- Shopping Bag ( 0 items )
Posted December 11, 2012
Julian Assange Cypherpunks WikiLeaks
This is a highly informative book, perhaps the best published on the substance of WikiLeaks, its technology, philosophy, origin and purpose, rooted in the Cypherpunks resistance to authority through encryption and anonymizing technology. The trenchant and salient, wide-ranging discussion among Assange, Appelbaum, Müller-Maguhn and Zimmermann, is derived from a four-part RT series with additional editorial material and a summarizing prologue by Assange, "A Call to Cryptographic Arms." It is an excellent introduction to the struggle for control of digital communications, economics and governance. A prime candidate for inclusion of reading lists of the enemies of authoritarian institutions, corporations and governments heavily invested in the Internet and aiming to control it by secret collusion for their purposes -- at the global public's expense, loss of privacy and reduced democracy. It claims to be a "watchman's warning" against the threat posed by the Internet and cellphone technology. The panel asserts: 1. The internet is a threat to human civilization because of its panoptic surveillance and profiling of users. 2. "Strategic surveillance" gathers all online and cellphone data as distinguished from tactical surveillance with is specifically targeted. 3. Internet and cellphones allow surveillance more efficiently and pervasively than in the physical world. 4. Individuals can be surveilled more easily if they remain mesmerized by computers, cellphones and social media. 5. Encryption prevents access to private secrets by official and commercial online surveillance and by cellphones. 6. Protestors in Arab Spring went to the streets when cellphone and online systems were disabled and thereby escaped digital surveillance. 7. General purpose computers avoid the built-in controls of special purpose computers and devices. 8. Free software avoids the control of restrictive governmental and commercial software. 9. Free encryption and anonymizing technologies can protect against authoritarian aggression embedded in the equipment and operating systems of computers, cellphones, networks, internet service providers, financial institutions and governments. 10. Younger generations will need to invent and distribute ideas, critiques, code and technology against the legacy controls of older generations indoctrinated in submissive acceptance of authority. 11. Diverse, heterogenic concepts and technology will be required to oppose centralizing, homogenizing intents of the government- and commerce-dominated Internet and cellphones. The greatest virtue of this book is its description of what comes after the lessons learned of Cypherpunks and WikiLeaks -- from the diverse initiatives nobody yet knows about due to deliberate avoidance of preening, crippling publicity. Lesson one: Protect yourself by keeping quiet, offline and sans cell, avoiding vanguards.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.
Posted July 3, 2013
No text was provided for this review.