgi-bin\/article.cgi?f=\/g\/a\/2011\/08\/28\/businessinsider-google-isnt-just-a-social-network-its-an-identity-service-2011-8.DTL\">identity service<\/a>\u201d Google+ served to test this theory, but the protracted \u201c#<a href=\"https:\/\/twitter.com\/#%21\/search\/realtime\/%23nymwars\">nymwars<\/a>\u201d controversy that followed seemed not to be the result that Google had anticipated. Although G+ had been positioned as \u2018the anti-Facebook\u2019 in advance of its highly anticipated beta launch, within four weeks of going live Google decided not only to enforce a strict \u2018real names only\u2019 policy, but to do so through a \u201c<a href=\"http:\/\/www.techi.com\/2011\/07\/the-google-honeymoon-is-over\/\">massive deletion spree<\/a>\u201d that quickly grew into a public relations debacle. The mantra in Silicon Valley is, \u201c<a href=\"http:\/\/nwn.blogs.com\/nwn\/2011\/07\/google-profiles-pseudonym-avatar-names-suspension-policy.html\">Google doesn\u2019t get social<\/a>,\u201d and this time Google managed to (as one blogger put it) \u201c<a href=\"http:\/\/www.tamurajones.net\/PlussingPeople.xhtml\"><em>out-zuck<\/em> the Zuck<\/a>.\u201d Though sparked by G+, #nymwars did not remain confined to G+ in its scope; nor were <a href=\"http:\/\/www.nytimes.com\/2007\/04\/09\/technology\/09blog.html?_r=2&amp;th&amp;emc=th&amp;oref=slogin\">older<\/a> <a href=\"http:\/\/nielsenhayden.com\/makinglight\/archives\/008856.html\">battle<\/a> <a href=\"http:\/\/www.scalzi.com\/whatever\/005024.html\">lines<\/a> <a href=\"http:\/\/www.40tech.com\/2010\/01\/07\/is-google-the-devil\/\">around<\/a> <a href=\"http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=998565\">privacy<\/a> and <a href=\"http:\/\/www.betabeat.com\/2012\/02\/21\/scroogle-privacy-first-search-engine-shuts-down-for-good\/\">anonymity<\/a> redrawn for this particular occasion.<\/p>\n<p>On one side of the conflagration, rival data giants <a href=\"http:\/\/www.wired.com\/epicenter\/2011\/07\/google-plus-user-names\/\">Google and Facebook<\/a> both pushed their versions of \u2018personal radical transparency\u2019; they were more-or-less supported by a <a href=\"https:\/\/news.ycombinator.com\/item?id=2932331\">loose assortment<\/a> of <a href=\"http:\/\/www.jillianney.com\/google-and-the-real-name-debate-why-it-might-be-a-good-thing\/\">individuals<\/a> who either had \u201c<a href=\"http:\/\/forums.redflagdeals.com\/archive\/index.php\/t-1135371.html\">nothing to hide<\/a>,\u201d or who <a href=\"https:\/\/plus.google.com\/102533732658641069172\/posts\/GmKu35b7nNC\">preached<\/a> the <a href=\"http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=998565\">fallacy<\/a> that, \u2018if you have nothing to hide, you have nothing to fear.\u2019 The \u2018nothing to hide\u2019 argument in particular has been a perennial favorite for Google; well before the advent of G+ and #nymwars, CEO Eric Schmidt rebuked, \u201cIf you have something that you don&#8217;t want anyone to know, <a href=\"http:\/\/weblogs.mozillazine.org\/asa\/archives\/2009\/12\/if_you_have_nothing.html\">maybe you shouldn&#8217;t be doing it in the first place<\/a>.\u201d Unsurprisingly, Schmidt\u2019s dismissive response to G+ users with privacy concerns was a smug, \u201c<a href=\"http:\/\/mashable.com\/2011\/08\/28\/google-plus-identity-service\/\">G+ is completely optional. No one is forcing you use it.<\/a>\u201d If G+ is supposed to be an \u2018identity service,\u2019 it seems only some identities are worthy of being served.