Tools For Treason - Nice essay on freedom/NSA

Tools For Treason
[https://secure.gravatar.com/avatar/69fae9a8a3933fa91e81c086b8eee14a?s=60&d=identicon&r=G]Devin Coldewey <http://techcrunch.com/2013/07/06/tools-for-treason/?ncid=tcdaily>
posted yesterday
20 Comments

Our rights are extended and limited by the tools we use. The Internet has magnified our capability for free speech, but has pared down the reasonable expectation of privacy. And we, of course, have volunteered our data unreservedly at every turn. Even when we got burned, we kept coming back to give more. I suppose we did it because we trusted those to whom we were giving it, though they have almost without exception lost that trust now. And any trust they do regain must always be provisional, apparently, so why bother with it at all?

It seems that if we are to start over again, the founding principle of our tools for communication cannot be the establishment of trust, but the impossibility of trust.

It's a cynical place to start, but clearly a necessary one. If it is possible at any point for trust to enter the equation, that trust can and likely will be taken advantage of. If there exists, anywhere from your end to the other in the long chain of servers, switches, cables, interpreters, loggers, drivers, protocols, interfaces, and displays, any single place where you are not one hundred percent in control of your data, your data is compromised and the system fails.

The trick is to treat every communication as a potential act of terrorism. After all, isn't that how the NSA does it? For them, it's an excuse; For us, it should be a method. Start there, and you can build a system that works. Start there, and you will be told that you are building tools for treason. You are.

Great. If it isn't illegal, it isn't strong enough. If the government doesn't denounce it, it isn't good enough. Tools for treason are the only tools that will suffice for our protection from now on.

But let's be clear: They will be used for evil, both petty and monstrous: for trading child pornography, for selling meth, for planning assassinations, for mass murder. You will be told you are arming the enemy. You are. But your tools are neither necessary nor sufficient for such atrocities. Every kitchen knife is sharp enough to cut your fellow man; every hammer is hard enough to split skulls; every car is fast enough to mow down pedestrians. They have to be to fulfill their purposes, and it's the same here.

And remember, we're not just talking about Facebook chats and Google searches. What seems like overkill for protecting personal email may be totally insufficient for a guerrilla fighter coordinating across borders. Many people may not care about their privacy when it comes to a spare email address leaked by Facebook or the metadata from their Gmail account. They may come around later or not, but someone's got to make sure that if they do come around, privacy is even an option.

If your algorithm doesn't allow a pedophile to irreversibly scramble his drive and avoid prosecution, it can't be used by freethinkers under ideological oppression to hide state-banned books. If your messaging app won't let someone safely plan bombing the Super Bowl, it can't be used by an activist to reveal human rights abuses. If your map doesn't let poachers stalk rhinos without alerting rangers, it can't be used by ethnic minorities to escape purges. The strength of the tool enables all of these things, and it is an old, old test we have taken many times before to see which we use it for. The answer, as always, will be "both."

And how will we make these magical tools? There are really only two major requirements, if we assume (wrongly for the most part, at least at first) that users can operate them properly.

They must completely ignore the law. There is no reason to respect it - even the government doesn't. Police requests for data, subpoenas, and anything else must be completely powerless, at least without the consent of the user. But it is not enough to disdain the law, unless one is immune to it.

Therefore, they must not be centralized. Web platforms as a service are fine, and will remain fine, for editing photos and sharing restaurant recommendations, but not for personal communications or any kind of confidential data. Even a "zero knowledge" service like Spideroak places compliance with the law above the needs of its users, and may decrypt on command if obligated to. Self-hosting, whether on your own or on rented or virtualized hardware, is the only way to be remotely sure that your data is safe.

Put network attached storage and a pop-up web server in every home and watch existing monolithic structures be eroded. With personal gigabit connections, terabytes of our own to serve from, end-to-end encryption, and peer-to-peer implemented at a fundamental level, our communications will cease to be reliant on anything except critical infrastructure - and even that, in time, will be obsoleted. It'll take time to nail down the right protocols, plug gaps, and expand compatibility, but the important thing is to get it out there. Like Bittorrent, the cat won't be put back in the bag. It's taken ten years for torrents to become a household word, but at the rate services and agencies are accidental tipping their cards, it may not be as long a road to get people in touch with their inner cryptographer. Make it as easy to install as BonziBuddy and you'll start something that won't be easily stopped.

The simple fact is that the government and powers in whom we've confided have shown themselves to be unworthy and unreliable (if not totally reprehensible). Respecting their interests should no longer be a matter of course, and furthering the naturally decentralized nature of the Internet is the logical next step. Creating something that serves the interests of the private (or oppressed) individual instead of, ultimately, those who wish to impose on him or her should be a major imperative for the next decade of software and platform development.

They won't like it, because freedom is the freedom to do wrong as well as right, and they as arbiters are terrified that they will no longer be able to tell which you're doing. Well, we're tired of them knowing - tired of them trying to find out. We have the technology. We can declare our independence. We've done it before.

Mike

(Attachment image001.jpg is missing)

This author misses the most important thing: the solidarity to take away the money from the bureaucrats doing the snooping.

They are not a volunteer force. Take away their money and they go home and find another job.

--- Sent with mail@metro, Real Life Real Time Mobile ---

Excellent. Do you want to bring that to his attention or do you want me to do it?

Mike

How about if we both do it? Ya see what I mean? What do you think the chances that we all would?

You’ll have to say it in another way….as I already plagiarized you.

:>)

Mike

Mike,
OMG! You did do it!!

Now my words have been relegated to the most pathetic and impotent of platforms: commenting on blogs. Ahhhhhh!

It's even more pathetic than the blog's effort to be meaningful and have impact. Blogs are as commonplace as the effort on the toilet, in the morning "constitutional", and the comments are as significant as the results in the bowl.

But that's OK, you got the gears turning.

Blogger-dude Devin "contributes" his efforts to Tech Crunch. That's a story in itself we will come back to later.

So I'm thinking maybe he will join us in the casting of a new bigger Liberty Bell, for us in SF to "do it again" as he proposed, with "it's been done before".

Sure, let's see if he has effort for anything more than his blog. His personal website wasn't inviting any contact, he's obviously insulating himself from the real processes he proclaims. But we'll see what pans out.

John

________________________________
From: "mike@..." <mike@dennyconnect.com>
To: "lpsf-discuss@yahoogroups.com" <lpsf-discuss@yahoogroups.com>
Sent: Sunday, July 7, 2013 4:20 PM
Subject: RE: [lpsf-discuss] Tools For Treason - Nice essay on freedom/NSA

You’ll have to say it in another way….as I already plagiarized you.

:>)

Mike

From:lpsf-discuss@yahoogroups.com [mailto:lpsf-discuss@yahoogroups.com] On Behalf Of javlin@...
Sent: Sunday, July 07, 2013 4:01 PM
To: lpsf-discuss@yahoogroups.com
Subject: RE: [lpsf-discuss] Tools For Treason - Nice essay on freedom/NSA

How about if we both do it? Ya see what I mean? What do you think the chances that we all would?

From: lpsf-discuss@yahoogroups.com
Sent: 7/7/2013 11:20 am
To: lpsf-discuss@yahoogroups.com
Subject: RE: [lpsf-discuss] Tools For Treason - Nice essay on freedom/NSA

Excellent. Do you want to bring that to his attention or do you want me to do it? Mike From: lpsf-discuss@yahoogroups.com [mailto:lpsf-discuss@yahoogroups.com] On Behalf Of javlin@... Sent: Sunday, July 07, 2013 11:13 AM To: lpsf-discuss@yahoogroups.com Subject: RE: [lpsf-discuss] Tools For Treason - Nice essay on freedom/NSA This author misses the most important thing: the solidarity to take away the money from the bureaucrats doing the snooping. They are not a volunteer force. Take away their money and they go home and find another job. --- Sent with mail@metro, Real Life Real Time Mobile --- ---Original Message--- From: lpsf-discuss@yahoogroups.com<mailto:lpsf-discuss%40yahoogroups.com> Sent: 7/7/2013 9:24 am To: lpsf-discuss@yahoogroups.com<mailto:lpsf-discuss%40yahoogroups.com> Subject: [lpsf-discuss] Tools For Treason - Nice essay on freedom/NSA http://techcrunch.com/2013/07/06/tools-for-treason/?ncid=tcdaily Tools For Treason

