Let us not–out of fear–destroy what we are most proud of: democracy and your fundamental rights and liberties.
I have long spoken and written about the problems with the “walled garden” approach of social media companies. The danger lies in depending on a single platform that you do not own, and relinquishing ownership of your materials to the platform for the financial gain of its owners. Take control, folks! Own your data! Keep an eye on this space for more projects aimed at democratizing social media. My goal is that, with a minimum of effort and learning, you too can claim your own space much like we had back in the heyday of the personal web site.
This was the business model of Compuserve. And AOL. And then a little thing called The Internet got popular for a minute in the mid 1990s, and that plan suddenly didn’t work out so well for those captains of industry.
Everyone fails to recognize that the decentralised nature of Android is–while being a “mainstream flaw”–is one of its greatest strengths. Yes, Google wants to have more control over its operating system, but that goes against the very nature of what they intended when they began developing it. The point of the matter, though, is that very little would change if that asshole had used Android instead (considering the likely application of Paranoid Android in such a case). Actually, the whole matter would likely be less of an issue politically because there is not one entity to subpoena. The FBI could subpoena Google to do something, but Google could (in good faith) say that there is nothing they can do if an alternative OS were installed. The takeaway here should not be how much more secure iPhones are (they aren’t necessarily), but that compulsory cracking like this is dangerous to freedom at large.
“There is nothing new in the realization that the Constitution sometimes insulates the criminality of a few in order to protect the privacy of us all.”
Justice Antonin Scalia
This is a brilliant experiment, and one that I shall be putting my own spin on very soon. Keep posted as details come along!
Jonathan Hirshon kept his photo off the Internet for 20 years. Now he’s rallying the troops to hack Facebook and Google facial recognition.
A new report says giving the governments “exceptional access” to encrypted communications would jeopardize confidential data and critical infrastructure.
“It’s just plain old metadata. Nothing to worry about!”
Here’s why that is a problem.
They see you when you’re sleeping. They know when you’re awake.