<\/p>\n<figure id=\"attachment_10441\" aria-describedby=\"caption-attachment-10441\" style=\"width: 300px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/06\/13\/a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont\/transparency-is-hot\/\" rel=\"attachment wp-att-10441\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-10441 \" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/transparency-is-hot-300x163.jpg\" alt=\"\" width=\"300\" height=\"163\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/transparency-is-hot-300x163.jpg 300w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/transparency-is-hot-500x272.jpg 500w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/transparency-is-hot.jpg 828w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><figcaption id=\"caption-attachment-10441\" class=\"wp-caption-text\">Transparent is the new black, right?<\/figcaption><\/figure>\n<p>On the other side was a \u2018<a href=\"http:\/\/www.informationweek.com\/news\/232500806\">vocal minority<\/a>\u2019 who, despite their purportedly fewer numbers, still seemed to generate most of the <a href=\"http:\/\/www.zephoria.org\/thoughts\/archives\/2011\/08\/05\/design-social-norms.html\">substantive<\/a> <a href=\"http:\/\/www.marrowbones.com\/commons\/technosocial\/\">digital<\/a> <a href=\"http:\/\/epeus.blogspot.com\/2011\/08\/google-plus-must-stop-this-identity.html\">content<\/a> about #nymwars<a title=\"\" href=\"#_edn2\">[ii]<\/a>. The pro-pseudonym-and\/or-privacy camp included the <a href=\"https:\/\/www.eff.org\/deeplinks\/2011\/07\/case-pseudonyms\">Electronic Frontier<\/a> <a href=\"https:\/\/www.eff.org\/deeplinks\/2011\/12\/2011-review-nymwars\">Foundation<\/a> (<a href=\"https:\/\/twitter.com\/#%21\/eff\">@EFF<\/a>), a new website called <a href=\"http:\/\/my.nameis.me\/\">My Name Is Me<\/a>, researcher <a href=\"http:\/\/www.zephoria.org\/thoughts\/archives\/2011\/08\/04\/real-names.html?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+zephoria%2Fthoughts+%28apophenia%29\">danah boyd<\/a> (<a href=\"https:\/\/twitter.com\/#%21\/zephoria\">@zephoria<\/a>), pseudonymity advocate and former Google employee <a href=\"http:\/\/infotrope.net\/2011\/07\/22\/ive-been-suspended-from-google-plus\/\">Skud<\/a> (<a href=\"https:\/\/twitter.com\/#%21\/Skud\">@Skud<\/a>, \u2018Kirrily Robert\u2019 on her passport at the time and \u2018<a href=\"http:\/\/infotrope.net\/2011\/09\/20\/announcement-i%E2%80%99ve-changed-my-name-to-alex-bayley\/\">Alex Skud Bayley<\/a>\u2019 on it now), security technologist <a href=\"http:\/\/www.schneier.com\/blog\/archives\/2011\/08\/pseudonymity.html\">Bruce Schneier<\/a> (<a href=\"https:\/\/twitter.com\/#%21\/schneierblog\">@schneierblog<\/a>, who had argued previously <a href=\"http:\/\/www.schneier.com\/blog\/archives\/2009\/12\/my_reaction_to.html\">against Schmidt\u2019s view of privacy<\/a>), the <a href=\"http:\/\/www.geek.com\/articles\/news\/anonymous-kicked-off-of-google-makes-own-social-network-in-response-20110718\/\">hacker group Anonymous<\/a> (unsurprisingly), and a <a href=\"https:\/\/plus.google.com\/u\/0\/110295984969329522620\/posts\/ExKJZgBAYxM\">substantive minority of Google employees<\/a> (or \u201cGooglers\u201d). There was a long list of <a href=\"http:\/\/infotrope.net\/2011\/07\/25\/preliminary-results-of-my-survey-of-suspended-google-accounts\/\">pseudonymous and &#8216;real named&#8217; users<\/a> who had been <a href=\"http:\/\/infotrope.net\/2011\/07\/25\/preliminary-results-of-my-survey-of-suspended-google-accounts\/\">kicked off the site<\/a>, an irate individual <a href=\"http:\/\/stilgherrian.com\/only-one-name\/right-google-you-stupid-cunts-this-is-simply-not-on\/\">banned because of his &#8220;unusual&#8221; real name<\/a>, and an individual with an unremarkable name <a href=\"http:\/\/gewalker.blogspot.com\/2011\/08\/firsthand-examination-of-google-profile.html\">who couldn\u2019t seem to get banned<\/a> no matter how hard he tried.<\/p>\n<p>Digital dualists took issue, too; one declared the \u2018real names\u2019 policy to be \u201c<a href=\"http:\/\/www.theatlantic.com\/technology\/archive\/2011\/08\/why-facebook-and-googles-concept-of-real-names-is-revolutionary\/243171\/\">a radical departure from the way identity and speech interact in the real world<\/a>,\u201d while another came to the conclusion that,<strong> <\/strong>\u201c<a href=\"http:\/\/www.nytimes.com\/2011\/09\/05\/technology\/naming-names-on-the-internet.html?