{"id":19830,"date":"2015-04-02T09:00:58","date_gmt":"2015-04-02T13:00:58","guid":{"rendered":"http:\/\/thesocietypages.org\/cyborgology\/?p=19830"},"modified":"2015-04-01T13:45:10","modified_gmt":"2015-04-01T17:45:10","slug":"good-encryption-doesnt-make-good-government","status":"publish","type":"post","link":"https:\/\/thesocietypages.org\/cyborgology\/2015\/04\/02\/good-encryption-doesnt-make-good-government\/","title":{"rendered":"Good Encryption Doesn\u2019t Make Good Government"},"content":{"rendered":"<figure id=\"attachment_19831\" aria-describedby=\"caption-attachment-19831\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-19831\" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2015\/04\/23390123_b6caaefc16_z-500x335.jpg\" alt=\"Image Credit: Kris Kr\u00fcg\" width=\"500\" height=\"335\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2015\/04\/23390123_b6caaefc16_z-500x335.jpg 500w, https:\/\/thesocietypages.org\/cyborgology\/files\/2015\/04\/23390123_b6caaefc16_z-250x168.jpg 250w, https:\/\/thesocietypages.org\/cyborgology\/files\/2015\/04\/23390123_b6caaefc16_z-400x268.jpg 400w, https:\/\/thesocietypages.org\/cyborgology\/files\/2015\/04\/23390123_b6caaefc16_z.jpg 640w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><figcaption id=\"caption-attachment-19831\" class=\"wp-caption-text\">Image Credit: <a href=\"https:\/\/flic.kr\/p\/34T4Z\" target=\"_blank\">Kris Kr\u00fcg<\/a><\/figcaption><\/figure>\n<p>When someone starts talking about privacy online, a discussion of encryption is never too far off. Whether it is a relatively old standby like Tor or a much newer and more ambitious effort like <a href=\"https:\/\/www.ethereum.org\/\">Ethereum<\/a>\u00a0(more on this later)\u00a0privacy equals encryption. With the exception of investigative journalism and activist interventions, geeks, hackers, and privacy advocates seem to have nearly universally adopted a \u201cgood fences make good neighbors\u201d approach to privacy. This has come at significant costs. The conflation of encryption with privacy mistakes what should be a temporary defensive tactic, for a long term strategy against corporate and government spying.\u00a0It is time that we discuss a new approach.<!--more--><\/p>\n<p>The prevailing logic seems sound: runaway government and corporate surveillance is often accomplished through the abuse of pre-existing data or the interception of daily digital life. We may be tracked via geotragged vagueposts about our flaky friends or Kik\u00a0messages\u00a0between activists might be intercepted as it goes from sender to receiver. End-to-end encryption is meant to prevent the latter sort of surveillance and is often compared to a paper security envelope: the network only knows the sender and recipient and the content of the data is obscured. There are lots of protocols and technologies that provide end-to-end encryption, the most prevalent being https which verifies the identity of both parties and keeps the digital envelope closed and secure as it traverses the\u00a0series of tubes. Services like Gmail, Facebook, Twitter all use https and you can tell by looking at\u00a0the address bar in your browser. Chrome even turns it a happy, reassuring shade of green.<\/p>\n<p>If we were to take the security envelop to its logical conclusion however, the attitudes towards data security\u00a0would appear preposterous if not deeply insufficient. If the government were opening our snail mail to the same degree they were vacuuming up our digital communications, private citizens\u2019 first inclination might be to spend the extra money on tamper-evident\/proof envelopes, but would we really continue to innovate primarily in better envelopes? Would we go on to make a private postal service even if we knew that the government had given itself lawful authority, if not the capacity, to search private as well as publicly conveyed correspondence? Would we continue to pour resources and effort into making a better envelope when the problem was obviously bad government?<\/p>\n<p>There is a sort of digital dualism at play here. While efforts to develop encryption are rarely questioned, I think similar tactics for different problems would be criticized as both a stop-gap measure and overly defensive at a moment that demands an offensive strategy. That is, we should be building the capacity to weather tyranny so that we may fight against it, but\u00a0creating a new normal of balkanized communication is wrongheaded.<\/p>\n<p>To be clear, I\u2019m not saying we shouldn\u2019t be working on encryption while we fight the good fight against privacy invasion. I just don\u2019t want us to mistake a coping strategy for a solution to a big problem. We tend to confuse advancement in encryption technology with social progress in the fight against government overreach. Even the most politically radical Anon, who most certainly is engaged in offensive strategies in every sense of the word, never seems to wish for the day when\u00a0all of these good fences become\u00a0unnecessary.<\/p>\n<p>Ethereum, the latest invention <a href=\"http:\/\/www.spectator.co.uk\/spectator-life\/spectator-life-life\/9477812\/the-utopia-algorithm\/\">to be touted as<\/a> \u201cartillery in the running battle between technology and governments\u201d bills itself as nothing less than &#8220;web 3.0.