<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Center for a Stateless Society &#187; privacy</title>
	<atom:link href="http://c4ss.org/content/tag/privacy/feed" rel="self" type="application/rss+xml" />
	<link>http://c4ss.org</link>
	<description>building public awareness of left-wing market anarchism</description>
	<lastBuildDate>Sat, 24 Jan 2015 03:46:54 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.0.1</generator>
	<item>
		<title>Privacy 2014: Is There a &#8220;Right to be Forgotten?&#8221;</title>
		<link>http://c4ss.org/content/27870</link>
		<comments>http://c4ss.org/content/27870#comments</comments>
		<pubDate>Mon, 02 Jun 2014 18:00:14 +0000</pubDate>
		<dc:creator><![CDATA[Thomas L. Knapp]]></dc:creator>
				<category><![CDATA[Commentary]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[hierarchy]]></category>
		<category><![CDATA[monopoly]]></category>
		<category><![CDATA[politics]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[right to be forgotten]]></category>
		<category><![CDATA[right to privacy]]></category>
		<category><![CDATA[state]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=27870</guid>
		<description><![CDATA[Everyone seems to like privacy &#8212; so much so that we often expand the term into the social concept of &#8220;privacy rights,&#8221; indicating that privacy isn&#8217;t just a good thing but something to which we are all entitled. This leaves unanswered an important question: &#8220;To what degree and in what respects?&#8221; Last month the European...]]></description>
				<content:encoded><![CDATA[<p>Everyone seems to like privacy &#8212; so much so that we often expand the term into the social concept of &#8220;privacy rights,&#8221; indicating that privacy isn&#8217;t just a good thing but something to which we are all entitled. This leaves unanswered an important question: &#8220;To what degree and in what respects?&#8221; Last month <a href="http://www.theguardian.com/technology/2014/may/13/right-to-be-forgotten-eu-court-google-search-results" target="_blank">the European Court of Justice offered up an interesting answer</a> to that question, positing a &#8220;right to be forgotten.&#8221;</p>
<p>The court, pursuant to a lawsuit filed by Mario Gonzales of Spain, ordered Google to remove from its search results a 1998 newspaper article concerning the public auction of Gonzales&#8217;s repossessed home. Gonzales did not claim the article was untrue or inaccurate. Instead, he asserted that information pertaining to him (in particular, information which might disadvantage him, justifiably or not, if made easily available to others) should be placed under his exclusive control with respect to Internet search results.</p>
<p>Thus was born the &#8220;right to be forgotten&#8221; &#8212; or forgotten by Google, at any rate.  <a href="http://www.bbc.com/news/technology-27631001" target="_blank">Google is cooperating</a>: They&#8217;ve set up an online claim/application process for those who want specific pieces of information removed from their public search indices. The court&#8217;s criterion for evaluating these claims is that the information is question is &#8220;inadequate, irrelevant or no longer relevant,&#8221; although that raises the further conundrum of who decides questions of adequacy and relevance.</p>
<p>This case and its outcome touch on several issues with which civil and political libertarians, not to mention anarchists like myself, have wrestled for some time. While it seems incontestable that &#8220;privacy&#8221; is a valued thing, it&#8217;s not obvious just how market processes might produce similar outcomes with respect to claims like Gonzales&#8217;s versus the way a powerful state with long-armed courts enforces such claims.</p>
<p>In fact, for those who believe &#8220;privacy rights&#8221; extend as far as the court&#8217;s ruling seems to claim (or even farther), the ruling might itself constitute an argument against anti-statism or even &#8220;limited government&#8221; (a court in Luxembourg enforcing the demands of a plaintiff from Spain against a company in the United States with respect to the informational content of a global network doesn&#8217;t seem very &#8220;limited,&#8221; does it?).</p>
<p>To me, the ruling is evidence of the opposite proposition. The fact that markets would probably not produce the same results as governments have produced means that governments are going too far and that &#8220;privacy rights,&#8221; if they exist at all, do not justly extend so far as this ruling implies.</p>
<p>In this specific case, the claim seems to be less one of privacy and more one of &#8220;intellectual property.&#8221; Gonzales doesn&#8217;t claim that Google peeked through his window and saw him writing down notice of that 1998 auction. He acknowledges that it was, at the time, a publicly reported event. He&#8217;s just claiming that now, 16 years later, he &#8220;owns&#8221; knowledge of that event and is entitled to control it, while Google doesn&#8217;t and isn&#8217;t.</p>
<p>We are at the point where efforts to protect privacy necessarily navigate between the perceived Scylla of &#8220;information wants to be free&#8221; and the Charybdis of state-created &#8220;intellectual property&#8221; monopolies. In my opinion, the idea of information freedom as Scylla is largely fantasy. The power of the state to compel &#8220;forgetfulness&#8221; is far more dangerous than any unintended or unwanted disclosure of truth could possibly be.</p>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=27870&amp;md5=599dac8834701d453449bee433845992" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/27870/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F27870&amp;language=en_GB&amp;category=text&amp;title=Privacy+2014%3A+Is+There+a+%26%238220%3BRight+to+be+Forgotten%3F%26%238221%3B&amp;description=Everyone+seems+to+like+privacy+%26%238212%3B+so+much+so+that+we+often+expand+the+term+into+the+social+concept+of+%26%238220%3Bprivacy+rights%2C%26%238221%3B+indicating+that+privacy+isn%26%238217%3Bt+just+a+good+thing...&amp;tags=Google%2Chierarchy%2Cmonopoly%2Cpolitics%2Cprivacy%2Cright+to+be+forgotten%2Cright+to+privacy%2Cstate%2Cblog" type="text/html" />
	</item>
		<item>
		<title>Totalitarismo Identificativo</title>
		<link>http://c4ss.org/content/26869</link>
		<comments>http://c4ss.org/content/26869#comments</comments>
		<pubDate>Fri, 02 May 2014 11:00:14 +0000</pubDate>
		<dc:creator><![CDATA[Erick Vasconcelos]]></dc:creator>
				<category><![CDATA[Italian]]></category>
		<category><![CDATA[Stateless Embassies]]></category>
		<category><![CDATA[biometric national identification cards]]></category>
		<category><![CDATA[Brazil]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[private information]]></category>
		<category><![CDATA[relisting]]></category>
		<category><![CDATA[state]]></category>
		<category><![CDATA[totalitarianism]]></category>