[https://secure.gravatar.com/avatar/69fae9a8a3933fa91e81c086b8eee14a?s=60&d=identicon&r=G]Devin Coldewey <http://techcrunch.com/2013/07/06/tools-for-treason/?ncid=tcdaily> posted yesterday 20 Comments Our rights are extended and limited by the tools we use. The Internet has magnified our capability for free speech, but has pared down the reasonable expectation of privacy. And we, of course, have volunteered our data unreservedly at every turn. Even when we got burned, we kept coming back to give more. I suppose we did it because we trusted those to whom we were giving it, though they have almost without exception lost that trust now. And any trust they do regain must always be provisional, apparently, so why bother with it at all? It seems that if we are to start over again, the founding principle of our tools for communication cannot be the establishment of trust, but the impossibility of trust. It's a cynical place to start, but clearly a necessary
one. If it is possible at any point for trust to enter the equation, that trust can and likely will be taken advantage of. If there exists, anywhere from your end to the other in the long chain of servers, switches, cables, interpreters, loggers, drivers, protocols, interfaces, and displays, any single place where you are not one hundred percent in control of your data, your data is compromised and the system fails. The trick is to treat every communication as a potential act of terrorism. After all, isn't that how the NSA does it? For them, it's an excuse; For us, it should be a method. Start there, and you can build a system that works. Start there, and you will be told that you are building tools for treason. You are. Great. If it isn't illegal, it isn't strong enough. If the government doesn't denounce it, it isn't good enough. Tools for treason are the only tools that will suffice for our protection from now on. But let's be clear: They will be
used for evil, both petty and monstrous: for trading child pornography, for selling meth, for planning assassinations, for mass murder. You will be told you are arming the enemy. You are. But your tools are neither necessary nor sufficient for such atrocities. Every kitchen knife is sharp enough to cut your fellow man; every hammer is hard enough to split skulls; every car is fast enough to mow down pedestrians. They have to be to fulfill their purposes, and it's the same here. And remember, we're not just talking about Facebook chats and Google searches. What seems like overkill for protecting personal email may be totally insufficient for a guerrilla fighter coordinating across borders. Many people may not care about their privacy when it comes to a spare email address leaked by Facebook or the metadata from their Gmail account. They may come around later or not, but someone's got to make sure that if they do come around, privacy is even an option. If
your algorithm doesn't allow a pedophile to irreversibly scramble his drive and avoid prosecution, it can't be used by freethinkers under ideological oppression to hide state-banned books. If your messaging app won't let someone safely plan bombing the Super Bowl, it can't be used by an activist to reveal human rights abuses. If your map doesn't let poachers stalk rhinos without alerting rangers, it can't be used by ethnic minorities to escape purges. The strength of the tool enables all of these things, and it is an old, old test we have taken many times before to see which we use it for. The answer, as always, will be "both." And how will we make these magical tools? There are really only two major requirements, if we assume (wrongly for the most part, at least at first) that users can operate them properly. They must completely ignore the law. There is no reason to respect it - even the government doesn't. Police requests for data, subpoenas, and
anything else must be completely powerless, at least without the consent of the user. But it is not enough to disdain the law, unless one is immune to it. Therefore, they must not be centralized. Web platforms as a service are fine, and will remain fine, for editing photos

White Chapel Foundry, the same foundry of Lester and Pack, that cast the Liberty Bell(and Big Ben), is still in business and has bells of similar size, at about the same relative price....about 20,000 British pounds. (150 pounds at the time)

For twice that, we could get a five-foot diameter two-ton bell, twice the weight of the Liberty Bell. We'd need a place to put it....

________________________________
From: John Bechtol <javlin@ymail.com>
To: "lpsf-discuss@yahoogroups.com" <lpsf-discuss@yahoogroups.com>
Sent: Sunday, July 7, 2013 7:16 PM
Subject: Re: [lpsf-discuss] Tools For Treason - Nice essay on freedom/NSA

Mike,
OMG! You did do it!!

