add 001-platform-independence and 002-public-keys posts.

This commit is contained in:
yafox 2020-11-17 21:48:03 +00:00
parent e4acd1dd3d
commit 1867a806d1
No known key found for this signature in database
GPG Key ID: B501C30B37F4806C
4 changed files with 87 additions and 0 deletions

View File

@ -0,0 +1,25 @@
# platform independence
one should expect any platform which achieves prominence to eventually be abused
to the degree the power dynamics inherent to its design allow. e.g., no
centralised platform, however well-meaning, can guarantee in perpetuity the
protection of it's users' data and their social connections from one form of
exploitation or another. such exploitation generally takes the form of
psychological manipulation, transmuting the social capital of the privately
owned "public square" into other forms of capital and, in some cases, destroying
the communities who were responsible for the creation of that social capital in
the first place. increasingly this exploitation is done without the platform
owner's knowledge or consent; the simple fact that a lot of unencrypted data has
been gathered together in one place makes the users of the platform vulnerable.
(this problem is worsened by a lack of tooling targeting reputation and the
deduplication of formal arguments, but that is a topic for a much later day.)
the problem with every platform built using the traditional methods of web
development is that the traditional methods necessarily create an information
asymmetry that favors the platform providers and those able to compromise
such platforms. put another way, using such platforms could be seen as opting
in to a form of mass surveillance.
in this author's opinion, one cannot be said to be platform independent unless
one's ability to migrate one's identity and data and keep private communications
private is _not_ dependent on the goodwill or competence of a platform provider.

View File

@ -0,0 +1,16 @@
-----BEGIN PGP SIGNATURE-----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=7XSx
-----END PGP SIGNATURE-----

30
soft/002-public-keys.md Normal file
View File

@ -0,0 +1,30 @@
# public keys (and "cypherspace")
a public key is the ultimate platform independent, fully decentralised form of
identity. for most there are still trust dependencies involved, of course: one
must trust the design of the scheme itself, the programmers who implemented it,
and all those involved in designing and building the hardware it runs on. as
suggested in [000-readme.md](./000-readme.md), these dependencies may never be
done away with entirely in this increasingly complex world. still, a public key
is the closest thing to a discrete, physical body that exists in the digital
world. all other forms of identity either introduce additional power imbalances
and trustful dependencies, or else may be easily forged.
keyed entities, signed statements, and encrypted data storage and communications
together form what may be termed 'cypherspace.' only entities with
cryptographically sound ways of proving ownership of identities exist in
cypherspace. cypherspace exists primarily on the internet, but it also exists
offline, in local networks, and even sneakernets. because it is defined by
information, it _can_ exist anywhere information may be stored. because
information is defined as a change from some initial state, this means it can
technically exist anywhere mutable (though of course many such places may be of
no utility).
because information is channel-independent and ubiquitous, cypherspace is nearly
unstoppable. the weak points in cypherspace are the gaps in one's understanding
of the _actual behavior_ of one's tools, a lack of knowledge regarding how to
_use_ one's tools to engage in cypherspace, and the obvious nature of the most
common ways of engaging with it across long distances. (e.g., two devices
sending apparently random data back and forth across the continent are almost
certainly engaging in some form of encrypted communication, which may itself
be enough to make one a target for malicious actors.)

View File

@ -0,0 +1,16 @@
-----BEGIN PGP SIGNATURE-----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=k9Uh
-----END PGP SIGNATURE-----