		<category><![CDATA[voter card]]></category>
		<category><![CDATA[voting]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=26869</guid>
		<description><![CDATA[Quelli che non hanno risposto alla richiesta di “registrazione biometrica”, che ha coinvolto circa 14 milioni di elettori in diverse città brasiliane, perderanno il diritto di voto, la possibilità di iscriversi ad un’istituzione scolastica pubblica, di godere di assistenza pubblica e di fare domanda per un lavoro pubblico. Non potranno neanche fare cose banali ed...]]></description>
				<content:encoded><![CDATA[<p>Quelli che non hanno risposto alla richiesta di “registrazione biometrica”, che ha coinvolto circa 14 milioni di elettori in diverse città brasiliane, perderanno il diritto di voto, la possibilità di iscriversi ad un’istituzione scolastica pubblica, di godere di assistenza pubblica e di fare domanda per un lavoro pubblico. Non potranno neanche fare cose banali ed essenziali come aprire un conto in banca o richiedere un passaporto. Fortunatamente, il governo è stato <a href="http://ne10.uol.com.br/canal/cotidiano/grande-recife/noticia/2014/03/31/mesmo-com-novo-prazo-eleitores-enfrentam-filas-para-fazer-cadastramento-biometrico-479402.php">così generoso</a> da offrire ai ritardatari la possibilità di “regolarizzare” la loro posizione entro il 7 maggio “senza multe”. Rassicurante, vero?</p>
<p>Lo stato brasiliano vuole acquisire i dati biometrici di oltre 140 milioni di elettori in modo da rendere le prossime elezioni “sicure”. Per arrivare a ciò si pensa che sia necessario catalogare le impronte digitali di tutte le dita, la fotografia e la firma di ogni persona. Il nuovo certificato elettorale riflette queste informazioni. Senza questo certificato, lo stato non può imporre l’embargo economico contro l’individuo, che a questo punto non potrà più richiedere un passaporto per scappare dal paese.</p>
<p>Il certificato elettorale non è che uno dei tanti strumenti di identificazione e sorveglianza nelle mani del governo brasiliano: la carta d’identità (che tutti dovrebbero portare sempre con sé), il CPF (il codice fiscale brasiliano), la patente di guida, il certificato che attesta il servizio militare o l’esenzione (obbligatorio per gli uomini), il libretto di lavoro, il passaporto, il certificato di nascita, il certificato di matrimonio…</p>
<p>Uno pensa che il governo ha già abbastanza informazioni sui suoi soggetti ma, apparentemente, il bisogno di rendere “sicura” la “celebrazione della democrazia” vuole che la gente dia informazioni ancora più personali alle autorità. Se occorrono tutte queste informazioni per rendere il voto sicuro, non è che le elezioni passate erano una frode? Chissà.</p>
<p>Ovviamente è tutta una finzione, una cortina di fumo che serve a nascondere l’ennesimo passo verso la concentrazione del potere totalitario nelle mani dello stato. La scusa relativamente innocua delle elezioni sicure è solo un precedente messo su per garantire allo stato un potere di controllo della popolazione ancora più ampio e, più in là, chiedere ulteriori informazioni private.</p>
<p>Niente di tutto ciò è necessario. Neanche l’obbligo di voto è necessario. Lo stato continua a far finta che l’obiettivo sia garantire elezioni esenti da frodi quando, in realtà, potrebbe benissimo abolire l’obbligo di voto e smetterla di punire chi non vota. Senza l’obbligo di voto, le ragioni alla base della schedatura degli elettori sono irrilevanti.</p>
<p>La più grande ironia è che il Brasile avrà, teoricamente, un sistema di identificazione sicurissimo e, allo stesso tempo, un <a href="http://https://en.wikipedia.org/wiki/elections_in_brazil%23the_brazilian_voting_machines">sistema di voto elettronico</a> immune da contestazioni. È praticamente impossibile sapere se la macchinetta elettorale non è soggetta a frode, visto che non esiste un sistema indipendente di verifica e revisione, né esiste una ricevuta per l’elettore. La macchinetta è una scatola nera, contestata solo da frange estreme dell’élite, come Leonel Brizola, deriso e disprezzato ogni volta che sollevava dubbi al proposito.</p>
<p>Questo è il sistema elettorale perfetto per la classe di governo: Combina il massimo della sorveglianza, l’obbligo di voto che garantisce un’affluenza altissima, e nessuna possibilità di verifica e conteggio indipendenti. Legittimità totale dello stato, dunque, e nessun dubbio sul suo potere.</p>
<p>Il sogno del totalitarismo tropicale morbido.</p>
<p><a href="http://pulgarias.wordpress.com/" target="_blank">Traduzione di Enrico Sanna</a>.</p>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=26869&amp;md5=dbca8df93e086b24fad105b1f3ce83a0" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/26869/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F26869&amp;language=en_GB&amp;category=text&amp;title=Totalitarismo+Identificativo&amp;description=Quelli+che+non+hanno+risposto+alla+richiesta+di+%E2%80%9Cregistrazione+biometrica%E2%80%9D%2C+che+ha+coinvolto+circa+14+milioni+di+elettori+in+diverse+citt%C3%A0+brasiliane%2C+perderanno+il+diritto+di+voto%2C+la+possibilit%C3%A0+di...&amp;tags=biometric+national+identification+cards%2CBrazil%2Cinformation%2CItalian%2Cprivacy%2Cprivate+information%2Crelisting%2Cstate%2CStateless+Embassies%2Ctotalitarianism%2Cvoter+card%2Cvoting%2Cblog" type="text/html" />
	</item>
		<item>
		<title>Identification Totalitarianism</title>
		<link>http://c4ss.org/content/26463</link>
		<comments>http://c4ss.org/content/26463#comments</comments>
		<pubDate>Thu, 17 Apr 2014 18:00:33 +0000</pubDate>
		<dc:creator><![CDATA[Erick Vasconcelos]]></dc:creator>
				<category><![CDATA[Commentary]]></category>
		<category><![CDATA[biometric national identification cards]]></category>
		<category><![CDATA[Brazil]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[Italian]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[private information]]></category>
		<category><![CDATA[relisting]]></category>
		<category><![CDATA[state]]></category>
		<category><![CDATA[Stateless Embassies]]></category>
		<category><![CDATA[totalitarianism]]></category>
		<category><![CDATA[voter card]]></category>
		<category><![CDATA[voting]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=26463</guid>
		<description><![CDATA[People who did not turn up for the &#8220;biometric relisting,&#8221; which ocurred in several Brazilian cities, summoning about 14 million voters, will lose their voter registration cards, their ability to enroll in public education institutions, to benefit from welfare programs or to apply for public jobs. They will not even be able to do such...]]></description>