Now my words have been relegated to the most pathetic and impotent of platforms: commenting on blogs. Ahhhhhh!

It's even more pathetic than the blog's effort to be meaningful and have impact. Blogs are as commonplace as the effort on the toilet, in the morning "constitutional", and the comments are as significant as the results in the bowl.

But that's OK, you got the gears turning.

Blogger-dude Devin "contributes" his efforts to Tech Crunch. That's a story in itself we will come back to later.

So I'm thinking maybe he will join us in the casting of a new bigger Liberty Bell, for us in SF to "do it again" as he proposed, with "it's been done before".

Sure, let's see if he has effort for anything more than his blog. His personal

website wasn't inviting any contact, he's obviously insulating himself from the real processes he proclaims. But we'll see what pans out.

John

________________________________
From: "mike@..." <mike@dennyconnect.com>
To: "lpsf-discuss@yahoogroups.com" <lpsf-discuss@...m>
Sent: Sunday, July 7, 2013 4:20 PM
Subject: RE: [lpsf-discuss] Tools For Treason - Nice essay on freedom/NSA

You’ll have to say it in another way….as I already plagiarized you.

:>)

Mike

From:lpsf-discuss@yahoogroups.com [mailto:lpsf-discuss@yahoogroups.com] On Behalf Of javlin@...
Sent: Sunday, July 07, 2013 4:01 PM
To: lpsf-discuss@yahoogroups.com
Subject: RE: [lpsf-discuss] Tools For Treason - Nice essay on freedom/NSA

How about if we both do it? Ya see what I mean? What do you think the chances that we all would?

From: lpsf-discuss@yahoogroups.com
Sent: 7/7/2013 11:20 am
To: lpsf-discuss@yahoogroups.com
Subject: RE: [lpsf-discuss] Tools For Treason - Nice essay on freedom/NSA

Excellent. Do you want to bring that to his attention or do you want me to do it? Mike From: lpsf-discuss@yahoogroups.com [mailto:lpsf-discuss@yahoogroups.com] On Behalf Of javlin@... Sent: Sunday, July 07, 2013 11:13 AM To: lpsf-discuss@yahoogroups.com Subject: RE: [lpsf-discuss] Tools For Treason - Nice essay on freedom/NSA This author misses the most important thing: the solidarity to take away the money from the bureaucrats doing the snooping. They are not a volunteer force. Take away their money and they go home and find another job. --- Sent with mail@metro, Real Life Real Time Mobile --- ---Original Message--- From: lpsf-discuss@yahoogroups.com<mailto:lpsf-discuss%40yahoogroups.com> Sent: 7/7/2013 9:24 am To: lpsf-discuss@yahoogroups.com<mailto:lpsf-discuss%40yahoogroups.com> Subject: [lpsf-discuss] Tools For Treason - Nice essay on freedom/NSA http://techcrunch.com/2013/07/06/tools-for-treason/?ncid=tcdaily Tools For Treason