_r=1\">The real world is often messy, chaotic and anonymous. The Internet is mostly better that way, too<\/a>.\u201d And in what may be one of my favorite #nymwars posts, <a href=\"http:\/\/antimatter15.com\/wp\/2011\/07\/google-profile-suspended\/\">a sixteen year old blogger<\/a> took on the absurdity of equating not only \u2018real name\u2019 with \u2018known as,\u2019 but also \u2018network\u2019 with \u2018community\u2019\u2014and then went on to argue that Shakespeare\u2019s Juliet had it right in asking, \u201cWhat\u2019s in a name?\u201d whereas Google\u2019s Eric Schmidt sounded \u201cshockingly similar\u201d to the head of \u201c<a href=\"http:\/\/antimatter15.com\/wp\/2011\/07\/google-profile-suspended\/\">the evil, Voldemort-controlled Ministry of Magic<\/a>\u201d in J. K. Rowling\u2019s first <em>Harry Potter<\/em> book.<\/p>\n<p>Issues of power are conspicuously absent from <em>Look At Me<\/em>, and Google makes use of this fact to gloss the profound difference between individuals pressuring a company to be transparent and a company pressuring (or forcing) individuals to be transparent. Google is transparent, for example, <a href=\"http:\/\/www.wired.com\/gadgetlab\/2011\/11\/google-ad-transparency-target\/\">in its ad targeting<\/a>, but allowing users either to opt-out of targeted advertising or to edit the information used in targeting them does not change the fact that Google users are being tracked, and that information about them is being collected. This kind of \u2018transparency\u2019 offers users not empowerment, but what Davis (<a href=\"https:\/\/twitter.com\/#!\/jup83\">@Jup83<\/a>) calls \u201c<a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/04\/30\/curating-reality\/\">selective visibility<\/a>\u201d: <strong>users can reduce their awareness of being tracked by Google, but can do little (short of complete Google abstention) to stop the tracking itself. <\/strong><\/p>\n<figure id=\"attachment_10439\" aria-describedby=\"caption-attachment-10439\" style=\"width: 240px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/06\/13\/a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont\/transparency-drag\/\" rel=\"attachment wp-att-10439\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-10439 \" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/transparency-drag-300x198.jpg\" alt=\"\" width=\"240\" height=\"158\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/transparency-drag-300x198.jpg 300w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/transparency-drag.jpg 468w\" sizes=\"auto, (max-width: 240px) 100vw, 240px\" \/><\/a><figcaption id=\"caption-attachment-10439\" class=\"wp-caption-text\">Transparency can be a real drag.<\/figcaption><\/figure>\n<p>Such \u2018transparency\u2019 therefore has little effect on Google in practice; with plenty more fish in the sea (and hundreds of millions of userfish already in its nets), Google has little incentive to care whether any particular user does or does not continue to use Google products. Individual users, on the other hand, <a href=\"http:\/\/eggfreckles.net\/files\/a-month-without-google.html\">can find quitting Google to be a right pain<\/a>, and this imbalance in the Google\/user relationship effectively gives carte blanche to Google policymakers. This is <em>especially<\/em> problematic with respect to transparency, which has a far greater impact on individual Google users than it does on Google itself.