LianchenLiuFirstEssay 2 - 10 Nov 2015 - Main.EbenMoglen
|
|
META TOPICPARENT | name="FirstEssay" |
| |
< < | It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted. | | Trust issues
-- By LianchenLiu - 26 Oct 2015 | |
< < | Section I | | | |
< < | Subsection A | | The level of trust we are willing to place on things that we have no idea of is surprisingly high. I personally have never given much thought to privacy issues until very recently. I do not know how iPhone work, but I store my credit cards information on it; I do not know how cloud works, but I store all my photos on Baidu Cloud; I talk freely on Wechat on topics that I probably should not talk freely about, without knowing who else might have access to it. I often read about data securities or cyber security, but I never gave much thought about it, for several reasons: first, I do not understand it; second, I have (almost) nothing to hide; third, I am not important enough for anyone to watch; and fourth, even assume my browsing history was sold on the market, what is the harm? I have never been a paranoid about privacy and data security, nonetheless, I have expected my credit card information would not be leaked by just using my phone; my photos on Baidu Cloud would not be shown to a third party; and my conversation on WeChat? remains private. Why should I have any expectation of privacy? After all, storing my photos on the cloud is like storing it in a box and leaving it on the street. In real life, when we try carry a private conversation, we say to the other person “let’s go somewhere else”, or at least lower our voice. When it comes to cyberspace, we have a false sense of security—we make no attempt to obscure our voice, we do not even check our surroundings.
That false sense of security comes from our ignorance: if we cannot see it, it does not exist. I do not see anyone is viewing my conversation on WeChat? , therefore, no one is. If we have to use a legal term for it, it is probably willful blindness. For me, I have never been into “tech stuff”. I do not know how to code; I do not know what kind of information software or apps are gathering. How to secure my activities on phones or computers is beyond me, and I am not going to bother. I think most people share my attitude of indifference: they do not know how computers or phones work, and they are not going to bother figuring it out. | | When Zuckerberg spoke in fluent Chinese at Tsinghua University about devoting his time and energy to serving the community, one should be on notice that many members of the Shi had vowed to save the people from sufferings. Not that they were making intentional lies. It is just that human can hardly resist the temptation to achieve personal gains by screwing their fellow men, when no consequence will attach. Our ancestors were limited by time constraint to learn to read and write. However, our limitation is only our laziness. While a peasant, living in the Ming Dynasty, could not possibly be blamed for being illiterate, the public in our age has a civil duty to educate themselves on things that are running their phones and computers. Absolute power corrupts absolutely. Facebook might have been established with the simple intention to connect people, but when such connection has been established, it is almost impossible not to exploit it. I am not saying that the public should stop using Facebook. I am saying we should inform ourselves and evaluate what kind of risk we are exposed to. | |
< < | Subsub 1
Subsection B
Subsub 1
Subsub 2 | | | |
> > | As you weren't using
the section headings, or changing the privacy settings on the essay,
I removed the excess material so the text would be easier to read. | | | |
< < | Section II | > > | I think you are making three points here: | | | |
< < | Subsection A | > > |
- In a society held together by digital networks, people who know how software works, who can understand and change the physiology of the species-wide nervous system, are a privileged class.
- Individuals are likely to be unable to understand how the digital technology running human society works. Only those who have specialized education and who know how to ask the right questions will be "conscious" participants in a growing fraction of the whole life of every human being.
- Educated people can eliminate their ignorance about how society actually works, but to do so requires effort that even most educated people will not make.
| | | |
< < | Subsection B | > > | You might have been more terse in the expression of these you did include, so as to consider adding two more points: | | | |
> > |
- Power benefits from ignorance about how society really works. The more people do not consciously understand how their technology is used to control them, the more thoroughly and peacefully they are controlled. You could have said that this is one of the most important political ideas associated with Laozi (老子).
- The ability to learn how society really works depends on the transparency of the software that is the physiological layer of this nervous system. You cannot know how WeChat or Baidu services are affecting you unless you know what is being done with the data they aggregate about who accesses your messages or photos and who else's messages or photos you access. That's probably impossible. But you can know, if you are doing your personal messaging and photo-sharing through a FreedomBox that costs $50 and does everything the "cloud" companies do for you, but only for sharing with the people you actually mean to share with, that no one is using that data or information about who accesses it to control you.
- Which would lead to a third point, namely that the technology doesn't control the social outcome, the people who control the technology control the social outcome. If that is us, democracy is possible. Otherwise it dies.
| | | |
< < |
You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable.