[https://secure.gravatar.com/avatar/69fae9a8a3933fa91e81c086b8eee14a?s=60&d=identicon&r=G]Devin Coldewey <http://techcrunch.com/2013/07/06/tools-for-treason/?ncid=tcdaily> posted yesterday 20 Comments Our rights are extended and limited by the tools we use. The Internet has magnified our capability for free speech, but has pared down the reasonable expectation of privacy. And we, of course, have volunteered our data unreservedly at every turn. Even when we got burned, we kept coming back to give more. I suppose we did it because we trusted those to whom we were giving it, though they have almost without exception lost that trust now. And any trust they do regain must always be provisional, apparently, so why bother with it at all? It seems that if we are to start over again, the founding principle of our tools for communication cannot be the establishment of trust, but the impossibility of trust. It's a cynical place to start, but clearly a necessary
one. If it is possible at any point for trust to enter the equation, that trust can and likely will be taken advantage of. If there exists, anywhere from your end to the other in the long chain of servers, switches, cables, interpreters, loggers, drivers, protocols, interfaces, and displays, any single place where you are not one hundred percent in control of your data, your data is compromised and the system fails. The trick is to treat every communication as a potential act of terrorism. After all, isn't that how the NSA does it? For them, it's an excuse; For us, it should be a method. Start there, and you can build a system that works. Start there, and you will be told that you are building tools for treason. You are. Great. If it isn't illegal, it isn't strong enough. If the government doesn't denounce it, it isn't good enough. Tools for treason are the only tools that will suffice for our protection from now on. But let's be clear: They will be
used for evil, both petty and monstrous: for trading child pornography, for selling meth, for planning assassinations, for mass murder. You will be told you are arming the enemy. You are. But your tools are neither necessary nor sufficient for such atrocities. Every kitchen knife is sharp enough to cut your fellow man; every hammer is hard enough to split skulls; every car is fast enough to mow down pedestrians. They have to be to fulfill their purposes, and it's the same here. And remember, we're not just talking about Facebook chats and Google searches. What seems like overkill for protecting personal email may be totally insufficient for a guerrilla fighter coordinating across borders. Many people may not care about their privacy when it comes to a spare email address leaked by Facebook or the metadata from their Gmail account. They may come around later or not, but someone's got to make sure that if they do come around, privacy is even an option. If
your algorithm doesn't allow a pedophile to irreversibly scramble his drive and avoid prosecution, it can't be used by freethinkers under ideological oppression to hide state-banned books. If your messaging app won't let someone safely plan bombing the Super Bowl, it can't be used by an activist to reveal human rights abuses. If your map doesn't let poachers stalk rhinos without alerting rangers, it can't be used by ethnic minorities to escape purges. The strength of the tool enables all of these things, and it is an old, old test we have taken many times before to see which we use it for. The answer, as always, will be "both." And how will we make these magical tools? There are really only two major requirements, if we assume (wrongly for the most part, at least at first) that users can operate them properly. They must completely ignore the law. There is no reason to respect it - even the government doesn't. Police requests for data, subpoenas, and
anything else must be completely powerless, at least without the consent of the user. But it is not enough to disdain the law, unless one is immune to it. Therefore, they must not be centralized. Web platforms as a service are fine, and will remain fine, for editing photos

And we are getting “Likes” on the comment.

Mike

<http://email.livefyre.com/wf/click?upn=ctoUxnu-2F5xqocCjQbcr1qzmm-2BD6g308JD2Oj77odKs45uUTKffTwwA3-2FukvkwV8WSoeIdDvYN8zh53ecph9Ozg-3D-3D_h9Ry-2FhFQ3BYzKsfoKeSTjfoImDZsdmrfu-2BJ27v3fB-2Bik0Ll-2BxWi4mQ-2BD-2Frw-2F0dz4Zvegr9c1fR8l1tKs71jl0BCerNhOb4LvpxcsnBnSQuRamesGdMcgtypUEUWDe5Cd3n0ggsm8mgnqIMmguv8B3u6viDzqIB0JF1HmfK9YqjQ-3D>
"Tools For Treason"<http://email.livefyre.com/wf/click?upn=ctoUxnu-2F5xqocCjQbcr1qzmm-2BD6g308JD2Oj77odKs45uUTKffTwwA3-2FukvkwV8WSoeIdDvYN8zh53ecph9Ozg-3D-3D_h9Ry-2FhFQ3BYzKsfoKeSTjfoImDZsdmrfu-2BJ27v3fB-2Bik0Ll-2BxWi4mQ-2BD-2Frw-2F0dz4Zvegr9c1fR8l1tKs71jl0BCerNhOb4LvpxcsnBnSQuRamesGdMcgtypUEUWDe5Cd3n0ggsm8mgnqIMmguv8B3u6viDzqIB0JF1HmfK9YqjQ-3D>
http://techcrunch.com/2013/07/06/tools-for-treason/<http://email.livefyre.com/wf/click?upn=ctoUxnu-2F5xqocCjQbcr1qzmm-2BD6g308JD2Oj77odKs45uUTKffTwwA3-2FukvkwV8WSoeIdDvYN8zh53ecph9Ozg-3D-3D_h9Ry-2FhFQ3BYzKsfoKeSTjfoImDZsdmrfu-2BJ27v3fB-2Bik0Ll-2BxWi4mQ-2BD-2Frw-2F0dz4VXyzO3SmORNdgf1czCvn6zrNICaROcZsVhZbGAF2ZPn-2BJrzMVj9rMcmvEm9d5b6mtX1eNedIbxdi88FwvMVNya18M6-2F2Sghb6dJWU-2BobSUo-3D> Stop receiving notifications about this conversation Unfollow<http://email.livefyre.com/wf/click?upn=ZIzUNJE9w1bNicjqJkR8VSfPU9UMlBvPcbeWAYNeALBPYe1IfHHxqqDZZAkIr7bAQGFXwJvf6A6BfN1Ayzavb-2F4pw5ICifHBt-2BuW1rUs2U8GSWVXEqumghssZgblyBh1VrZ0IdpXCqI6pX4DNX9Ny5j-2FRuq5-2BcoSARCP4H3yAx-2FTF9umQc3Mm-2FagqMxDOsaLuP3CjFpWg3GbIhrt7WP8UscADh-2FhhhmA5p-2F-2Bcu3KP8OdpwFzK2G1WBp4T6fU5Vr6_h9Ry-2FhFQ3BYzKsfoKeSTjfoImDZsdmrfu-2BJ27v3fB-2Bik0Ll-2BxWi4mQ-2BD-2Frw-2F0dz4Bkb4oMGj0Su6BeW7wUnitO1htAF7gZALRyLEiN4gNmAdPDZuPMwpQyYMTonKcrlFoq0cTOAsfRsWz0CSTTh0iK8Syof1EXUxzWpEnPJ5awc-3D>