				<content:encoded><![CDATA[<p>People who did not turn up for the &#8220;biometric relisting,&#8221; which ocurred in several Brazilian cities, summoning about 14 million voters, will lose their voter registration cards, their ability to enroll in public education institutions, to benefit from welfare programs or to apply for public jobs. They will not even be able to do such trivial and essential things such as opening a bank account or getting a passport. Fortunately, the government was <a href="http://ne10.uol.com.br/canal/cotidiano/grande-recife/noticia/2014/03/31/mesmo-com-novo-prazo-eleitores-enfrentam-filas-para-fazer-cadastramento-biometrico-479402.php" target="_blank">generous enough</a> to offer the laggards a chance to &#8220;regularize&#8221; their situation by May 7, &#8220;with no fines.&#8221; Reassuring, is it not?</p>
<p>The Brazilian state intends to acquire the biometric data from more than 140 million voters in order to make our next elections &#8220;secure.&#8221; For that goal, it is supposedly necessary to collect, from every person, the fingerprints from all fingers, their picture and signature. The new voter registration card is produced reflecting the newly collected information. Without this card, the state directs an economic embargo against the individual &#8212; who is no longer able to get a passport to flee from the country.</p>
<p>The voter card is but one of the many tools of identification and surveillance the Brazilian government possesses: ID (which should be carried at all times by every person), CPF (the registration to the federal revenue service), driver&#8217;s license, military enlisting or dispensation certificate (mandatory for men), employment record book, passport, birth certificate, marriage certificate &#8230;</p>
<p>One would think the government should have sufficient information about its subjects, but, apparently, the need to make voting &#8220;secure&#8221; for the &#8220;celebration of democracy&#8221; requires people to turn over even more of their private data to the authorities. If so much information is necessary for us to have secure voting, is it possible that our previous elections have been a fraud? We are left to wonder.</p>
<p>Of course, all of this is but a lie, a smokescreen designed to distract from the fact that this is another step towards total power concentration in the state. The relatively innocuous purpose of guaranteeing clean elections is just a precedent put in place so that the government can amass even more power to control the population and, down the line, demand even more private information.</p>
<p>None of this is necessary. It is also not necessary that voting should continue to be mandatory in Brazil. The state continues to pretend that its purpose is to guarantee elections free of fraud when, in fact, it could easily just end the obligation to vote and stop punishing those who do not. Without mandatory voting, the argument to relist the voting population is irrelevant.</p>
<p>The biggest Brazilian irony is that we will have, theoretically, an extremely safe identification system while, on the other hand, we have an <a href="https://en.wikipedia.org/wiki/Elections_in_Brazil#The_Brazilian_voting_machines" target="_blank">electronic voting system</a> immune to contestation. It is virtually impossible to know if the electronic ballot box is <em>not</em> prone to fraud, since there are no independent means of verification and auditing, and no physical voting receipts. The Brazilian electronic voting is a black box, whose only opponents are those on the fringes of the ruling elite, such as <a href="https://en.wikipedia.org/wiki/Leonel_Brizola" target="_blank">Leonel Brizola</a>, who are promptly laughed at and scorned should they raise any doubts over it.</p>
<p>This is a perfect electoral system for the ruling class: It combines maximum surveillance, mandatory voting which guarantees very large turnout, and no possibility of independent verification and recounting. Therefore, we have total legitimacy for the state and no questioning of its power.</p>
<p>It is the dream of the gentle tropical totalitarianism.</p>
<p>Translations for this article:</p>
<ul>
<li>Italian, <a href="http://c4ss.org/content/26869" target="_blank">Totalitarismo Identificativo</a>.</li>
</ul>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=26463&amp;md5=4715138caa8d41dcf58ffb644f38877c" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/26463/feed</wfw:commentRss>
		<slash:comments>1</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F26463&amp;language=en_GB&amp;category=text&amp;title=Identification+Totalitarianism&amp;description=People+who+did+not+turn+up+for+the+%26%238220%3Bbiometric+relisting%2C%26%238221%3B+which+ocurred+in+several+Brazilian+cities%2C+summoning+about+14+million+voters%2C+will+lose+their+voter+registration+cards%2C+their+ability+to...&amp;tags=biometric+national+identification+cards%2CBrazil%2Cinformation%2CItalian%2Cprivacy%2Cprivate+information%2Crelisting%2Cstate%2CStateless+Embassies%2Ctotalitarianism%2Cvoter+card%2Cvoting%2Cblog" type="text/html" />
	</item>
		<item>
		<title>Anti-Libertarian On Libertarians Involved In Anti-Spying Rally: &#8220;Ew, Icky!&#8221;</title>
		<link>http://c4ss.org/content/22044</link>
		<comments>http://c4ss.org/content/22044#comments</comments>
		<pubDate>Wed, 23 Oct 2013 18:00:35 +0000</pubDate>
		<dc:creator><![CDATA[Trevor Hultner]]></dc:creator>
				<category><![CDATA[Commentary]]></category>
		<category><![CDATA[choice]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[internet freedom]]></category>
		<category><![CDATA[left-libertarian]]></category>
		<category><![CDATA[libertarian]]></category>
		<category><![CDATA[liberty]]></category>
		<category><![CDATA[matrix reality]]></category>
		<category><![CDATA[politics]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[united states]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=22044</guid>
		<description><![CDATA[It&#8217;s impossible to make this stuff up, folks. Salon.com columnist Tom Watson, in an article on the upcoming &#8220;Stop Watching Us&#8221; rally in Washington, D.C., has excoriated all of his progressive friends for supporting something that libertarians &#8212; surprise! &#8212; also support. He writes, &#8220;Some of the biggest names in civil liberties and digital freedom...]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.salon.com/2013/10/21/dont_ally_with_libertarians_ideologues_co_opt_an_anti_nsa_rally/">It&#8217;s impossible to make this stuff up, folks.</a></p>
<p>Salon.com columnist Tom Watson, in an article on the upcoming &#8220;Stop Watching Us&#8221; rally in Washington, D.C., has excoriated all of his progressive friends for supporting something that libertarians &#8212; surprise! &#8212; also support.</p>
<p>He writes, &#8220;Some of the biggest names in civil liberties and digital freedom of information will be there, including the ACLU, Electronic Frontier Foundation, FreePress and FreedomWorks. [&#8230;] Yet I cannot support this coalition or the rally. It is fatally compromised by the prominent leadership and participation of the Libertarian Party and other libertarian student groups; their hard-core ideology stands in direct opposition to almost everything I believe in as a social democrat.&#8221;</p>
