Law in the Internet Society

View   r4  >  r3  ...
DanielShinerFirstEssay 4 - 16 Nov 2015 - Main.EbenMoglen
Line: 1 to 1
 
META TOPICPARENT name="FirstEssay"
Line: 16 to 16
 People are corruptible, capable of being pressured, often willing to sell out principle to the prospect of success and status. Institutional arrangements, like those set out in the United States Constitution, may be capable of incentivizing those in power to respect limitations on that power, but they are far from infallible. In the end, the strength of any constitutional limitations relies on the public holding agents of the state accountable when the they violate those limitations.
Added:
>
>
Why not state your own ideas at the beginning of the essay, instead of using other peoples' words and general background? You don't have space enough for wastage. Let us know what you have to say, and then put it in context in the course of development.

 

“The Chains of Cryptography”

One promising, although limited, solution to the problem of state overreach is the use of cryptography. Instead of passively hoping that their rights are being respected, cryptography allows individuals to actively protect their own privacy and freedom.

Changed:
<
<
Tools like PGP and Tor allow anyone to achieve a high level of secrecy and anonymity, shielding their communications and online actions from surveillance. The emergence and availability of strong cryptography to the general public, combined with the growing importance of online activity, has massive implications for balance of power between individuals and large institutions.
>
>
Cryptography is not a solution to the problem of "state overreach." Security of communications is an objective which has many benefits and no drawbacks.

Tools like PGP

GPG isn't PGP.

and Tor allow anyone to achieve a high level of secrecy and anonymity, shielding their communications and online actions from surveillance. The emergence and availability of strong cryptography to the general public, combined with the growing importance of online activity, has massive implications for balance of power between individuals and large institutions.

Why did you use these, rather than HTTPS, SSL, IMAPS, and all the other obvious examples of strong encryption being used all the time by everybody? You've exoticized what is in fact already completely mundane, thus setting up all sorts of anlaytic traps for yourself you're going to fall into later.

 The most obvious implication is that people are now able to hide the content of their communications from oversight, in addition to their identities, allowing people to communicate freely without fear of retribution. This effectively backstops freedom of speech and the fourth amendment, creating an environment in which even controversial ideas can be discussed, and privacy protected. Allowing for anonymous reading and exploration of the net, eradicating the chilling effect that occurs as a result of government surveillance, is fundamental to maintaining freedom of thought.
Added:
>
>
The most obvious implication of secure communications is that we have $trillions of e-commerce and secure business operations on the public net. The second most obvious implication is that the world financial system is stable. Then there are these comparatively trivial other points.

 More controversially, cryptocurrencies like bitcoin, when used in tandem with other tools to protect anonymity, potentially ensure economic privacy. In the same way that untraceable cash transactions have been used to evade taxes and government oversight in the physical world, cryptocurrencies can be used to keep online economic activity private, enabling participation in outlawed economic activity. This is not only a theoretical possibility, but is already being done. There is already a thriving online black market in outlawed goods and services, and this will likely continue to grow for better or worse.
Added:
>
>
This is purely irrelevant. If you were going to write about it knowledgeably, you would need lots of space, and whatever this essay is about (we still don't know, after all, because you haven't given us your idea yet, just a bunch of semi-accurate technical description) it isn't about this.

 The Silk Road, a now defunct online black market using cryptographic tools to hide the identity of its operators and users, ran successfully for multiple years in flagrant violation of laws prohibiting the sale of certain controlled substances. It is estimated that $15 million in transactions were made through Silk Road annually. Despite the almost unlimited power and resources available to the United States government, they were almost entirely helpless to stop the transactions occurring through the marketplace. If it were not for mistakes made by the alleged founder of the marketplace, eventually exposing his identity to law enforcement, the marketplace could have remained operational. Although it was eventually shut down, multiple copycats have emerged to take its place.

Also controversial, cryptocurrencies potentially allow for economic support of political activists and unpopular causes without fear of retribution. For example, in 2010, numerous financial institutions began blocking donations to Trash.WikiLeaks, reducing their revenue by 95%. WikiLeaks? quickly began allowing potential patrons to donate bitcoin anonymously, bypassing the barriers erected by financial intermediaries.

Line: 41 to 78
 Second, cryptography itself can and has been outlawed in the past, though this is increasingly difficult to do considering that the government itself, as well as powerful private institutions rely on cryptography to function.
Changed:
<
<
Third, strong crypto is difficult to use. While great progress has been made since the 1980’s in making it accessible to everyone, it is still not convenient for those who are not tech savvy, and it is easy to make mistakes. FreedomBox, among other projects, are aiming to solve this issue, making it easier for the average person to use cryptographic tools correctly in order to ensure their privacy.
>
>
Really. Where did you have in mind?

Third, strong crypto is difficult to use.

Bushwah. This is the consequence of talking about stuff you don't use, and ignoring HTTPS, TLS and SSL that you use everyday all the time. Is it harder to use HTTPS websites than HTTP ones? Do you find electronic banking and PayPal? very hard? It's just nonsense that came from not thinking through first your own idea, and then second the background you would need to be sure the reader had in order to understand it. You reversed cart and horse, and have now spent hundreds of words in technical description, which turned out to bear down your own thinking, allowing mistakes like this one to occur.

While great progress has been made since the 1980’s in making it accessible to everyone, it is still not convenient for those who are not tech savvy, and it is easy to make mistakes. FreedomBox, among other projects, are aiming to solve this issue, making it easier for the average person to use cryptographic tools correctly in order to ensure their privacy.

 Finally, cryptography can be abused. Secrecy and anonymity protect the privacy of the innocent, but can also be used just as easily to shield destructive and predatory activity from oversight. For example, Tor has already been used to distribute and share child pornography.

Despite these limitations, and potential abuses, the promise of cryptography as a tool to protect freedom is high.

Added:
>
>
This draft clears away brush, so the next draft can do some construction. You don't need to teach me about the technology this time, or to write for a general readership. Instead, start from the idea of your own that is the essay's payoff, and develop from there. Instead of teaching basic techfacts, show me what you have thought your way to, and why.

 
You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable. To restrict access to your paper simply delete the "#" character on the next two lines:

Revision 4r4 - 16 Nov 2015 - 20:40:30 - EbenMoglen
Revision 3r3 - 04 Nov 2015 - 18:06:10 - EbenMoglen
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM