SlideShare a Scribd company logo
1 of 11
CRYPTO-ANARCHISM!
BECAUSE INFORMATION WANTS TO
FUCK YOUR SHIT UP
Crypto-Anarchy

Anonymity / Pseudonymity

Crypto-society / cipherspace

Information in the Open

Publicity & Privacy
History & Theory
                                   http://en.wikipedia.org/
                                   wiki/
                                   Darknet_(file_sharing)

                                   Darknets started as
                                   net works that weren’t
                                   on Arpanet


 Timothy C. May - Cyphernomicon

 Eric Hughes - A Cypherpunk’s Manifesto

 Darknets

 Freenet
“Free” as in “Speech”

"I worry about my child and the Internet all the
time, even though she's too young to have
logged on yet. Here's what I worry about. I worry
that 10 or 15 years from now, she will come to
me and say 'Daddy, where were you when they
took freedom of the press away from the
Internet?'"
—Mike Godwin, Electronic Frontier Foundation
Practice                     http://en.wikipedia.org/wiki/
                             Tor_(anonymity_net work)

                             http://en.wikipedia.org/wiki/I2P

                             http://www.irongeek.com/i.php?
                             page=videos/getting-started-with-the-
                             i2p-darknet
Freenet
                             Garlic routing is a variant of onion routing that
                             encrypts multiple messages together to make it
The Onion Router (Tor)       more difficult for attackers to perform traffic
                             analysis.


I2P / Garlic routing

  eepSites

  iMule (eDonkey/kademlia)

  I2Phex (gnutella)

  BitTorrent

Comparisons
The Onion Router (TOR)




Tor: Onion-based routing that acts as a proxy
layer between the client computer and the Tor
network (middlemen encrypted data transfers)

Privoxy
http://en.wikipedia.org/wiki/
                Onion_routing


Onion routing   Patented by the US Navy

                Onion routers reroute messages in an
                unpredictable path

                Anonymity can be retained even
                with compromised intermediate
                routers

                Unlinkability - eavesdropper cannot
                easily determine both the sender and
                receiver

                Generally slow
Cryptoanarchism in
                                       http://

Action                                 www.irishtimes.com/
                                       newspaper/finance/

                                       http://iansbrain.com/
                                       2009/06/15/tor-and-
                                       the-iranian-election/




2009 Iranian Election protests: The Iran Curtain

Privacy is not Secrecy

Slippery slope of privacy erosion

The boiling frog
Information in the Open
Wikileaks            Wikileaks states that its "primary interest
                     is in exposing oppressive regimes in          "in response to the
                     Asia, the former Soviet bloc, Sub-            attempted suppression,
                     Saharan Africa and the Middle East, but       Wikileaks will release
  Authenticity & Consensus
                     we also expect to be of assistance to         several thousand additional
                     people of all regions who wish to reveal      pages of Scientology
                     unethical behavior in their governments       material next week"

  "The simplest and most effective countermeasure is a
                     and corporations."


  worldwide community of informed users and editors
  who can scrutinize and discuss leaked documents."

Activism on the public record

  Pittsburg G-20 protests on Twitter

Chilling Effects                                                      2003 incident in which
                                                                      Barbra Streisand
                                                                      unsuccessfully attempted to

Streisand Effect                                                      sue photographer Kenneth
                                                                      Adelman and Pictopia.com
                                                                      for US$50 million in an
                                                                      attempt to have the aerial
“Information Wants to
Be Free”                                               Stewart Brand at the first
                                                       Hackers' Conference in
                                                       1984
                                                       Stallman—founder of the
                                                       GNU Project and the Free
“On the one hand information wants to be expensive, because
                                                       Software Foundation

it's so valuable. The right information in the right place just
changes your life. On the other hand, information wants to be
free, because the cost of getting it out is getting lower and
lower all the time. So you have these two fighting against each
other.” —Stewart Brand

“I believe that all generally useful information should be free.
By 'free' I am not referring to price, but rather to the freedom to
copy the information and to adapt it to one's own uses... When
information is generally useful, redistributing it makes humanity
wealthier no matter who is distributing and no matter who is
receiving.” —Richard Stallman
Mirrors & Copyability

Mirrors & Copyability: Zero Cost

Streisand Effect

  De-CSS

  Scientology

  etc. ad infinitum!

