www.nettime.org
Nettime mailing list archives

Re: <nettime> Hans Magnus Enzensberger: Rules for the digital world
Florian Cramer on Tue, 11 Mar 2014 12:59:28 +0100 (CET)


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Re: <nettime> Hans Magnus Enzensberger: Rules for the digital world


While I'd like to chime in with Andreas' fact check of Enzensberger's
ten rules:

> For those who aren't nerds, hackers or cryptographers and have
> better things to do than keep up with the pitfalls of digitalization
> every hour, there are ten simple rules to resist exploitation and
> surveillance:

Unlike Andreas, I think that Enzensberger is right and that critical
media activist culture delivered the proof in the pudding when it came
up with the format and name of "Crypto Parties". The implication is,
indeed, that you need to become at least a low-skilled cryptographer
who knows what PGP, SSL and TOR mean and how they are used.

In Rotterdam, on a CryptoParty last Friday at WORM, we just learned
again how difficult it is for contemporary Internet users to even
grasp the concept of a local mail client (like Thunderbird) as opposed
to Web Mail - and that does not even include complex stuff like
PGP encryption and key management. But using Web Mail means, by
definition, that others can read and data mine your correspondence.
And let's not even go into gory details like keeping up with software
vulnerabilities (like the SSL bug in Apple's operating systems or the
very similar GNU-TLS bug from last week). It's fair to say that all
the computer and Internet communication systems we currently use are
fundamentally insecure, and that there are likely only a handful of
systems in the world into which a skilled third party could not break
into to intercept the data stored on or sent from them.

> 1
> If you own a mobile phone, throw it away.

>From a hacker perspective, this is sound advice. Apart from a very
few fringe, mostly not-yet-existing mobile phone operating systems
(such as Phil Zimmerman's Black Phone), all of the existing mobile
phones leak your data. Even a most simple stripped-down mobile phone
constantly broadcasts your location. The technology to intercept calls
and data transfers has become trivially simple (as Danja Vasiliev
and Julian Oliver demonstrated on this year's transmediale festival
in Berlin). Another issue is that smartphones are multi-sensor
devices that broadcast megabytes of data (such as bodily movement via
accelerometers) with their users being aware of it.

> 2
> Whoever offers something for free is suspicious. One should categorically
> refuse anything that passes itself off as a bargain, bonus or freebie.  It's
> always a lie.

I agree with Andreas, but a problem remains that this advice can
involuntarily backfire against ethical free services offered by
non-profits (from free WiFi access at a public library to Open Source
software).

> 3
> Online banking is a blessing, but only for secret services and criminals.

Here, Enzensberger's advice is naive, because banking in these times is
online anyway. If people go to a bank counter instead of homebanking, the
transaction will travel over the same networks (and most likely, the bank
employee will use the same online banking web interface). It also ignores
the data retention and customer tracking built into the international
banking system via, for example, the SWIFT accord between the EU and the
USA.

> 4
> Governments and industries want to abolish cash. They would like to get rid
> of a legal tender that anyone can redeem.

This is indeed an important point, and has become a reality in countries
like Sweden. Contrary to common belief and letting aside all other issues
of this payment system, Bitcoin is not a solution for this problem because
all Bitcoin transaction records are publicly visible (as discussed here on
Nettime previously - no need to open this can of worms again). So far, cash
is the only truly anonymous, hard-to-trace payment method.

> 5
> The madness of networking every object of daily use - from toothbrush to
> TV, from car to refrigerator - via the Internet, can only be met with total
> boycott.

The recent news about "smart TVs" spying on its viewers (
https://securityledger.com/2013/11/fix-from-lg-ends-involuntary-smartt
v-snooping-but-privacy-questions-remain/) indeed confirm this - and
the news that "smart refrigerators" are now running spam botnets (
http://arstechnica.com/security/2014/01/is-your-refrigerator-really-pa
rt-of-a-massive-spam-sending-botnet/ ). This is one example of the
term "post-digital" making sense - that in many cases, it's better
that devices are offline than online.

> 6
> The same applies to politicians. They ignore any objection to their actions
> and omissions. They are submissive to the financial markets and don't dare
> to go against the activities of secret services.

No point in arguing with that. Most likely, most of them are in the pockets
of the secret services that have collected compromising information on them.

> 7
> E-Mail is nice, fast and free. So watch out! If you have a confidential
> message or don't want to be surveilled, take a postcard and pencil.

This advice is technologically naive. It's known that the NSA and other
secret services have systematically scanned and collected postal mail meta
data (sender and receiver adresses along with timestamps), postal mail
relies on digital logistics (and digitized meta data) anyway.
Nearly-unreadable handwriting on post cards would not last very long as an
obfuscation device. All the secret service had to do is to run a Captcha
program for the handwriting that would fail OCR.

> 8
> Avoid obtaining goods and services via Internet. Vendors like Amazon, Ebay
> and so on store all data and molest their customers with advertising spam.

Naive advice, again, since your supermarket collects the same information -
either via loyalty discount cards or simply by collecting data from card
payments.

> 9
> Just like network television, the big Internet corporations are primarily
> financed by advertising.

This is a naive view as well, or it might at best be true for Google.
Enzensberger fails to understand the system of venture capital
financing in combination with IPOs and stock markets that work as a
global speculative scheme. (In less abstract words: It doesn't matter
whether a company like Facebook will ever make real profits since its
founders, venture capital investors and first-wave stock buyers will
have made billions before the company tanks.) He also excludes the
possibility that selling customer data with third parties, including
law enforcement, intelligence agencies, insurance companies, banks
etc. might already be a major source of revenue for many Internet
companies.

> 10
> Networks like Facebook call themselves "social" despite their eagerness to
> treat their customers in the utmost anti-social ways.

Here, Enzensberger sounds like a disgruntled airline customer who
wants his money back after a flight from hell. He misses the point
that nowadays, sites like Facebook exist because of peer pressure for
participation.

> friends like this, is a hopeless case. Those who are unfortunate
> enough to be part of such a company, should try to take flight as
> fast as possible. This is not so easy. An octopus won't consent to
> letting his prey escape.

True, since Facebook doesn't delete profile data even after people
have shut down their accounts, and even creates profiles of people who
aren't on Facebook (and don't intend to sign on) based on the social
network information (and uploaded E-Mail address books) of registered
users. This is also true for other web sites such as LinkedIn.

> These simple measures can't solve the political problem that society is
> faced with.

No point arguing with this.

> The sleep of reason will continue to the day when a majority of this
> country's citizens will experience firsthand what has been done to them.
> Perhaps, they will rub their eyes and ask why they let it slip in a time
> when resistance was still possible.

One only needs to ponder what the Hitler government would have been
able to pull off during the Third Reich, on top of everything it
already did, if it had had access to the kind of personal data that
is now stored at Google, Facebook and the NSA, for every citizen in
Germany and the countries occupied in WWII - and even keeping people
outside those territories in check by blackmail.

There's no question that we're living in societies of control and that
the Internet is their infrastructure.

-F


#  distributed via <nettime>: no commercial use without permission
#  <nettime>  is a moderated mailing list for net criticism,
#  collaborative text filtering and cultural politics of the nets
#  more info: http://mx.kein.org/mailman/listinfo/nettime-l
#  archive: http://www.nettime.org contact: nettime {AT} kein.org