Tag: encryption
Anarchism and Cryptocurrency
Introduction Cryptocurrency, a digital currency in which transactions are verified and recorded by a decentralized system using cryptography, rather than by a centralized authority, is a controversial technology amongst anarchists, even though it is often used as a tool for undermining state power. The left generally sees cryptocurrency as a negative due to its function…
«Desplataformar» a Parler tendrá consecuencias para las que debemos prepararnos inmediatamente
Escrito por Tech Learning Collective. Título original: Deplatforming Parler will have consequences for which we must immediately prepare, de 26 de enero 2021. Traducido en español por Kathiana Thomas. Dos días después del fallido golpe fascista de la extrema derecha estadounidense del 6 de enero de 2021 que dejó cinco muertos en Washington, DC, Twitter…
Deplatforming Parler will have consequences for which we must immediately prepare
Two days after the American far right’s failed fascist coup on January 6th, 2021 that left five people dead in Washington, DC, Twitter (finally) permanently banned the would-be dictator responsible for inciting the mob from their platform. Shortly thereafter, the social media network most closely affiliated with the racist reactionaries, Parler, was kicked off its…
Internet Offriva Libertà, Noi Abbiamo Scelto la Servitù Aziendale
Di Logan Marie Glitterbomb. Originale: The Internet Offered Us Freedom, We Chose Corporate Rule, 13 ottobre 2020. Traduzione di Enrico Sanna. A detta di cypherpunk e cripto-anarchici, una cosa è chiara: internet ci ha offerto la libertà. I movimenti open-source e peer-to-peer (p2p) prosperano ancora in qualche angolino di internet. Vero. Ma molti di noi…
The Internet Offered Us Freedom, We Chose Corporate Rule
Read any of the classic cypherpunk or crypto-anarchist writings and one thing is clear: the internet offered us freedom. While the open source and peer-to-peer (p2p) movements are still alive and well in certain corners of the internet, most of us have chosen corporate rule instead. While cryptocurrency offered us a medium of exchange that…
Terrorismo Due per Uno
Su Progressive Review (“Two Types of Terrorism,” 7 dicembre), Sam Smith distingue due tipi di terrorismo: “Quello che usa armi e bombe e quello che usa le parole per terrorizzare la gente e convincerla ad accettare la volontà di chi sta al potere.” Ma tra i due tipi c’è una relazione, come dimostrano le relative…
The Natural Right of Cryptographic Governance
In the wake of the recent terrorist attacks in Paris and around the U.S., sentiment among the governing class is turning powerfully against encryption. Reuters reports an impending “crackdown” on Bitcoin in the EU. Other reports suggest France could inhibit Tor and free wi-fi at will. U.S. officials have taken the opportunity to go on…
Terrorism as a Twofer
At Progressive Review (“Two Types of Terrorism,” Dec. 7), Sam Smith breaks terrorism down into two types: “That which uses guns and bombs and that which uses words to terrify the public into going along with whatever those in power want.” But the two aren’t unrelated, as the respective domestic reactions to the Paris bombings…
The Natural Right of Encryption on Feed 44
C4SS Feed 44 presents Jason Farrell‘s “The Natural Right of Encryption” read by Katrina Haffner and edited by Tony Dreher. The Snowden leaks proved that individuals must take responsibility for their own privacy by revealing an inherent problem at the heart of constitutional government. By revealing the inner workings of the surveillance state, the leaks…
Government Spies See Opportunity in Terrorist Attack
As if they weren’t Machiavellian enough, spy agencies are evidently waiting for the next terrorist attack to change public opinion on the need for encryption backdoors, reports The Washington Post. The intelligence community’s top lawyer, Robert S. Litt, lamented in a leaked email that “the legislative environment is very hostile today … [but] it could…
The Natural Right of Encryption
Amid claims by U.S. officials that a “golden key” to all forms of encryption software is necessary to fight terrorism, a UN Report released in May asserts that securely encrypted communications among private citizens aren’t just permissible, but a human right. The report’s author, UC Irvine professor David Kaye, notes the problem of creating a…
Missing Comma: Why aren’t all journalism students learning data security?
A long, long time ago in 2007, Alysia Santo wrote an article for the Columbia Journalism Review on the incorporation of data security into journalism classes. Since then, we’ve had the Wikileaks debacle, Snowden’s leaks and Manning’s leaks, leading to worldwide state crackdown on journalism: “I spoke with a number of journalism schools, to see…
La Sicurezza su Internet È Responsabilità Nostra
Man mano che apprendiamo altri dettagli sullo spionaggio governativo, appare sempre più sconsiderato affidare la nostra sicurezza a terze parti. Lo stato vuole informazioni sicure sui suoi soggetti. Fin dal primo censimento in Egitto 5.000 anni fa, gli stati hanno sempre cercato di ottenere informazioni personali sui propri cittadini, soprattutto le tirannie, dove informatori e…
Keeping Your Cryptocurrency Safe
Just over a week ago, Fr33 Aid, an anarchist mutual aid organisation that is centred around supporting volunteers who provide medical and educational services, had it’s Bitcoins stolen from it’s online wallet located at Blockchain.info. Approximately 23 bitcoins were taken, with a value of about 14,500 USD. No small sum. This theft occurred despite reasonable…
Using PGP Encryption To Communicate Privately
There are many tools out there that allow you to communicate privately with varying levels of security. PGP (Pretty Good Privacy), specifically the OpenPGP standard, is a well tested and solid method of encrypting emails and messages, before transmission, to ensure that the only person who can read them is the intended recipient. I need…
Segurança Na Internet É Responsabilidade Nossa
À medida que ficamos sabendo de cada vez mais detalhes acerca da espionagem do governo, parece cada vez mais temerário confiar nossa segurança a terceiros empresariais. O estado requer que a informação acerca de seus súditos seja útil para os resultados desejados. Desde o primeiro censo no Egito, há mais de 5.000 anos, os estados…
Internet Security Is Our Responsibility
As we learn more and more details regarding government spying, it seems more and more foolhardy to trust our security to third party businesses. The state requires information on its subjects to be effective. From the first census in Egypt more than 5000 years ago, states have sought personal information on their citizens, especially in…
Tor: The Onion Router
What is Tor? How does it work? And why should you use it? With the ever expanding surveillance systems being employed in the United States and around the world, the ability to use the internet anonymously is becoming increasingly important, especially for activists, or anyone who is not okay with your Search Engine provider, ISP…
Bitcoin: Roller Coaster of Love
Knapp: Is Bitcoin the end of political government? No, but it’s part of the beginning of the end of political government.
Anarchy and Democracy
Fighting Fascism
Markets Not Capitalism
The Anatomy of Escape
Organization Theory