<p>This is like a child on the playground refusing to play with the other kids because &#8220;cooties.&#8221; Also, <a href="http://www.freedomworks.org/the-tea-party-budget">isn&#8217;t FreedomWorks supposed to be a Tea Party organization?</a></p>
<p>His main ideological disagreement with the &#8220;ickier&#8221; sponsors of the Stop Watching Us rally? &#8220;&#8230;<a href="http://c4ss.org/content/16185">[opposition to] all gun control laws</a> and public healthcare, [support of] <a href="http://c4ss.org/content/21746">the government shutdown,</a> [dismissal of] public education, <a href="http://c4ss.org/content/16349">[opposition to] organized labor,</a> [and] favors the end of Social Security as we know it.&#8221;</p>
<p><a href="https://rally.stopwatching.us">Remember, this is an anti-surveillance rally we&#8217;re talking about here.</a> These other issues, while absolutely argument-worthy in a variety of other contexts, really have nothing to do with the focus of the rally at all. Of course &#8230;</p>
<blockquote><p><a href="https://www.twitter.com/onekade/status/392444567452418048">@onekade: To my libertarian friends:</a> when we win and demolish the surveillance/police/military state, I will fight you on social welfare SO HARD.</p></blockquote>
<p>Right back at you. <img src="http://c4ss.org/wp-includes/images/smilies/icon_wink.gif" alt=";)" class="wp-smiley" /></p>
<p>Anyway, Watson continues:</p>
<blockquote><p>Going &#8216;all in&#8217; with the libertarian purists is a fatal and unnecessary compromise; reform is clearly needed, but the presence of anti-government laissez-faire wingers at the beating heart of the privacy movement will surely sour the very political actors that movement desperately needs to make actual – and not symbolic, link bait – progress in its fight.</p></blockquote>
<p>And to whom is he referring?</p>
<p style="padding-left: 30px;">&#8220;I speak of the progressive movement and the Democratic Party, of course.&#8221;</p>
<p>Oh.</p>
<p>Perhaps, in other circles, Watson is currently being lauded for taking a fearless and surely unpopular stance against the evilest of evil Bad Guys in the land (yes, even more evil than the <a href="http://trevorhultner.com/2013/09/12/the-rise-of-the-myth-of-the-republican-anarchist/">Republican Anarchists that definitely exist</a>). Really, though, it just looks like he&#8217;s dueling with windmills.</p>
<p>At one point, Watson writes,</p>
<p style="padding-left: 30px;">Political change requires choices and compromise, as well as action. If too many young organizers focus entirely on privacy and security and abandon the front lines on crucial economic issues, civil rights and inequality, the rights of workers, criminal justice reform, environmental regulation, and the pursuit social justice, their gains will be too little and society’s loss too great.</p>
<p style="padding-left: 30px;">Or libertarianism itself will rise, and our loss of liberty will be greater still. That’s because libertarianism is a form of authoritarianism disguised in a narrow slice of civil liberties. In trumpeting the all-knowing, ever wise wonders of the totally free and unencumbered market, it bestows all the power on those with access to capital. You may say we’re there already, but under a pure libertarian system, things would get much worse.</p>
<p>What? &#8220;Libertarianism is a form of authoritarianism disguised in a narrow slice of civil liberties?&#8221; That&#8217;s rich coming from a proud member of <a href="http://c4ss.org/content/21496">a party that aims to break our legs so it can provide the crutches.</a></p>
<p>What&#8217;s sad here is that Watson is so misinformed regarding libertarianism in general (we won&#8217;t even get into left- or thick libertarianism here) that he has no idea that there are in fact libertarian writers and thinkers and activists talking about the issues he mentions &#8212; people like <a href="http://www.cato.org/events/rise-warrior-cop-militarization-americas-police-forces">Radley Balko</a>, <a href="http://www.stephankinsella.com/publications/">Stephan Kinsella</a>, <a href="http://www.mutualist.org/id4.html">Kevin Carson</a>, <a href="http://sexandthestate.com">Cathy Reisenwitz</a>, <a href="http://c4ss.org/content/author/ineffabelle">Anna Morgenstern</a> and <a href="http://antiwar.com/who.php">Angela Keaton.</a></p>
<p>And let&#8217;s not forget that many people connected to this event that Watson admires &#8212; such as Glenn Greenwald &#8212; have written for, say, the oft-maligned Cato Unbound, and have been asked to speak at libertarian events before. Needless to say, their standing in the broader progressive community, and even among the radical left, has not been tarnished. His concern, while touching, is probably pretty unfounded.</p>
<p>Watson is right, though, on at least one thing: The &#8220;I&#8217;ve got mine,&#8221; borderline-nihilist attitude he displays at any prospect of working with people he might dislike for six hours has no place in a burgeoning movement that aims &#8212; at the very least &#8212; to stop the government from using its power to spy on us.</p>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=22044&amp;md5=2f2949890938d35bb9ca788d70c3583a" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/22044/feed</wfw:commentRss>
		<slash:comments>4</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F22044&amp;language=en_GB&amp;category=text&amp;title=Anti-Libertarian+On+Libertarians+Involved+In+Anti-Spying+Rally%3A+%26%238220%3BEw%2C+Icky%21%26%238221%3B&amp;description=It%26%238217%3Bs+impossible+to+make+this+stuff+up%2C+folks.+Salon.com+columnist+Tom+Watson%2C+in+an+article+on+the+upcoming+%26%238220%3BStop+Watching+Us%26%238221%3B+rally+in+Washington%2C+D.C.%2C+has+excoriated+all+of+his...&amp;tags=choice%2Cinternet%2Cinternet+freedom%2Cleft-libertarian%2Clibertarian%2Cliberty%2Cmatrix+reality%2Cpolitics%2Cprivacy%2Cunited+states%2Cblog" type="text/html" />
	</item>
		<item>
		<title>Are NSA Efforts To Quell Leaking Too Little Too Late?</title>
		<link>http://c4ss.org/content/21556</link>
		<comments>http://c4ss.org/content/21556#comments</comments>
		<pubDate>Thu, 26 Sep 2013 04:52:55 +0000</pubDate>
		<dc:creator><![CDATA[Travis Eby]]></dc:creator>
				<category><![CDATA[Stigmergy - C4SS Blog]]></category>
		<category><![CDATA[Action]]></category>
		<category><![CDATA[aggression]]></category>
		<category><![CDATA[labor]]></category>
		<category><![CDATA[police state]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=21556</guid>
		<description><![CDATA[NSA analyst Edward Snowden shook the intelligence community as well as the public when he released a trove of secret NSA files to the world. In the aftermath of his action, the United States government reared its aggressive head as it worked very hard to capture and imprison him. In the process a global drama...]]></description>