More Related Content

What's hot

Supporting Activists to Preserve Video Documentation
Supporting Activists to Preserve Video Documentation Supporting Activists to Preserve Video Documentation
Supporting Activists to Preserve Video Documentation dri_ireland
 
Women Who Tech Video Activism
Women Who Tech Video ActivismWomen Who Tech Video Activism
Women Who Tech Video ActivismShirley Sexton
 
It's all fun and games until someone wants to sue you: Reporting in the age o...
It's all fun and games until someone wants to sue you: Reporting in the age o...It's all fun and games until someone wants to sue you: Reporting in the age o...
It's all fun and games until someone wants to sue you: Reporting in the age o...Brianna Laugher
 
Introduction to Anonymous
Introduction to AnonymousIntroduction to Anonymous
Introduction to AnonymousTom Tresser
 

What's hot (6)

Supporting Activists to Preserve Video Documentation
Supporting Activists to Preserve Video Documentation Supporting Activists to Preserve Video Documentation
Supporting Activists to Preserve Video Documentation
 
Video Activism
Video ActivismVideo Activism
Video Activism
 
WikiLeaks
WikiLeaksWikiLeaks
WikiLeaks
 
Women Who Tech Video Activism
Women Who Tech Video ActivismWomen Who Tech Video Activism
Women Who Tech Video Activism
 
It's all fun and games until someone wants to sue you: Reporting in the age o...
It's all fun and games until someone wants to sue you: Reporting in the age o...It's all fun and games until someone wants to sue you: Reporting in the age o...
It's all fun and games until someone wants to sue you: Reporting in the age o...
 
Introduction to Anonymous
Introduction to AnonymousIntroduction to Anonymous
Introduction to Anonymous
 

Similar to Cryptoanarchism

Regulatory Theory in Social Media Society
Regulatory Theory in Social Media SocietyRegulatory Theory in Social Media Society
Regulatory Theory in Social Media SocietyMathias Klang
 
Pedagogical Challenges of Social Media
Pedagogical Challenges of Social MediaPedagogical Challenges of Social Media
Pedagogical Challenges of Social MediaMathias Klang
 
Privacy, social networks and EU policy
Privacy, social networks and EU policyPrivacy, social networks and EU policy
Privacy, social networks and EU policyChris Marsden
 
Human Rights & Technology
Human Rights & TechnologyHuman Rights & Technology
Human Rights & TechnologyMathias Klang
 
Debating the networked society: technical roots of social change
Debating the networked society: technical roots of social changeDebating the networked society: technical roots of social change
Debating the networked society: technical roots of social changeMathias Klang
 
20130724 ted x-marc smith-digital health futures empowerment or coercion
20130724 ted x-marc smith-digital health futures empowerment or coercion20130724 ted x-marc smith-digital health futures empowerment or coercion
20130724 ted x-marc smith-digital health futures empowerment or coercionMarc Smith
 
Discussing the Global Commision on Internet Governance statement, Toward a So...
Discussing the Global Commision on Internet Governance statement, Toward a So...Discussing the Global Commision on Internet Governance statement, Toward a So...
Discussing the Global Commision on Internet Governance statement, Toward a So...Philip Sheldrake
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxGeetha982072
 
The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020Jayna Mistry
 
Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsAdam David Brown
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Peter Ludlow
 
Mensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark webMensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark webPaul Brooks
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet ReportAhmed Mater
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyCRS4 Research Center in Sardinia
 
2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)Felipe Prado
 

Similar to Cryptoanarchism (20)

Regulatory Theory in Social Media Society
Regulatory Theory in Social Media SocietyRegulatory Theory in Social Media Society
Regulatory Theory in Social Media Society
 
Pedagogical Challenges of Social Media
Pedagogical Challenges of Social MediaPedagogical Challenges of Social Media
Pedagogical Challenges of Social Media
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Privacy, social networks and EU policy
Privacy, social networks and EU policyPrivacy, social networks and EU policy
Privacy, social networks and EU policy
 
Human Rights & Technology
Human Rights & TechnologyHuman Rights & Technology
Human Rights & Technology
 
Debating the networked society: technical roots of social change
Debating the networked society: technical roots of social changeDebating the networked society: technical roots of social change
Debating the networked society: technical roots of social change
 
The Darknet Emerges
The Darknet EmergesThe Darknet Emerges
The Darknet Emerges
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
20130724 ted x-marc smith-digital health futures empowerment or coercion
20130724 ted x-marc smith-digital health futures empowerment or coercion20130724 ted x-marc smith-digital health futures empowerment or coercion
20130724 ted x-marc smith-digital health futures empowerment or coercion
 
Discussing the Global Commision on Internet Governance statement, Toward a So...
Discussing the Global Commision on Internet Governance statement, Toward a So...Discussing the Global Commision on Internet Governance statement, Toward a So...
Discussing the Global Commision on Internet Governance statement, Toward a So...
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020
 
Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human Rights
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.
 
Mensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark webMensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark web
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet Report
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
 
Dark Web
Dark WebDark Web
Dark Web
 
2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)
 

Recently uploaded

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Recently uploaded (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

Cryptoanarchism

  • 2. Crypto-Anarchy Anonymity / Pseudonymity Crypto-society / cipherspace Information in the Open Publicity & Privacy
  • 3. History & Theory http://en.wikipedia.org/ wiki/ Darknet_(file_sharing) Darknets started as net works that weren’t on Arpanet Timothy C. May - Cyphernomicon Eric Hughes - A Cypherpunk’s Manifesto Darknets Freenet
  • 4. “Free” as in “Speech” "I worry about my child and the Internet all the time, even though she's too young to have logged on yet. Here's what I worry about. I worry that 10 or 15 years from now, she will come to me and say 'Daddy, where were you when they took freedom of the press away from the Internet?'" —Mike Godwin, Electronic Frontier Foundation
  • 5. Practice http://en.wikipedia.org/wiki/ Tor_(anonymity_net work) http://en.wikipedia.org/wiki/I2P http://www.irongeek.com/i.php? page=videos/getting-started-with-the- i2p-darknet Freenet Garlic routing is a variant of onion routing that encrypts multiple messages together to make it The Onion Router (Tor) more difficult for attackers to perform traffic analysis. I2P / Garlic routing eepSites iMule (eDonkey/kademlia) I2Phex (gnutella) BitTorrent Comparisons
  • 6. The Onion Router (TOR) Tor: Onion-based routing that acts as a proxy layer between the client computer and the Tor network (middlemen encrypted data transfers) Privoxy
  • 7. http://en.wikipedia.org/wiki/ Onion_routing Onion routing Patented by the US Navy Onion routers reroute messages in an unpredictable path Anonymity can be retained even with compromised intermediate routers Unlinkability - eavesdropper cannot easily determine both the sender and receiver Generally slow
  • 8. Cryptoanarchism in http:// Action www.irishtimes.com/ newspaper/finance/ http://iansbrain.com/ 2009/06/15/tor-and- the-iranian-election/ 2009 Iranian Election protests: The Iran Curtain Privacy is not Secrecy Slippery slope of privacy erosion The boiling frog
  • 9. Information in the Open Wikileaks Wikileaks states that its "primary interest is in exposing oppressive regimes in "in response to the Asia, the former Soviet bloc, Sub- attempted suppression, Saharan Africa and the Middle East, but Wikileaks will release Authenticity & Consensus we also expect to be of assistance to several thousand additional people of all regions who wish to reveal pages of Scientology unethical behavior in their governments material next week" "The simplest and most effective countermeasure is a and corporations." worldwide community of informed users and editors who can scrutinize and discuss leaked documents." Activism on the public record Pittsburg G-20 protests on Twitter Chilling Effects 2003 incident in which Barbra Streisand unsuccessfully attempted to Streisand Effect sue photographer Kenneth Adelman and Pictopia.com for US$50 million in an attempt to have the aerial
  • 10. “Information Wants to Be Free” Stewart Brand at the first Hackers' Conference in 1984 Stallman—founder of the GNU Project and the Free “On the one hand information wants to be expensive, because Software Foundation it's so valuable. The right information in the right place just changes your life. On the other hand, information wants to be free, because the cost of getting it out is getting lower and lower all the time. So you have these two fighting against each other.” —Stewart Brand “I believe that all generally useful information should be free. By 'free' I am not referring to price, but rather to the freedom to copy the information and to adapt it to one's own uses... When information is generally useful, redistributing it makes humanity wealthier no matter who is distributing and no matter who is receiving.” —Richard Stallman
  • 11. Mirrors & Copyability Mirrors & Copyability: Zero Cost Streisand Effect De-CSS Scientology etc. ad infinitum!

Editor's Notes

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n