www.nettime.org
Nettime mailing list archives

<nettime> Ippolita Collective, In the Facebook Aquarium,
Patrice Riemens on Thu, 7 Aug 2014 01:43:45 +0200 (CEST)


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

<nettime> Ippolita Collective, In the Facebook Aquarium,


Ippolita Collective, In the Facebook Aquarium Part III

The Freedoms of the Net


Orwell, Huxley, and the Sino-American model (section 2, concluded)

Profiling techniques used by Google, Facebook, and others can be applied
to improve upon the relevance of individually targeted advertisements just
as  it can be used to sharpen individually targeted censorship and
repression. If your friends are fans of this or that band, chance is that
you will like this or that kind of music as well, and hence, by
association, you are a potential buyer of it. And if your friends read the
same subversive blog as you do, then they too are potential subversives,
just like you. The algorithms (arriving at these results) are exactly the
same. American and Chinese social formats share the same drive towards
increased transparency. During the nineties (of the previous century)
President Clinton was not able to push through his ideas about the
'information superhighway', but nothing proves that the Chinese Communist
Party, which is very much alive and kicking, may not be successful in its
attempts to create (its vision of) one big happy Peoples' Republic. With
assistance from the American military-industrial complex, China is busy
creating the prototype of a high-tech police state. The plan is to give
each and every citizen an e-mail address, (associated with) a page on
government-owned social media, an account for on-line purchase on
authorized sites, and  disk space to store personal data on
regime-controlled servers. A kind of nationalized, Chinese Facebook, fused
into a Chinese e-address, storing data on a Chinese iCloud, and able
(accessorily), thanks to total profiling, to suggest what to buy next from
the Chinese clone of Amazon. This scenario highlights the fact that the
policies of the IT giants, and especially of those which require ever more
sophisticated profiling to boost their profitability - as is the case with
the four largest: Facebook, Google, Apple, and Amazon - is totally
compatible with authoritarian control systems. These technologies
correspond exactly to what modern dictatorships do wish for themselves.

The (generalized) acceptance of (this) profiling is what makes the coming
of this social model possible. Authoritarian capitalism, China-style,
proves perfectly reconcilable with democratic capitalism, US-style. The
two systems (actually) support each other. They are totally
interdependent: on the financial plane, since the Chinese sovereign funds
own a large part of America's public debt, and thus China could, given the
amount of its Dollar reserves, explode Washington; and on the economic
side, since American high-tech companies never could amass the kind of
fabulous profits they make without low-cost industrial inputs from China.
Just one example: were iPods, IPhones and Ipads manufactured in the West
rather than in Shenzen industrial zone, their cost would be astronomical
(Shenzen, near Hong Kong, was a small fishermen village thirty years ago,
and is now a city with over 12 million inhabitants). Meanwhile, the FoxCom
factory workers, who put together these splendid objects of desire, must
sign contracts in which they pledge not to commit suicide - understandably
so, since suicides far from uncommon, given the inhuman labor conditions
prevailing in these workplaces. (And) It would be unthinkable to impose
such labor conditions in the West.

So the two systems share a need to optimally classify (identify) their own
population. The United States, on one side, must make consumption goods
available to guarantee the happiness written in the Dollar Constitution,
while at the same time identify and neutralize potentially subversive
threats to the system. China, on the other hand, needs to improve the
material life conditions of the people without advancing the emergence
of democratic politics, while it also needs to keep a firm check on ethical
and religious issues, which are perennial sources of tension. Unlimited
growth is (of course) the horizon common to both approaches. The rest of
the world, meanwhile, does not sit still, and every country partakes as
much as it
can into this competition. Some countries go for the Orwellian approach,
other prefer a more sophisticated model with subtle profiling, the
Huxleyan way.
The social network thus morphs into a trap where flat individualities, 
also known as /pancake people/, split up by profiling, trash around. At
that stage it becomes ever more challenging to make them buy stuff because
they are not even able to consume all they have accumulated, while they
waste away phenomenal quantities of all the products they have at their
disposal. They wiggle around in the search for personalized goodies,
passive entertainment, and collective identities for effortless
(self-)contemplation.


On counter-moves and survival skills (section 3)

Not all is lost, however. It is possible to remove data and to vanish from
(digital) social networks. One can perfectly leave Wikileaks'
meaningless revelations for what they are, and in the meanwhile build up
'free' alternatives ? "free as in freedom, not as in free beer" - and
hence free of control, like Lorea, the Diaspora Project or Openleaks [12].
It is possible to build profiling-free search engines, /cloud computing/
services, and more
generally, electronic communication services that are owned and managed by
the users themselves. Curiosity - a characteristic of the hacker spirit -
would make it possible to start setting up physical networks of and for
autonomous communications. Everything is within ready, and it is much
better to go for independent tools than to outsource sociality's access
(to private companies). But at the same time, one needs to realize that no
alternative is going to be totally free. Even if we manage to concretely
define what meanest to liberate oneself, and are able to mobilize the
necessary energies, still the most difficult task remains: to actually
build. The challenge is not to rebel for the sake of rebelling, but to
imagine ways to develop autonomy and to put these in practice, here and
now.