<\/p>\n<p>Google may have \u2018corporate personhood\u2019, but persons have identities; in the present moment, many identities still serve to mark people for discrimination, oppression, and persecution, whether they are \u201c<a href=\"https:\/\/plus.google.com\/117378076401635777570\/posts\/2y7vqXBtLny\">evil<\/a>\u201d or not. <em>Look At Me<\/em> claims personal radical transparency will solve these problems, yet <strong>social media spaces are neither digital utopias nor separate worlds; all regular \u201c*-isms\u201d still apply<\/strong>, and real names <a href=\"http:\/\/www.zephoria.org\/thoughts\/archives\/2011\/08\/05\/design-social-norms.html\">don\u2019t stop bullies or trolls<\/a> in digital spaces any more than they do in conventional spaces. At the height of irony, even \u2018real-named\u2019 G+ users who supported Google\u2019s policy still <a href=\"http:\/\/epeus.blogspot.com\/2011\/08\/google-plus-must-stop-this-identity.html\">trolled other users who supported pseudonyms<\/a>.<\/p>\n<p>boyd offers a different assessment of \u2018real names\u2019 policies, one that stands in stark contrast to the doctrine of radical transparency. She argues that, far from being empowering, \u2018real name\u2019 policies are \u201can <a href=\"http:\/\/www.zephoria.org\/thoughts\/archives\/2011\/08\/04\/real-names.html?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+zephoria%2Fthoughts+%28apophenia%29\">authoritarian assertion of power<\/a> over vulnerable people.\u201d Geek Feminism hosts <a href=\"http:\/\/geekfeminism.wikia.com\/wiki\/Who_is_harmed_by_a_%22Real_Names%22_policy%3F\">an exhaustive list<\/a> of the many groups and individuals who can be vulnerable in this way, and Audrey Watters (<a href=\"https:\/\/twitter.com\/#%21\/audreywatters\">@audreywatters<\/a>) explains that many people in positions of power <a href=\"http:\/\/www.hackeducation.com\/2011\/07\/25\/should-students-use-pseudonyms-online\/\">do not hesitate to translate their disapproval<\/a> of even ordinary activities into adverse hiring and firing decisions. Though tech CEOs call for radical transparency, a senior faculty member (for example) condemns would-be junior faculty <a href=\"http:\/\/chronicle.com\/article\/Bloggers-Need-Not-Apply\/45022\">whose annoying \u201cquirks\u201d turn up online<\/a> instead of remaining \u201cstifle[d]\u201d and \u201chidden\u201d during the interview process. As employers begin not only to Google-search job applicants, but also <a href=\"http:\/\/abcnews.go.com\/Technology\/facebook-passwords-employers-schools-demand-access-facebook-senators\/story?id=16005565\">to demand Facebook passwords<\/a>, belonging to what Erving Goffman calls a \u201c<a href=\"http:\/\/www.nd.edu\/%7Erwilliam\/xsoc530\/deviance.html\">discreditable group<\/a>\u201d carries not just social but economic consequences.<\/p>\n<figure id=\"attachment_10440\" aria-describedby=\"caption-attachment-10440\" style=\"width: 265px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/06\/13\/a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont\/transparency-grenade\/\" rel=\"attachment wp-att-10440\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-10440\" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/transparency-grenade-265x300.jpg\" alt=\"\" width=\"265\" height=\"300\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/transparency-grenade-265x300.jpg 265w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/transparency-grenade-442x500.jpg 442w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/transparency-grenade.jpg 640w\" sizes=\"auto, (max-width: 265px) 100vw, 265px\" \/><\/a><figcaption id=\"caption-attachment-10440\" class=\"wp-caption-text\">Transparency can be a weapon. Who&#39;s pointing it at whom?