[http://livefyre-avatar.s3.amazonaws.com/el/175/default.png]

MatthewStreet liked your comment<http://email.livefyre.com/wf/click?upn=ctoUxnu-2F5xqocCjQbcr1qzmm-2BD6g308JD2Oj77odKs45uUTKffTwwA3-2FukvkwV8WFKBl24F-2Bd3G-2F-2F8Llzsn01gx7fo7-2FfJuCErJjVkV8w2WNP4ASLx0JDOuOk1KXFxl-2B_h9Ry-2FhFQ3BYzKsfoKeSTjfoImDZsdmrfu-2BJ27v3fB-2Bik0Ll-2BxWi4mQ-2BD-2Frw-2F0dz47TCFPlfU0ZlwGoXgUi1BpnQyr4etpz3A7rgLsJYGVBP7KmRL36JYPVmQGZYWwqS9NkbYp62RjIrwI-2BmOuAc-2F3Kw-2Fb8Kj0LpqIGd1hoXJm28-3D>

Excellent article...except this author misses
the most important thing: the solidarity to take away the money from the
bureaucrats doing the snooping.
They are not a volunteer force. Take away their money and they go home and find
another job.

Go to comment<http://email.livefyre.com/wf/click?upn=ctoUxnu-2F5xqocCjQbcr1qzmm-2BD6g308JD2Oj77odKs45uUTKffTwwA3-2FukvkwV8WFKBl24F-2Bd3G-2F-2F8Llzsn01gx7fo7-2FfJuCErJjVkV8w2WNP4ASLx0JDOuOk1KXFxl-2B_h9Ry-2FhFQ3BYzKsfoKeSTjfoImDZsdmrfu-2BJ27v3fB-2Bik0Ll-2BxWi4mQ-2BD-2Frw-2F0dz40GW4FbCVetHFEOOGO6FcLcM9SoxMndxwhO5Xa4o9PT3xVlWpzrs935kTzQfygRgW2R50jk002JGakI6igfjw6vHC0VxgKvsSFVfyan86zqg-3D>

(Attachment image001.png is missing)

The prisoners are waving their approval through the bars? :slight_smile:

Meanwhile back to Tech Crunch: It's founder is Michael Arrington, just the kind of guy we would want in our libertarian fellowship.