The first method to escape the consequence of transparency, wall-to-wall
control, is to use strong cryptography and anonymization protocols. This
makes our e-mails unreadable for whomever does not possess the appropriate
decryption key. All searches we do on the Web can be anonymized, just as
all our communications with and on electronic networks, as well as all
data on our computers, and our smartphones. There exist very powerful
hybrid encryption algorithms, such as GPG (Gnu Private Guard) [13].
Anonymous Web-browsing is equally possible, making use of, e.g. TOR, a
system first developed by the US Navy, but now an independent project
[14]. TOR enables its users to hide their requests by connecting them ,
first to intermediary nodes (proxies) or to other randomly selected TOR
nodes, from where they finally reach the desired site. To protect one's
privacy whenever possible is always a good idea. The use of cryptographic
instruments should be the rule, not the exception.

It is also advisable to learn more about how to use our everyday tools.
However, one should always keep in mind that protection is always
relative, never absolute, yet provides a reasonable level of security with
regard to the current state of technology. With sufficient financial
resources and computing power, decoding an encrypted communication is not
a question of if, but of when. And as far as anonymization is concerned,
blocking of proxies is always an option within a system of diffuse
surveillance: we have seen that the practice exists both in democratic and
in authoritarian states. And if the user has been marked as dangerous by
the surveillance systems, the use of physical coercion is always another
option. But the most counter-productive aspect of these technologies is
that in a context where everybody trusts everybody else, where everybody
uses her/his real name on-line, and where nobody makes use of
cryptography, those who take a different approach have obviously something
to hide. By the simple (f)act of using these systems one turns oneself in
as it where, and becomes a target. Non-conformism in a context of
prevailing standard behaviour is suspicious. In the same breath, not
maintaining a Facebook account ("what does this person have to hide"?, not
having a mobile phone, and to live in an isolated place, all become cause
for suspicion.

Cryptography is not easy to use, and requires a fairly high level of
technical competence, and this is what hampers its widespread adoption
[15x]. As a specialised form of knowledge power, cryptography reinforces
the emergence of a hierarchy of more or less trustworthy experts.
Moreover, it does not really protect against profiling, since it is
perfectly possible to profile users of cryptography, as soon as they
communicate with less wary internauts: both the personal as well as the
group 'fingerprint' make it possible to trace that user out. The paradox
being that the more one tries to protect oneself, the more one stands out
from the mass of users, and hence the more one becomes recognizable/
identifiable. If your browser uses extensions preventing profiling, while
enabling anonymization and cryptography, and if your operating system is
of a particular type like GNU/Linux, you become much more visible to
prying electronic eyes than the lambda user with her/his less
sophisticated, 'mainstream' systems [16].

And cryptography has also attracted a lot of criticism by those who
consider that it shares the same idea of unlimited growth ? ever faster,
ever more powerful ? as libertarian turbo-capitalism. By enhancing
computer power and accelerating network speed, one increases the
effectiveness of the latest crytographic protocols: but this also renders
older systems rapidly obsolete. Besides, this innovation-obsolescence
model resonates with a military-type rationale of attack and defence, aka
spy vs. spy. We should not forget that by origin, these were always system
that were designed for military usage and that they were intended to
prevent communication interception by the enemy. To sum up, cryptography
is a nice exercise, especially for technology buffs found of logical
puzzles, but its basic approach is not satisfactory.

The other reaction, also widespread and quite popular, is luddism, brought
forward especially by machine-haters. Luddists are convinced that
information and communication technologies should be shunned, or even
destroyed. Their reasons include the fact that they represent a grave
danger to personal and collective liberties, that they provide governments
of whatever hue formidable instruments of repression, that they encourage
compulsive self-denunciation as the hierarchic management of these forms
of technological knowledge-power tend to create structures of technocratic
domination. (But then) there are both technophobic luddites, and also
technophile ones. The former are more consistent with themselves: they are
not at ease with appliances, especially digital ones. They often idealise
a mythical, natural past world - which never existed ? where humans were
not living under the yoke of machines. They say over and again, talking
about technology-induced, or exacerbated, calamities that "things were
better before" or "this would not have happened in previous times". They
are not entirely mistaken: Ivan Illich's criticism of industrial
technology tools is still relevant today. Technical systems become
counter-productive when they develop beyond a certain point, and once they
have passed the threshold of usefulness, they turn into a nuisance. Cars
within cities are a slow, polluting and dangerous mean of transport. The
same applies to the social Internet, which looks more and more like a
system which makes one feel alone while being in company, with everybody
being individually connected to the big network without physical contact
with the other people on it, and becoming detached from a reality turning
invisible.