&#8221; Its creators describe it as a total reorganization of how the Internet is run and how data is stored. Using the spare space on personal hard drives and processors, Ethereum offers encrypted, distributed, public and unalterable transaction records for everything from bank transactions to sexts.\u00a0That means no one is in control of the system so authorities can\u2019t shut it down, nor can data be disappeared or held in private databases.<\/p>\n<p>Anything that, by design, hinders the accumulation of power is a good thing in my book. I like that the technology forces a kind of anarchic or rhizomatic politics. \u00a0I tend to think of horizontal organization as running on interpersonal trust, but hackers don&#8217;t seem to see it that way. Even when it comes to advertising its decentralized infrastructure, Ethereum and similarly-designed cryptocurrency organizations<a href=\"http:\/\/www.deepdotweb.com\/2014\/08\/18\/ethereum-making-entire-world-trustless\/\"> choose to cast the lack of central authority as \u201ctrustless\u201d<\/a> rather than trustful. It is disturbing to me that a metric for good design is the lack of trust in one-another. That is the sort of thinking that got us into this mess in the first place.<\/p>\n<p>Modern hierarchical bureaucracies, as Max Weber observed early in the twentieth century, make it possible to act without interpersonal trust. I know that a doctor I have never met is qualified because she has credentials and licenses from organizations that have knowable and somewhat static requirements. In a sense, we outsource interpersonal trust to large institutions so that we may trust\u00a0people that we haven&#8217;t taken the time to get to know. We might achieve the same thing through aggregating lots of opinions, so long as we trust the aggregator. Once there was even the slightest suspicion that <a href=\"http:\/\/www.natlawreview.com\/article\/yelp-scandal-red-flag-online-reviews\">Yelp was in the business of removing bad reviews for a fee<\/a>, the ratings of independent individuals became suspect.<\/p>\n<p>Instead of handing over our trust to organizations like professional associations, governments, or corporations, hackers would have us move that trust to algorithms, protocols, and block chains. Of course human organizations can be co-opted and corrupted but so can algorithms. Coding is just as much a <a title=\"Exclusionary Algorithms: Jobaline\u2019s Voice Analyzer\" href=\"https:\/\/thesocietypages.org\/cyborgology\/2015\/03\/24\/insidious-algorithms-jobalines-voice-analyzer\/\">human (and thus social) endeavour <\/a>as organizing a government or creating a business. But even if technologies weren&#8217;t vulnerable to human faults, our problems do not come from organizations and code\u00a0working incorrectly. Most of them\u00a0are doing exactly what they are supposed to do: corporations have fiduciary responsibilities to seek profits above all other things and just as the <a href=\"http:\/\/en.wikipedia.org\/wiki\/Paul_Virilio#cite_note-shipwreck-2\">invention of the train also brings about the invention of the derailment<\/a>, so too does the invention of the nation state yield war. We don\u2019t need more things that let us go about our lives not trusting. We need to get rid of or deeply reform the institutions that foster distrust and fear.<\/p>\n<p>If we build a world full of trustless technologies what happens when we feel ready to trust again? Even the anarchists who fought in the Spanish Civil War against Franco organized their militias without<a href=\"http:\/\/anarchism.pageabode.com\/afaq\/secA5.html#seca56\"> officers, salutes, or rank.<\/a> They recognized that means and ends were deeply intertwined; you don\u2019t get to a vastly better world by reproducing its undesirable elements. I do not know what a more communitarian technology would necessarily look like, but it I know we\u00a0have to start by changing our\u00a0ethic first.<\/p>\n<p><em>\u00a0David is on <a href=\"http:\/\/www.twitter.com\/da_banks\" target=\"_blank\">Twitter<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The conflation of encryption with privacy mistakes what should be a temporary defensive tactic, for a long term strategy against corporate and government spying.<\/p>\n","protected":false},"author":1512,"featured_media":19831,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[9967],"tags":[],"class_list":["post-19830","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-commentary"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/thesocietypages.org\/cyborgology\/files\/2015\/04\/23390123_b6caaefc16_z.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/19830","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/users\/1512"}],"replies":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/comments?post=19830"}],"version-history":[{"count":4,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/19830\/revisions"}],"predecessor-version":[{"id":19835,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/19830\/revisions\/19835"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/media\/19831"}],"wp:attachment":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/media?parent=19830"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/categories?post=19830"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/tags?post=19830"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}