"He identifies as a libertarian, saying, "I just see government as this thing that stops us from doing things."

http://en.wikipedia.org/wiki/Michael_Arrington

He caught my attention, when his new yacht was confiscated by feds, even when he had gone out of his way, to make absolutely sure, everything was in order.

He hammered the perpetrators and characterized them as imperious goons, recommending that they be fired for wasting everyone's time, money, and good will.

The goons fought back, crying foul, that he would use his power and influence to disparage "good officials" and tarnish the feds.

Then he "crucified" the goons with a detailed account of the affair. His boat was returned. I haven't thought of it since, until now. Actually I had forgotten about it, even though I meet Leo Laporte , here and there. Leo is another tech web-cast mogul.

And this brings us back to blogger-dude Devin and his discussion of tech solutions to remedy tyranny. Maybe the Millennials will recognize the inside of their cultural cells, somehow working on a software solution to the problems of the current social formation. . Liberty Labs had a hackathon in SF. I wonder how it went?

John

________________________________
From: "mike@dennyconnect.com" <mike@...>
To: "lpsf-discuss@yahoogroups.com" <lpsf-discuss@yahoogroups.com>
Sent: Sunday, July 7, 2013 11:18 PM
Subject: RE: [lpsf-discuss] Tools For Treason - Nice essay on freedom/NSA

And we are getting “Likes” on the comment.

Mike

"Tools For Treason"
http://techcrunch.com/2013/07/06/tools-for-treason/ Stop receiving notifications about this conversation Unfollow
MatthewStreet liked your comment
Excellent article...except this author misses
the most important thing: the solidarity to take away the money from the
bureaucrats doing the snooping.
They are not a volunteer force. Take away their money and they go home and find
another job.
Go to comment

From:lpsf-discuss@yahoogroups.com [mailto:lpsf-discuss@yahoogroups.com] On Behalf Of John Bechtol
Sent: Sunday, July 07, 2013 7:17 PM
To: lpsf-discuss@yahoogroups.com
Subject: Re: [lpsf-discuss] Tools For Treason - Nice essay on freedom/NSA

Mike,
OMG! You did do it!!

Now my words have been relegated to the most pathetic and impotent of platforms: commenting on blogs. Ahhhhhh!

It's even more pathetic than the blog's effort to be meaningful and have impact. Blogs are as commonplace as the effort on the toilet, in the morning "constitutional", and the comments are as significant as the results in the bowl.

But that's OK, you got the gears turning.

Blogger-dude Devin "contributes" his efforts to Tech Crunch. That's a story in itself we will come back to later.

So I'm thinking maybe he will join us in the casting of a new bigger Liberty Bell, for us in SF to "do it again" as he proposed, with "it's been done before".

Sure, let's see if he has effort for anything more than his blog. His personal website wasn't inviting any contact, he's obviously insulating himself from the real processes he proclaims. But we'll see what pans out.

John

________________________________

From:"mike@..." <mike@...>
To: "lpsf-discuss@yahoogroups.com" <lpsf-discuss@yahoogroups.com>
Sent: Sunday, July 7, 2013 4:20 PM
Subject: RE: [lpsf-discuss] Tools For Treason - Nice essay on freedom/NSA

You’ll have to say it in another way….as I already plagiarized you.

:>)

Mike

From:lpsf-discuss@yahoogroups.com [mailto:lpsf-discuss@yahoogroups.com] On Behalf Of javlin@...
Sent: Sunday, July 07, 2013 4:01 PM
To: lpsf-discuss@yahoogroups.com
Subject: RE: [lpsf-discuss] Tools For Treason - Nice essay on freedom/NSA

How about if we both do it? Ya see what I mean? What do you think the chances that we all would?