But luddite technophobia is not coherent when it comes to its nature-based
purity: human history is cultural history, made up of (the development of)
technical ideas, which became materialized in technological tools. The
problem resides in domination practices, not in technology in itself,
which does no more exist as nature in itself does. The most extremist
(luddites) will even affirm that all technical systems should be
destroyed. Anarcho-primitivists like John Zitrain, for example, would like
to abolish the Internet, but also agriculture, art, language, all being
considered tools of oppression. But who wants to live in such a world?
Fundamentalist luddites exalt the inviolability of nature, and are
fanatics in the religious meaning of the term: the even promote the total
extinction of the human race as the sole remedy to the impending
catastrophe [17].

(to be contiued)
Next time: technophile luddists, technocrats, technolatry, and other
abominations ... ;-)




.......................................................

[12] Lorea is a self-managed, autonomous social network:
https://n-1.cc/g/lorea/
Diaspora is a community-run, distributed social network:
https://www.joindiaspora.com/
Openleaks is in limbo - or dead. (see note  )
[13] With asymmetric cryptography, every participating actor holds two
keys,  a public key, and a private one. The public key sHe distributes (or
public on a repository). The private key is individual and secret. The
public key serves to encode a document send to a receiver who holds
corresponding the private key, which sHe will use to decode that document.
With other words: everybody can send us a message, encoded with our public
key, but only we can open it. So much for asymmetric cryptography. With
symmetric cryptography, on the other hand, there is only one key and one
code. GPG is a fee software project using exclusively non patented
algorithms. As prescribed by the OpenPGP charter, it is a hybrid system,
whereby each message is encoded making use of a symmetric key, used for
that message only, which is in its turn encoded with the receiver's public
key. See:
https://www.gnupg.org/
Various plugins are available for easy OpenPGP add-on to various messaging
clients. Thunderbird's plugin is Enigmail:
https://www.enigmail.net/home/index.php
[14] Every TOR node negotiates asymmetric keys with other TOR nodes. This
way, security progressively with every connected node since decryption and
analysis becomes increasingly difficult, if not impossible:
https://www.torproject.org/
For a more efficient usage of TOR is both possible and advisable to
download an already configured webbrowser directly form the TOR site
On TOR's somewhat 'hybrid' history:
http://en.wikipedia.org/wiki/Tor_(anonymity_network)
[15x] And to darken the picturte further, 'public IT-experts' like Arjen
Kamphuis: http://www.gendo.nl/blog/arjen like to add "and crypto cannot be
endlessly simplified".
[16] The Panopticlick project of the Electronic Frontier Foundation:
https://panopticlick.eff.org/ provides not only a way to examine the
search engine one uses, but also demonstrates what use is made of one's
fingerprint in e-mail and on social media ? and how to nullify it. EFF's
initiative also points out that those who excel the most in their use of
IT instruments are the most easyly detectable. A full explanation of the
methodology used is provided in their article "How Unique Is Your Web
Browser?" :
https://panopticlick.eff.org/browser-uniqueness.pdf
[17] There is an excellent refutation of the logical absurdity represented
by extinctionist nihilism in Marco Maurizi's article "Che cos'`e
lántispecismo"
/Liberazioni/, no 4, February 2008:
http://www.liberazioni.org/articoli/MauriziM-06.htm
Note 7 reads: "Extinctionism is an absolute stupidity  because it is so
totally absurd from a strictly /logical/ point of view. If humans were
able to collectively arrive at the conclusion that they are basically evil
and hence decide to self-destruct, then they would herewith demonstrate
that they have attained such a high level of moral probity that they could
come to doubt the  validity of this badness: they would indeed turn out to
be the most altruistic animals ever seen on the face of earth! And thus it
is a case of either or. Either one assumes that humans can consciously
(deliberately) speed up their own extinction ? in which case one has to
assume that they can also accomplish ethical actions of a completely
different order. Or humans are nothing of the sort ? in which case the
whole move towards voluntary extinction makes no sense at all. It is hence
manifest that people flirting with the idea of extinction  mostly do so
for the sake of provocation. But then I cannot see the point at all of
this provocation, since it blocks out any sensible discussion of the
relation between nature and society.



-----------------------------

Translated by Patrice Riemens
This translation project is supported and facilitated by:
The Institute of Network Cultures, Amsterdam University of Applied Sciences
(http://networkcultures.org/wpmu/portal/)
The Antenna Foundation, Nijmegen
(http://www.antenna.nl - Dutch site)
(http://www.antenna.nl/indexeng.html - english site under construction)
Casa Nostra, Vogogna-Ossola, Italy


#  distributed via <nettime>: no commercial use without permission
#  <nettime>  is a moderated mailing list for net criticism,
#  collaborative text filtering and cultural politics of the nets
#  more info: http://mx.kein.org/mailman/listinfo/nettime-l
#  archive: http://www.nettime.org contact: nettime {AT} kein.org