				<content:encoded><![CDATA[<p>NSA analyst Edward Snowden shook the intelligence community as well as the public when he released a trove of secret NSA files to the world. In the aftermath of his action, the United States government reared its aggressive head as it worked very hard to capture and imprison him. In the process a global drama ensued as well as an invigorated public discourse on the nature of privacy and what the government is doing to peer into our private lives.</p>
<p>As the investigation into how Snowden’s acts of rebellion were carried out, the NSA has reportedly uncovered that he accessed the documents via an internal website of the agency itself. The documents were posted to the internal website, and Snowden was able to access them easily with his security clearance. Under the radar of his supervisor he easily made digital copies of what he found.</p>
<p>Since the NSA data was leaked by Snowden the agency has apparently taken steps to limit employee options for storing data in an effort to avoid future leaks. The question, of course, is whether or not such efforts will truly have an effect. If they do stop leakers, will they serve to inhibit the overall communication process between what is already a mess of bureaucratic agencies? In other words, are their systems permanently disrupted no matter what they do?</p>
<p>Perhaps it goes even deeper, into something that has become pervasive. Kevin Carson’s <a href="http://c4ss.org/content/21525">Two, Three, Many Snowdens!</a> has us look at an ever growing class of workers that are rebellious, anti-authoritarian hackers, and who happen to be getting jobs in government security.</p>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=21556&amp;md5=0c480dca3b9cf609b765a74a29440c6d" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/21556/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F21556&amp;language=en_GB&amp;category=text&amp;title=Are+NSA+Efforts+To+Quell+Leaking+Too+Little+Too+Late%3F&amp;description=NSA+analyst+Edward+Snowden+shook+the+intelligence+community+as+well+as+the+public+when+he+released+a+trove+of+secret+NSA+files+to+the+world.+In+the+aftermath+of+his...&amp;tags=Action%2Caggression%2Clabor%2Cpolice+state%2Cprivacy%2Cblog" type="text/html" />
	</item>
		<item>
		<title>The Phony Trade-off Between Privacy and Security</title>
		<link>http://c4ss.org/content/20903</link>
		<comments>http://c4ss.org/content/20903#comments</comments>
		<pubDate>Sun, 18 Aug 2013 16:00:49 +0000</pubDate>
		<dc:creator><![CDATA[Sheldon Richman]]></dc:creator>
				<category><![CDATA[Commentary]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[police state]]></category>
		<category><![CDATA[politics]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[security state]]></category>
		<category><![CDATA[state]]></category>
		<category><![CDATA[united states]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=20903</guid>
		<description><![CDATA[Most people take it for granted — because they’ve heard it so many times from politicians and pundits — that they must trade some privacy for security in this dangerous world. The challenge, we’re told, is to find the right “balance.” Let’s examine this. On its face the idea seems reasonable. I can imagine hiring...]]></description>
				<content:encoded><![CDATA[<p>Most people take it for granted — because they’ve heard it so many times from politicians and pundits — that they must trade some privacy for security in this dangerous world. The challenge, we’re told, is to find the right “balance.” Let’s examine this.</p>
<p>On its face the idea seems reasonable. I can imagine hiring a firm to look after some aspect of my security. To do its job the firm may need some information about me that I don’t readily give out. It’s up to me to decide if I like the trade-off. Nothing wrong there. In a freed market, firms would compete for my business, and competition would pressure firms to ask only for information required for  their services. As a result, a minimum amount of information would be requested. If I thought even <em>that</em> was too much, I would be free to choose to look after my security myself. If I did business with a firm that violated the terms of our contract, I would have recourse. At the very least I could terminate the relationship and strike up another or none at all.</p>
<p>In other words, in the freed market I would find the right “balance” for myself, and you would do the same. One size wouldn’t be deemed to fit all. The market would cater to people with a range of security/privacy concerns, striking the “balance” differently for different people. That’s as it should be.</p>
<p>Actually, we can say that there would be no trade-off between privacy and security at all, because the information would be <em>voluntarily</em> disclosed by each individual on mutually acceptable terms. Under those circumstances, it wouldn’t be right to call what the firm does an “intrusion.”</p>
<p>But that sort of situation is not what Barack Obama, Mike Rogers, Peter King, and their ilk mean when they tell us that “we” need to find the right balance between security and privacy. They mean <em>they</em> will dictate to us what the alleged balance will be. <em>We </em>will have no real say in the matter, and they can be counted on to find the balance on the “security” side of the spectrum as suits their interests. That’s how these things work. (See <a href="http://www.washingtonpost.com/world/national-security/nsa-broke-privacy-rules-thousands-of-times-per-year-audit-finds/2013/08/15/3310e554-05ca-11e3-a07f-49ddc7417125_story.html">“NSA broke privacy rules thousands of times per year, audit finds.”</a>) Unlike in a freed market, what the government does <em>is </em>intrusive, because it is done without our consent and often without our knowledge. (I hope no one will say that voting or continuing to live in the United States constitutes consent to invasions of privacy.)</p>
<p>Of course, our rulers can’t really set things to the security side of the spectrum because the game is rigged. When we give up privacy — or, rather, when our rulers take it — we don’t get security in return; we get a more intrusive state, which means we get more insecurity. Roderick Long made a similar point on his blog, <em><a href="http://aaeblog.com/2013/06/11/a-little-unbalanced/" target="_blank">The Austro-Athenian Empire</a></em>:</p>
<blockquote><p>In the wake of the recent NSA revelations, there’s increased talk about the need to “balance” freedom against security. I even see people recycling Larry Niven’s law that freedom + security = a constant.</p>
<p>Nonsense. What we want is not to be attacked or coercively interfered with — by anyone, be they our own government, other nations’ governments, or private actors. Would you call that freedom? or would you call it security?</p>
<p>You can’t trade off freedom against security because <em>they’re exactly the same thing</em>.</p></blockquote>
<p>Likewise, where the state is concerned, you can’t trade off privacy against security because<em>they’re exactly the same thing</em>. Anyone who reads dystopian novels knows that government access to personal information about people serves to inhibit and control them. That’s insecurity.</p>
<p>Now it will no doubt be said that while in one respect we are more insecure when “our” government spies on us (the scare quotes are to indicate that I think the U.S. government is an occupying power), in return we gain security against threats from others, say, al-Qaeda. But I see no prima facie case for favoring official domestic threats over freelance foreign threats. I’m reminded of what Mel Gibson’s character, Benjamin Martin, says in <a href="http://www.imdb.com/title/tt0187393/quotes" target="_blank"><em>The Patriot</em></a>: “Would you tell me please, Mr. Howard, why should I trade one tyrant three thousand miles away for three thousand tyrants one mile away? An elected legislature can trample a man’s rights as easily as a king can.”</p>
<p>Some foreigners might want to come here and kill Americans, but the U.S. government has been no slouch in that department. How many Americans who were sent by “their” government to fight in foreign wars never came back? How many came back with their lives shattered? The number dwarfs the number of casualties from terrorism.</p>
<p>Throw in the fact that some foreigners want to kill Americans only because Obama’s government (like George W. Bush’s and others before it) is killing them, and the phony nature of this alleged protection is clear.</p>
<p>Obama &amp; Co. say they welcome a public debate about calibrating the trade-off between security and privacy. No, they don’t. They wouldn’t even be going through the motions had it not been for the heroic whistleblower Edward Snowden, whom they are determined to lock away for life — if they catch him. A true debate is the last thing they want. What they want is a simulated debate in order to quiet public concern about spying.</p>
<p>As <a href="http://www.theatlantic.com/politics/archive/2013/08/obama-has-already-broken-his-pledge-on-surveillance-reform/278613/" target="_blank">Conor Friedersdorf</a> of the<em> Atlantic</em> points out, Obama’s new directive creating the Review Group on Intelligence and Communications Technologies is charged with “accounting for other policy considerations, such as the risk of unauthorized disclosure and our need to maintain the public trust.” Unlike his public statement, the official directive says nothing about preventing violations of privacy and related abuses.</p>
<p>Friedersdorf comments,</p>
<blockquote><p>What happened to those goals? The closest the Monday directive comes to them is an instruction to remember “our need to maintain the public trust” as one of many policy considerations.</p>
<p>Forget whether abuses are happening, or whether privacy rights are in fact being protected. [Director of National Intelligence James] Clapper need only probe the perception of trust. Remember, this is a man with a demonstrated willingness to tell lies under oath when he decides doing so serves the greater good.</p></blockquote>
<p>We should reject the phony debate, the phony trade-off, and the phony “balance” that will be struck. There is a fundamental conflict of interest between the American people and the U.S. government. The sooner we learn that, the safer we’ll be.</p>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=20903&amp;md5=0d7c80bb7b33b2283d34f36ece4766d7" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/20903/feed</wfw:commentRss>
		<slash:comments>1</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F20903&amp;language=en_GB&amp;category=text&amp;title=The+Phony+Trade-off+Between+Privacy+and+Security&amp;description=Most+people+take+it+for+granted+%E2%80%94+because+they%E2%80%99ve+heard+it+so+many+times+from+politicians+and+pundits+%E2%80%94+that+they+must+trade+some+privacy+for+security+in+this+dangerous...&amp;tags=Edward+Snowden%2CNSA%2Cpolice+state%2Cpolitics%2Cprivacy%2Csecurity%2Csecurity+state%2Cstate%2Cunited+states%2Cblog" type="text/html" />
	</item>
		<item>
		<title>Through a (Google) Glass, Darkly?</title>
		<link>http://c4ss.org/content/19534</link>
		<comments>http://c4ss.org/content/19534#comments</comments>
		<pubDate>Tue, 04 Jun 2013 18:00:25 +0000</pubDate>
		<dc:creator><![CDATA[Thomas L. Knapp]]></dc:creator>
				<category><![CDATA[Commentary]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[politics]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[state]]></category>
		<category><![CDATA[technology]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=19534</guid>
		<description><![CDATA[Let me throw out two predictions so obvious that I shouldn&#8217;t even have to commit them to print: 1) Within days, if not hours, of  Google Glass&#8216;s release to the general public, hackers will &#8220;jailbreak&#8221; the hardware, allowing it to run any &#8220;Glassware&#8221; users desire and can create or find online; and 2) An independent...]]></description>
				<content:encoded><![CDATA[<p>Let me throw out two predictions so obvious that I shouldn&#8217;t even have to commit them to print:</p>
<p>1) Within days, if not hours, of  <strong>Google Glass</strong>&#8216;s release to the general public, hackers will &#8220;jailbreak&#8221; the hardware, allowing it to run any &#8220;Glassware&#8221; users desire and can create or find online; and</p>
<p>2) An independent developer community will emerge to create those applications , whether Google wants them to or not.</p>
<p>As a matter of fact, I&#8217;ll double down and assert that both of these predictions are already in the process of coming true, even while Glass is in its &#8220;Explorer Program&#8221; phase, and that Google&#8217;s announcements  this week that it won&#8217;t allow <a href="http://consumerist.com/2013/06/03/google-says-no-for-now-to-facial-recognition-apps-for-glass/" target="_blank">facial recognition apps</a> or <a href="http://www.theregister.co.uk/2013/06/04/smutforglass_app_suffers_premature_ejection/" target="_blank">&#8220;adult&#8221; fare</a> for Glass will only add fuel to the fire.</p>
<p>Porn, of course, is any device&#8217;s &#8220;killer app.&#8221; Enough people want it, and want it badly enough, that they&#8217;ll either have it from their devices or get OTHER devices to have it from. Above and beyond the usual &#8212; pedestrian porting of dirty pictures to Glass format, just like they were ported from print magazine to computer monitor way back when &#8212; I can&#8217;t imagine that more than a year will go by before there&#8217;s Glassware to predictively, imaginatively, visually undress whomever the user happens to be looking at on the street, on the dance floor, etc.</p>