<\/figcaption><\/figure>\n<p>Rey points out that there are big differences between <a href=\"https:\/\/thesocietypages.org\/cyborgology\/2011\/11\/08\/julian-assange-cyber-libertarian-or-cyber-anarchist\/\">cyber-libertarianism and cyber-anarchism<\/a>; if &#8220;information&#8221; does, in fact, &#8220;want to be free,&#8221; it does not always &#8220;want&#8221; to be free for the same reasons. \u2018Openness\u2019 does not neutralize preexisting inequality (<a href=\"http:\/\/geekfeminism.wikia.com\/wiki\/Open_Source_Male_Privilege_Checklist\">as the Open Source movement itself demonstrates<\/a>), whereas forced transparency can be <a href=\"http:\/\/www.guardian.co.uk\/commentisfree\/2012\/apr\/21\/digital-era-society-social-media\">a form of outing<\/a> with dubious efficacy for encouraging either tolerance or accountability. As boyd, Watters, and Geek Feminism demonstrate, those who call most loudly for radical transparency are neither those who will supposedly receive the greatest benefit from it, nor those who will pay its greatest price. Though some (economically secure, middle-aged, heterosexual, able-bodied) white men <a href=\"http:\/\/www.marrowbones.com\/commons\/technosocial\/2011\/08\/im_just_some_middle_aged_white.html\">acknowledged their privilege<\/a> and tried to <a href=\"http:\/\/www.jwz.org\/blog\/2011\/08\/nym-wars\/\">educate others like them<\/a> about why pseudonyms are important, the loudest calls for \u2018real names\u2019 were ultimately the \u201c<a href=\"http:\/\/www.zephoria.org\/thoughts\/archives\/2011\/08\/04\/real-names.html?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+zephoria%2Fthoughts+%28apophenia%29\">most privileged and powerful<\/a>\u201d calling for the increased exposure of marginalized others. Maybe the full realization of an egalitarian utopia would lead more people to choose \u2018openness\u2019 or \u2018transparency\u2019, or maybe it wouldn\u2019t. <strong>But strong-arming more people into \u2018openness\u2019 or \u2018transparency\u2019 certainly will not lead to an egalitarian utopia; it will only exacerbate existing oppressions.<\/strong><\/p>\n<p>The #nymwars arguments about \u2018personal radical transparency\u2019 reveal that <em>Shame On You<\/em> and <em>Look At Me<\/em> are at least as complementary as they are competing. Both preach in the same superior, moralizing tone, even as one lectures about reckless disclosure and the other levels accusations of suspicious concealment. Both would agree to place all blame squarely on the shoulders of individual users, if only they could agree on what is blameworthy. Both serve to naturalize and to normalize the same set of problematic practices, from pervasive surveillance to the commoditization of information.<\/p>\n<p>Most importantly, both turn a blind eye to issues of inequality, identity, and power, and in so doing gloss distinctions that are of critical importance. If these two discourses are as much in cahoots as they are in conflict, what is the composite picture of how we think about privacy, choice, and disclosure? <strong>What is the impact of most social media users embracing one paradigm, and most social media designers embracing the other?<\/strong><\/p>\n<figure id=\"attachment_10443\" aria-describedby=\"caption-attachment-10443\" style=\"width: 300px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/06\/13\/a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont\/transparent-toaster\/\" rel=\"attachment wp-att-10443\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-10443\" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/transparent-toaster.jpg\" alt=\"\" width=\"300\" height=\"234\" \/><\/a><figcaption id=\"caption-attachment-10443\" class=\"wp-caption-text\">Burned by disclosure?<\/figcaption><\/figure>\n<p>As I will show next week, the conception of privacy as an individual matter\u2014whether as a right or as something to be renounced\u2014is the linchpin of the troubling consequences that follow.<\/p>\n<p>&nbsp;<\/p>\n<p><em>Whitney Erin Boesel (<\/em><a href=\"https:\/\/twitter.com\/#%21\/phenatypical\"><em>@phenatypical<\/em><\/a><em>) is a graduate student in Sociology at the University of California, Santa Cruz.