To restrict access to your paper simply delete the "#" character on the next two lines: | > > | The greatest improvement possible in the essay is to remove its greatest limitation. You observe that knowledge is power, and you urge people to learn. But if people need to learn, someone needs to teach. Your essay, then, should be directed at helping people teach, so that many other people may learn. | | | |
< < | | > > | | | | |
< < | Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list. | | \ No newline at end of file |
|
LianchenLiuFirstEssay 1 - 26 Oct 2015 - Main.LianchenLiu
|
|
> > |
META TOPICPARENT | name="FirstEssay" |
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.
Trust issues
-- By LianchenLiu - 26 Oct 2015
Section I
Subsection A
The level of trust we are willing to place on things that we have no idea of is surprisingly high. I personally have never given much thought to privacy issues until very recently. I do not know how iPhone work, but I store my credit cards information on it; I do not know how cloud works, but I store all my photos on Baidu Cloud; I talk freely on Wechat on topics that I probably should not talk freely about, without knowing who else might have access to it. I often read about data securities or cyber security, but I never gave much thought about it, for several reasons: first, I do not understand it; second, I have (almost) nothing to hide; third, I am not important enough for anyone to watch; and fourth, even assume my browsing history was sold on the market, what is the harm? I have never been a paranoid about privacy and data security, nonetheless, I have expected my credit card information would not be leaked by just using my phone; my photos on Baidu Cloud would not be shown to a third party; and my conversation on WeChat? remains private. Why should I have any expectation of privacy? After all, storing my photos on the cloud is like storing it in a box and leaving it on the street. In real life, when we try carry a private conversation, we say to the other person “let’s go somewhere else”, or at least lower our voice. When it comes to cyberspace, we have a false sense of security—we make no attempt to obscure our voice, we do not even check our surroundings.
That false sense of security comes from our ignorance: if we cannot see it, it does not exist. I do not see anyone is viewing my conversation on WeChat? , therefore, no one is. If we have to use a legal term for it, it is probably willful blindness. For me, I have never been into “tech stuff”. I do not know how to code; I do not know what kind of information software or apps are gathering. How to secure my activities on phones or computers is beyond me, and I am not going to bother. I think most people share my attitude of indifference: they do not know how computers or phones work, and they are not going to bother figuring it out.
Because we do not know, we trust the people who know, whether they have a good intention or not. When software becomes a necessity in human life, the ability to create software is power, just like the ability to read and write in ancient societies was power as well. In a typical Han society in ancient China, the capability to read and write was in possession of a class that has exclusive access to the ruling power. This class is called Shi (士). This scene has come up in many literature depicting the life of ancient Chinese. A messenger from the royalty posted a piece of paper on the wall of the town hall, and people started to gather around that post and discuss the content on it. Peasants, merchants, soldiers, who think they can recognize one character or two on the post, argued with each other on what the post says, until an old Xiucai (秀才), who is at the lowest level of the Shi, clears his throat. Recognizing the sound, the crowd becomes quiet; they parts away to make room for the learned man to come forward. In reverence, the crowd listens as he reads each character.
In the age that most men are illiterate, the men who are not hold the power: they communicate commands to generals thousands of miles away, make tax record of the remotest village on the land, and write history about the deeds of every emperor. The Shi derives the power from the fact that most men struggled feeding themselves and their families, and had no time to learn to read and write. Coding is a new form of power, and the power is derived from the fact that most men are too lazy to learn about it. One thousand year ago, when time was scarce in a common man’s life, the class that can afford the time to learn is warranted access to power. Nowadays, time is no longer scarcity, as technology has freed human from most of the repetitive work that our ancestors spend most of their time on. With money becoming the new scarcity, the capitalists are given the access to power. The class of Shi, while trusted with the lives of their people, had done more ill than good. Similarly, why capitalists/ coders who run the biggest technology companies should be given trust freely by the public, relying on nothing but their good will?
When Zuckerberg spoke in fluent Chinese at Tsinghua University about devoting his time and energy to serving the community, one should be on notice that many members of the Shi had vowed to save the people from sufferings. Not that they were making intentional lies. It is just that human can hardly resist the temptation to achieve personal gains by screwing their fellow men, when no consequence will attach. Our ancestors were limited by time constraint to learn to read and write. However, our limitation is only our laziness. While a peasant, living in the Ming Dynasty, could not possibly be blamed for being illiterate, the public in our age has a civil duty to educate themselves on things that are running their phones and computers. Absolute power corrupts absolutely. Facebook might have been established with the simple intention to connect people, but when such connection has been established, it is almost impossible not to exploit it. I am not saying that the public should stop using Facebook. I am saying we should inform ourselves and evaluate what kind of risk we are exposed to.
Subsub 1
Subsection B
Subsub 1
Subsub 2
Section II
Subsection A
Subsection B
You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable.
To restrict access to your paper simply delete the "#" character on the next two lines:
Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list. |
|
|