<p>We don&#8217;t have to like it. It&#8217;s going to happen whether we like it or not, and whether Google likes it or not.</p>
<p>Similarly, facial recognition is the Glass-specific &#8220;killer app.&#8221; It&#8217;s the one thing that the device is so obviously useful for and that people will so obviously want to use it for that there&#8217;s just not going to be any stopping it.</p>
<p>The most benign and universal applications are obvious:</p>
<p>You meet someone, you get his or her name, you say &#8220;OK, Glass, this is John Doe.&#8221; You&#8217;ll never have to worry about forgetting a name again.</p>
<p>You want to introduce two people, but can&#8217;t be present. &#8220;OK, Glass, send John Doe&#8217;s facial profile to Joe Smith, with a message to meet him in the food court at noon.&#8221;</p>
<p>And so on, and so forth.</p>
<p>Are there more sinister uses for facial recognition? Of course there are. But facial recognition is coming.</p>
<p>Again: We don&#8217;t have to like it. It&#8217;s coming whether we like it or not, and whether Google likes it or not.</p>
<p>If by some chance Google is able to effectively darken Glass such that it can&#8217;t fulfill users&#8217; desire for porn and facial recognition, then something else will come along with clearer vision. You&#8217;ll be able to pick up a Google Glass unit at Dollar Tree, like one of those little headphone-radio sets that people buy because they&#8217;re going to the beach and don&#8217;t want to risk getting sand in their REAL personal stereos.</p>
<p>The press is filled with nods &#8212; from Google itself, and from opponents of facial recognition tech &#8212; to something called &#8220;privacy.&#8221;</p>
<p>But privacy, as David Brin has been pointing out for years, just ain&#8217;t what it used to be. Absent complete technological collapse, it&#8217;s never going to be what it used to be again. If you show yourself in public, the assistive tech to identify you is going to be available. Period. And soon.</p>
<p>Instead of obsessing over the steady advancement of technology and attempting to thwart its potential at the development level, we should direct our efforts toward abolishing institutions which necessarily and murderously abuse that potential.</p>
<p>Technology is getting cheaper and cheaper, and more and more useful.</p>
<p>Political government is getting more and more expensive and less and less tolerable.</p>
<p>One of the two needs to go. And it&#8217;s pretty clear which one.</p>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=19534&amp;md5=684332c7f34112d069ae2775f60a47a4" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/19534/feed</wfw:commentRss>
		<slash:comments>6</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F19534&amp;language=en_GB&amp;category=text&amp;title=Through+a+%28Google%29+Glass%2C+Darkly%3F&amp;description=Let+me+throw+out+two+predictions+so+obvious+that+I+shouldn%26%238217%3Bt+even+have+to+commit+them+to+print%3A+1%29+Within+days%2C+if+not+hours%2C+of+%C2%A0Google+Glass%26%238216%3Bs+release+to+the...&amp;tags=Google%2CNorth+America%2Cpolitics%2Cprivacy%2Cstate%2Ctechnology%2Cblog" type="text/html" />
	</item>
		<item>
		<title>Tor: The Onion Router</title>
		<link>http://c4ss.org/content/19091</link>
		<comments>http://c4ss.org/content/19091#comments</comments>
		<pubDate>Tue, 21 May 2013 18:05:12 +0000</pubDate>
		<dc:creator><![CDATA[William Sheppard]]></dc:creator>
				<category><![CDATA[Odds & Ends]]></category>
		<category><![CDATA[activism]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[internet freedom]]></category>
		<category><![CDATA[liberty]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[surveillance]]></category>

		<guid isPermaLink="false">http://c4ss.org/?p=19091</guid>
		<description><![CDATA[What is Tor? How does it work? And why should you use it? With the ever expanding surveillance systems being employed in the United States and around the world, the ability to use the internet anonymously is becoming increasingly important, especially for activists, or anyone who is not okay with your Search Engine provider, ISP...]]></description>
				<content:encoded><![CDATA[<p><strong>What is Tor? How does it work? And why should you use it?</strong></p>
<p>With the ever expanding surveillance systems being employed in the United States and around the world, the ability to use the internet anonymously is becoming increasingly important, especially for activists, or anyone who is not okay with your Search Engine provider, ISP (Internet Service Provider) and your government knowing everything about your internet use. Here, I will go into brief detail about the technical aspects of Tor, give reasons why you should use Tor and finally guide you through the installation of the Tor browser and how to contribute to the network by setting up a relay.</p>
<p><strong>What is Tor?</strong></p>
<p>Tor, formally an acronym for &#8220;<a href="https://www.torproject.org/index.html.en" target="_blank">The Onion Router</a>&#8220;, is a distributed proxy network designed to provide anonymity on the web. Much like a <a href="https://ssd.eff.org/tech/vpn" target="_blank">VPN</a> (Virtual Private Networks). Tor encrypts your traffic and bounces it through a number of relays before arriving at it&#8217;s destination. Preventing third parties from being able to see what you are sending through the network, and where your traffic initially came from. Tor can also be used for servers, to anonymize the physical location of websites, and those who visit them.</p>
<p><strong>How does it work?</strong></p>
<p>There are a number of very in depth resources that explain in a lot of detail how the network works, this is not that. This is a brief guide to introduce you to the concept of onion routing, and if you wish to learn further, there will be a number of links included.</p>
<p>When you attempt to contact a website using the Tor Browser, the Tor client randomly selects 3 nodes from the network. The client then encrypts a message to be sent to the final recipient (e.g a website you want to visit). The encrypted message is sent to the first node, the first node then peels off an initial layer of encryption, revealing where to send the message to the second node, this process is repeated until it reaches the third and final node, also known as the &#8220;exit relay&#8221;, where the message is unencrypted and sent to the final recipient. The effect of this is to obscure your <a href="http://news.cnet.com/8301-13554_3-10042206-33.html" target="_blank">IP address</a> from the destination server by providing multiple barriers between you and the server. Keep in mind however, personal information that you choose to give to a website, such as in a sign up form, is treated like any other data by the website, it can be looked at by an administrator, or subpoenaed by Law Enforcement, Tor works most effectively if you keep your information private as well as anonymous.</p>