From: lpsf-discuss@yahoogroups.com
Sent: 7/7/2013 11:20 am
To: lpsf-discuss@yahoogroups.com
Subject: RE: [lpsf-discuss] Tools For Treason - Nice essay on freedom/NSA

Excellent. Do you want to bring that to his attention or do you want me to do it? Mike From: lpsf-discuss@yahoogroups.com [mailto:lpsf-discuss@yahoogroups.com] On Behalf Of javlin@... Sent: Sunday, July 07, 2013 11:13 AM To: lpsf-discuss@yahoogroups.com Subject: RE: [lpsf-discuss] Tools For Treason - Nice essay on freedom/NSA This author misses the most important thing: the solidarity to take away the money from the bureaucrats doing the snooping. They are not a volunteer force. Take away their money and they go home and find another job. --- Sent with mail@metro, Real Life Real Time Mobile --- ---Original Message--- From: lpsf-discuss@yahoogroups.com<mailto:lpsf-discuss%40yahoogroups.com> Sent: 7/7/2013 9:24 am To: lpsf-discuss@yahoogroups.com<mailto:lpsf-discuss%40yahoogroups.com> Subject: [lpsf-discuss] Tools For Treason - Nice essay on freedom/NSA http://techcrunch.com/2013/07/06/tools-for-treason/?ncid=tcdaily Tools For Treason

[https://secure.gravatar.com/avatar/69fae9a8a3933fa91e81c086b8eee14a?s=60&d=identicon&r=G]Devin Coldewey <http://techcrunch.com/2013/07/06/tools-for-treason/?ncid=tcdaily> posted yesterday 20 Comments Our rights are extended and limited by the tools we use. The Internet has magnified our capability for free speech, but has pared down the reasonable expectation of privacy. And we, of course, have volunteered our data unreservedly at every turn. Even when we got burned, we kept coming back to give more. I suppose we did it because we trusted those to whom we were giving it, though they have almost without exception lost that trust now. And any trust they do regain must always be provisional, apparently, so why bother with it at all? It seems that if we are to start over again, the founding principle of our tools for communication cannot be the establishment of trust, but the impossibility of trust. It's a cynical place to start, but clearly a necessary
one. If it is possible at any point for trust to enter the equation, that trust can and likely will be taken advantage of. If there exists, anywhere from your end to the other in the long chain of servers, switches, cables, interpreters, loggers, drivers, protocols, interfaces, and displays, any single place where you are not one hundred percent in control of your data, your data is compromised and the system fails. The trick is to treat every communication as a potential act of terrorism. After all, isn't that how the NSA does it? For them, it's an excuse; For us, it should be a method. Start there, and you can build a system that works. Start there, and you will be told that you are building tools for treason. You are. Great. If it isn't illegal, it isn't strong enough. If the government doesn't denounce it, it isn't good enough. Tools for treason are the only tools that will suffice for our protection from now on. But let's be clear: They will be
used for evil, both petty and monstrous: for trading child pornography, for selling meth, for planning assassinations, for mass murder. You will be told you are arming the enemy. You are. But your tools are neither necessary nor sufficient for such atrocities. Every kitchen knife is sharp enough to cut your fellow man; every hammer is hard enough to split skulls; every car is fast enough to mow down pedestrians. They have to be to fulfill their purposes, and it's the same here. And remember, we're not just talking about Facebook chats and Google searches. What seems like overkill for protecting personal email may be totally insufficient for a guerrilla fighter coordinating across borders. Many people may not care about their privacy when it comes to a spare email address leaked by Facebook or the metadata from their Gmail account. They may come around later or not, but someone's got to make sure that if they do come around, privacy is even an option. If
your algorithm doesn't allow a pedophile to irreversibly scramble his drive and avoid prosecution, it can't be used by freethinkers under ideological oppression to hide state-banned books. If your messaging app won't let someone safely plan bombing the Super Bowl, it can't be used by an activist to reveal human rights abuses. If your map doesn't let poachers stalk rhinos without alerting rangers, it can't be used by ethnic minorities to escape purges. The strength of the tool enables all of these things, and it is an old, old test we have taken many times before to see which we use it for. The answer, as always, will be "both." And how will we make these magical tools? There are really only two major requirements, if we assume (wrongly for the most part, at least at first) that users can operate them properly. They must completely ignore the law. There is no reason to respect it - even the government doesn't. Police requests for data, subpoenas, and
anything else must be completely powerless, at least without the consent of the user. But it is not enough to disdain the law, unless one is immune to it. Therefore, they must not be centralized. Web platforms as a service are fine, and will remain fine, for editing photos

(Attachment image001.png is missing)