Cypherpunks are activists who advocate the widespread use of strong cryptography (writing in code) as a route to progressive change. Julian Assange, the editor-in-chief of and visionary behind WikiLeaks, has been a leading voice in the cypherpunk movement since its inception in the 1980s.
Now, in what is sure to be a wave-making new book, Assange brings together a small group of cutting-edge thinkers and activists from the front line of the battle for cyber-space to discuss whether electronic communications will emancipate or enslave us. Among the topics addressed are: Do Facebook and Google constitute “the greatest surveillance machine that ever existed,” perpetually tracking our location, our contacts and our lives? Far from being victims of that surveillance, are most of us willing collaborators? Are there legitimate forms of surveillance, for instance in relation to the “Four Horsemen of the Infopocalypse” (money laundering, drugs, terrorism and pornography)? And do we have the ability, through conscious action and technological savvy, to resist this tide and secure a world where freedom is something which the Internet helps bring about?
The harassment of WikiLeaks and other Internet activists, together with attempts to introduce anti-file sharing legislation such as SOPA and ACTA, indicate that the politics of the Internet have reached a crossroads. In one direction lies a future that guarantees, in the watchwords of the cypherpunks, “privacy for the weak and transparency for the powerful”; in the other lies an Internet that allows government and large corporations to discover ever more about internet users while hiding their own activities. Assange and his co-discussants unpick the complex issues surrounding this crucial choice with clarity and engaging enthusiasm.
|Product dimensions:||5.00(w) x 6.90(h) x 0.60(d)|
About the Author
Julian Assange is the editor in chief of WikiLeaks. An original contributor to the cypherpunk mailing list, Assange is the author of numerous software projects in line with the cypherpunk philosophy, including the Rubberhose encryption system and the original code for WikiLeaks. An ‘ethical hacker’ in his teens, and subsequently an activist and internet service provider to Australia during the 1990s, he is the co-author (with Sulette Dreyfus) of Underground, a history of the international hacker movement. Julian is currently a refugee under the protection of the government of Ecuador, and lives in the Ecuadorian embassy in London.
Jacob Appelbaum is a staff research scientist at the University of Washington, and a developer and advocate for the Tor Project, which is an online anonymity system for everyday people to fight against surveillance and against internet censorship.
Andy Müller-Maguhn is a long time member of, and former spokesman for, the Chaos Computer Club in Germany. A specialist on surveillance he runs a company called Cryptophone, which markets secure voice communication devices to commercial clients.
Jérémie Zimmermann is the co-founder and spokesperson for the citizen advocacy group La Quadrature du Net, the most prominent European organization defending anonymity rights online and promoting awareness of regulatory attacks on online freedoms.
Most Helpful Customer Reviews
This is a highly informative book, perhaps the best published on the substance of WikiLeaks, its technology, philosophy, origin and purpose, rooted in the Cypherpunks resistance to authority through encryption and anonymizing technology. The trenchant and salient, wide-ranging discussion among Assange, Appelbaum, Müller-Maguhn and Zimmermann, is derived from a four-part RT series with additional editorial material and a summarizing prologue by Assange, "A Call to Cryptographic Arms." It is an excellent introduction to the struggle for control of digital communications, economics and governance. A prime candidate for inclusion of reading lists of the enemies of authoritarian institutions, corporations and governments heavily invested in the Internet and aiming to control it by secret collusion for their purposes -- at the global public's expense, loss of privacy and reduced democracy. It claims to be a "watchman's warning" against the threat posed by the Internet and cellphone technology. The panel asserts: 1. The internet is a threat to human civilization because of its panoptic surveillance and profiling of users. 2. "Strategic surveillance" gathers all online and cellphone data as distinguished from tactical surveillance with is specifically targeted. 3. Internet and cellphones allow surveillance more efficiently and pervasively than in the physical world. 4. Individuals can be surveilled more easily if they remain mesmerized by computers, cellphones and social media. 5. Encryption prevents access to private secrets by official and commercial online surveillance and by cellphones. 6. Protestors in Arab Spring went to the streets when cellphone and online systems were disabled and thereby escaped digital surveillance. 7. General purpose computers avoid the built-in controls of special purpose computers and devices. 8. Free software avoids the control of restrictive governmental and commercial software. 9. Free encryption and anonymizing technologies can protect against authoritarian aggression embedded in the equipment and operating systems of computers, cellphones, networks, internet service providers, financial institutions and governments. 10. Younger generations will need to invent and distribute ideas, critiques, code and technology against the legacy controls of older generations indoctrinated in submissive acceptance of authority. 11. Diverse, heterogenic concepts and technology will be required to oppose centralizing, homogenizing intents of the government- and commerce-dominated Internet and cellphones. The greatest virtue of this book is its description of what comes after the lessons learned of Cypherpunks and WikiLeaks -- from the diverse initiatives nobody yet knows about due to deliberate avoidance of preening, crippling publicity. Lesson one: Protect yourself by keeping quiet, offline and sans cell, avoiding vanguards.