<\/em><\/p>\n<p><em>Image Credits:<\/em><\/p>\n<p><em>Baby bathtub image from http:\/\/www.mommyshorts.com\/2011\/11\/caption-contest.html<\/em><\/p>\n<p><em>Peeping bathroom image from http:\/\/gweedopig.com\/index.php\/2009\/11\/03\/peeping-tom-hides-video-camera-in-christian-store-bathroom\/<\/em><\/p>\n<p><em>Dear Victim image from http:\/\/news.nationalpost.com\/2011\/11\/24\/let-me-run-through-your-dumb-mistakes-teen-burglars-apology-letter-to-victims\/<\/em><\/p>\n<p><em>Pushpin image from http:\/\/www.pinewswire.net\/article\/to-warrant-or-not-to-warrant-aclu-police-clash-over-cellphone-location-data\/<\/em><\/p>\n<p><em>Don&#8217;t rape sign image from http:\/\/higherunlearning.files.wordpress.com\/2012\/05\/dsc7600r.jpg?w=580&amp;h=510<\/em><\/p>\n<p><em>Anti-woman image from http:\/\/www.feroniaproject.org\/fired-for-using-contraception-maybe-in-arizona\/<\/em><\/p>\n<p><em>Naked wedding photo from http:\/\/www.mccullagh.org\/photo\/1ds-10\/burning-man-cathedral-wedding<\/em><\/p>\n<p><em>Cop image from http:\/\/www.quickmeme.com\/meme\/6ajf\/<\/em><\/p>\n<p><em>G+ vs. Facebook comic: by Randal Munroe, from xkcd: http:\/\/xkcd.com\/918\/<\/em><\/p>\n<p><em>Transparency word cluster from http:\/\/digiphile.wordpress.com\/2010\/03\/28\/transparency-camp-2010-government-transparency-open-data-and-coffee\/<\/em><\/p>\n<p><em>Transparent sea creature image from http:\/\/halfelf.org\/2012\/risk-vs-transparency\/<\/em><\/p>\n<p><em>Transparent grenade image from http:\/\/www.creativeapplications.net\/objects\/the-transparency-grenade-by-julian-oliver-design-fiction-for-leaking-data\/<\/em><\/p>\n<p><em>Transparency and toast image from http:\/\/time2morph.files.wordpress.com\/2012\/01\/transparent-toaster.jpg?w=300&amp;h=234<\/em><\/p>\n<p>&nbsp;<\/p>\n<div>\n<hr align=\"left\" size=\"1\" width=\"33%\" \/>\n<div>\n<p><a title=\"\" href=\"#_ednref1\">[i]<\/a> Note that \u201cpublicly available\u201d is tricky here: Girls Around Me users were ported to Facebook to view the women\u2019s profiles, and so could also have accessed <em>non-public<\/em> information if they happened to view profiles of women with whom they had friends or networks in common.<\/p>\n<\/div>\n<div>\n<p><a title=\"\" href=\"#_ednref2\">[ii]<\/a> Alternatively, my difficulty finding posts written in support of Google\u2019s policy may simply reflect Google\u2019s \u2018personalization\u2019 of my search results, both then and now.<\/p>\n<\/div>\n<\/div>\n<p>moral imperative<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last month in Part I (Distributed Agency and the Myth of Autonomy), I used the TtW2012 \u201cLogging Off and Disconnection\u201d panel as a starting point to consider whether it is possible to abstain completely from digital social technologies, and came to the conclusion that the answer is \u201cno.\u201d Rejecting digital social technologies can mean significant [&hellip;]<\/p>\n","protected":false},"author":1875,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[9967,892],"tags":[36426,10730,584,347,13,424,3312,1528,732,10125,190],"class_list":["post-10432","post","type-post","status-publish","format-standard","hentry","category-commentary","category-essay","tag-commentary","tag-connected","tag-digital-media","tag-identity","tag-inequality","tag-privacy","tag-privilege","tag-sexism","tag-social-media","tag-visibility","tag-women"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/10432","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/users\/1875"}],"replies":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/comments?post=10432"}],"version-history":[{"count":53,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/10432\/revisions"}],"predecessor-version":[{"id":10490,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/10432\/revisions\/10490"}],"wp:attachment":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/media?parent=10432"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/categories?post=10432"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/tags?post=10432"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}