My latest Guardian column is "Censorship is inseparable from surveillance," which discusses the fact that network censorship entails surveillance, and how this exacerbates the public health problem caused by our difficulty in evaluating privacy trade-offs.
There was a time when you could censor without spying. When Britain banned the publication of James Joyce's Ulysses in the 1920s and 1930s, the ban took the form on a prohibition on the sale of copies of the books. Theoretically, this entailed opening some imported parcels, and it certainly imposed a constraint on publishers and booksellers. It was undoubtedly awful. But we've got it worse today.
Jump forward 80 years. Imagine that you want to ban www.jamesjoycesulysses.com due to a copyright claim from the Joyce estate. Thanks to the Digital Economy Act and the provision it makes for a national British copyright firewall, we're headed for a system where entertainment companies can specify URLs that have "infringing" websites, and a national censorwall will block everyone in the country from visiting those sites.
In order to stop you from visiting www.jamesjoycesulysses.com, the national censorwall must intercept all your outgoing internet requests and examine them to determine whether they are for the banned website. That's the difference between the old days of censorship and our new digital censorship world. Today, censorship is inseparable from surveillance.
Censorship is inseparable from surveillance
In 2013, Lavabit — famous for being the privacy-oriented email service chosen by Edward Snowden to make contact with journalists while he was contracting for the NSA — shut down under mysterious, abrupt circumstances, leaving 410,000 users wondering what had just happened to their email addresses.
China is engaged in a bizarre dystopian experiment to use social network ratings to punish political dissidence, “antisocial behavior” and noncomformity, using data pulled from many sources, including purchases on China’s major ecommerce networks like Alibaba; but you don’t have to be the Chinese government to spy on people with an extraordinary degree of creepy […]
An apartment-dweller in Tver, Russia installed a video camera on his or her front door, looking out into the stairwell, then uploaded a compendium of amusing and/or interesting moments to YouTube. The neighbors seem generally hostile to surveillance, though some of them are in no condition to notice it. Google Translate suggests the following caption: […]
Using my iPhone while it’s charging is always a hassle. With tucked-away outlets and the meager length of included lightning cables, comfortable scrolling while plugged in is annoying. These 10-Ft MFi-Certified Lightning Cables are super convenient and probably the best iPhone accessory purchase I’ve made.At over three times the length of normal cables, these reach anywhere you […]
With countless applications for modern life, artificial intelligence (AI) is one of the most in-demand fields of study in tech. Beyond modelling human decision making processes and learning abilities, AI can be used to analyze massive volumes of data and create complex interactive systems.This Machine Learning & AI for Business Bundle made mastering these concepts possible for […]
Computer hacking isn’t just something happening to the DNC. Major software companies need white-hat hackers to ensure the security of their products and users, and I came across a Computer Hacker Professional Certification Package that conveniently teaches those advanced IT techniques online.This course package will prepare you for various computer security certification exams with over 60 hours […]