<p><strong>Why should you use it?</strong></p>
<p>Increasingly, governments around the world have become preoccupied with what is known as <a href="http://www.cato.org/publications/commentary/beware-total-information-awareness" target="_blank">Total Information Awareness</a>, the ability to track every piece of digital information that we create: financial transactions, instant messages, email, web history, etc. This information can be used to intimidate, <a href="http://www.democracynow.org/2012/4/20/we_do_not_live_in_a" target="_blank">harass</a>, or even <a href="http://www.sfgate.com/politics/article/Lawmakers-blast-Yahoo-executives-for-helping-3301322.php" target="_blank">jail dissidents</a>, journalists and those who may pose some form of nuisance to the government. Many nations have <a href="http://www.techspot.com/news/47410-iran-blocks-websites-in-anticipation-of-green-revolution-anniversary.html" target="_blank">strong controls</a> on what people can search for and view on the internet. Tor allows for the <a href="http://news.cnet.com/8301-13578_3-57375166-38/tor-anonymity-project-looks-to-help-iranians-sidestep-net-ban/" target="_blank">bypassing of these filters</a>, and has been especially useful in Iran, a nation which enjoys extremely high usage of the Tor network.</p>
<p>In the short term, there is little we can do to stop this encroaching surveillance state. But we are able to protect ourselves and others by obscuring as much data as possible. Tor is one such solution. The more people who use Tor, among other things, to browse the web, when they feel it necessary, the less useful our data will be to the government. The more of us who run relays for the Tor network, the faster the system will function for those who need to use it.</p>
<p><strong>Setup</strong></p>
<p>In recent times, attention has been paid to making the use of Tor extremely easy for the less technically proficient, with minimal setup required. The Tor browser bundle can be downloaded from here:</p>
<ul>
<li><a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a></li>
</ul>
<p>This will install the components needed to use the Tor network, including a modified version of <em><a href="http://www.mozilla.org/en-US/firefox/new/" target="_blank">Firefox</a></em> specifically configured for Tor and <a href="https://www.torproject.org/projects/vidalia.html.en" target="_blank">Vidalia</a>, a graphical front-end that will allow you to configure your Tor settings, including setting up a relay to contribute to the network.</p>
<p>If you do not feel the need to use the Tor browser on your system, but wish to set up a Tor relay, the package can be downloaded by following <a href="https://www.torproject.org/download/download.html.en" target="_blank">this link</a>, choosing your operating system, then choosing the Tor Relay Bundle. This will be especially useful on desktop computers, or dedicated computers that run constantly. While a temporary relay does not harm the network, a permanent one is much more useful. When you run a relay from your system, you will be making the Tor network larger and faster. By adding a node, you make the network more distributed, providing for more robust anonymity. You are also spreading the traffic load, increasing the speed of the network.</p>
<p>The Tor Relay bundle can be downloaded from here:</p>
<ul>
<li><a href="https://www.torproject.org/download/download.html.en" target="_blank">https://www.torproject.org/download/download.html.en</a> &#8211; Choose your operating system, then &#8220;Tor Relay Bundle&#8221;.</li>
</ul>
<p>Setting up the browser is simple, just download the file, extract it to the folder of your choice, then click the &#8220;Start Tor Browser&#8221; in the folder. Vidalia should start to run, and once it is connected to the network, the browser will open and will notify you if you are successfully running Tor.</p>
<p>If you wish to run a relay along with the browser, go to &#8220;set up relay&#8221; in Vidalia and check &#8220;relay traffic inside the Tor network (non exit relay)&#8221;, set how much bandwidth you wish to donate and you are good to go.</p>
<p>If you have installed the relay bundle, the relaying option should be set up automatically, and Vidalia will attempt to run whenever you boot your computer. You may wish to run as an exit relay, <strong>but do so at your own risk.</strong> If you run as an exit relay, your IP will be what the destination websites see when someone uses your relay, the traffic runs unencrypted from your connection to the destination, and if someone is using Tor for less than savory purposes; spamming, Wikipedia vandalism, child pornography, etc. You run the risk of having your IP banned from many websites due to actions of others, have your computer seized or even be <a href="http://www.zdnet.com/austrian-man-raided-for-operating-tor-exit-node-7000008133/" target="_blank">arrested by law enforcement</a>. If you wish to run an exit node, please follow <a href="https://blog.torproject.org/running-exit-node" target="_blank">this guide from the Tor Project</a> to mitigate the risks involved. I must emphasize however, these are not issues if you run a relay inside the network, as all traffic you send and receive will be encrypted.</p>
<p>I hope this guide has been useful and convinced those not already using Tor to give it a try. If you do set up a relay, please let us know in the comments section.</p>
<p>There are further resources available for a more in depth look at:</p>
<ul>
<li><a href="https://www.torproject.org/docs/faq.html.en" target="_blank">https://www.torproject.org/docs/faq.html.en</a></li>
<li><a href="https://www.torproject.org/dist/manual/short-user-manual_en.xhtml">https://www.torproject.org/dist/manual/short-user-manual_en.xhtml</a></li>
<li><a href="https://trac.torproject.org/projects/tor/wiki">https://trac.torproject.org/projects/tor/wiki</a></li>
</ul>
 <p><a href="http://c4ss.org/?flattrss_redirect&amp;id=19091&amp;md5=89ebad24b8853cba547768034859b416" title="Flattr" target="_blank"><img src="http://c4ss.org/wp-content/themes/center2013/images/flattr.png" alt="flattr this!"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://c4ss.org/content/19091/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		<atom:link rel="payment" title="Flattr this!" href="https://flattr.com/submit/auto?user_id=c4ss&amp;popout=1&amp;url=http%3A%2F%2Fc4ss.org%2Fcontent%2F19091&amp;language=en_GB&amp;category=text&amp;title=Tor%3A+The+Onion+Router&amp;description=What+is+Tor%3F+How+does+it+work%3F+And+why+should+you+use+it%3F+With+the+ever+expanding+surveillance+systems+being+employed+in+the+United+States+and+around+the+world%2C+the...&amp;tags=activism%2Cencryption%2Cgovernment%2Cinternet%2Cinternet+freedom%2Cliberty%2Cprivacy%2Csurveillance%2Cblog" type="text/html" />
	</item>
	</channel>
</rss>
