diff --git a/soft/001-platform-independence.md b/soft/001-platform-independence.md new file mode 100644 index 0000000..e40f8f8 --- /dev/null +++ b/soft/001-platform-independence.md @@ -0,0 +1,25 @@ +# platform independence + +one should expect any platform which achieves prominence to eventually be abused +to the degree the power dynamics inherent to its design allow. e.g., no +centralised platform, however well-meaning, can guarantee in perpetuity the +protection of it's users' data and their social connections from one form of +exploitation or another. such exploitation generally takes the form of +psychological manipulation, transmuting the social capital of the privately +owned "public square" into other forms of capital and, in some cases, destroying +the communities who were responsible for the creation of that social capital in +the first place. increasingly this exploitation is done without the platform +owner's knowledge or consent; the simple fact that a lot of unencrypted data has +been gathered together in one place makes the users of the platform vulnerable. +(this problem is worsened by a lack of tooling targeting reputation and the +deduplication of formal arguments, but that is a topic for a much later day.) + +the problem with every platform built using the traditional methods of web +development is that the traditional methods necessarily create an information +asymmetry that favors the platform providers and those able to compromise +such platforms. put another way, using such platforms could be seen as opting +in to a form of mass surveillance. + +in this author's opinion, one cannot be said to be platform independent unless +one's ability to migrate one's identity and data and keep private communications +private is _not_ dependent on the goodwill or competence of a platform provider. diff --git a/soft/001-platform-independence.md.asc b/soft/001-platform-independence.md.asc new file mode 100644 index 0000000..1cd745f --- /dev/null +++ b/soft/001-platform-independence.md.asc @@ -0,0 +1,16 @@ +-----BEGIN PGP SIGNATURE----- + +iQIzBAABCAAdFiEE0ZVR9dPnC9rIvgC+tQHDCzf0gGwFAl+0QukACgkQtQHDCzf0 +gGw8HA//bMeOTB8/biQO0HxIcv06mMOqtUYp1wdMaJ5FnvNBv2WfqvfjC8UxKUs8 +tShsNgrY1ahYIwCfeE//+w71YBgoFK5zJIM14qogLOp8gupPa41+DI0B4lXX9wMI +pX+evgmRPh2MOLyOVOUc8Fm6Eeo1+c5uWaH9AHW6t2a+ch45KrKy+8lYeT1PuwMj +lQACQMu5UGGAC/RyrI2F/fWab4O7FlCl+8tbIKjkCUTrSEZSsqB0U1TMVUgmVWvU +nXy9sDPJ0vZysy7OdYDDnImnj54inJ5LnmmP/9/bCd6ocRMh/BKxCgNhtOoRQHt1 +AbSNfsbgNESKXQvUaQ1aUP1S7aO0wUzYZClR5r2/r+jbZzCmQ+k2WHHLFMsNZvx8 +Yzq1s5xkihv1+cqheZq/xwemD15qpO5cg0KNNrzQvT1Q5Vg9APGeTlbY4GAxjfNs +UbESZMqSMJ+neKLQyZ8OghwxYlPJk17TKnknyfInWnQ6BiZZAb6O/IMGqxemgpuB +yeo5bB8+mkxUjS9mXpFUOhtn/rT8/ZbGuar4iplFeNLzJ5/GYnge2zXuocnxHSff +icw61VMcZeYNgSzQdeHa+Y+9iDhIRc1AQu1a/5IWNM7ReQBfGZ4o66cWSszyd+VY +FMBl18ACRcVDT41CRSqJDDuChyW1hiNbTzmCsLbVL/POWx1zqPw= +=7XSx +-----END PGP SIGNATURE----- diff --git a/soft/002-public-keys.md b/soft/002-public-keys.md new file mode 100644 index 0000000..ad3116d --- /dev/null +++ b/soft/002-public-keys.md @@ -0,0 +1,30 @@ +# public keys (and "cypherspace") + +a public key is the ultimate platform independent, fully decentralised form of +identity. for most there are still trust dependencies involved, of course: one +must trust the design of the scheme itself, the programmers who implemented it, +and all those involved in designing and building the hardware it runs on. as +suggested in [000-readme.md](./000-readme.md), these dependencies may never be +done away with entirely in this increasingly complex world. still, a public key +is the closest thing to a discrete, physical body that exists in the digital +world. all other forms of identity either introduce additional power imbalances +and trustful dependencies, or else may be easily forged. + +keyed entities, signed statements, and encrypted data storage and communications +together form what may be termed 'cypherspace.' only entities with +cryptographically sound ways of proving ownership of identities exist in +cypherspace. cypherspace exists primarily on the internet, but it also exists +offline, in local networks, and even sneakernets. because it is defined by +information, it _can_ exist anywhere information may be stored. because +information is defined as a change from some initial state, this means it can +technically exist anywhere mutable (though of course many such places may be of +no utility). + +because information is channel-independent and ubiquitous, cypherspace is nearly +unstoppable. the weak points in cypherspace are the gaps in one's understanding +of the _actual behavior_ of one's tools, a lack of knowledge regarding how to +_use_ one's tools to engage in cypherspace, and the obvious nature of the most +common ways of engaging with it across long distances. (e.g., two devices +sending apparently random data back and forth across the continent are almost +certainly engaging in some form of encrypted communication, which may itself +be enough to make one a target for malicious actors.) diff --git a/soft/002-public-keys.md.asc b/soft/002-public-keys.md.asc new file mode 100644 index 0000000..6fd5878 --- /dev/null +++ b/soft/002-public-keys.md.asc @@ -0,0 +1,16 @@ +-----BEGIN PGP SIGNATURE----- + +iQIzBAABCAAdFiEE0ZVR9dPnC9rIvgC+tQHDCzf0gGwFAl+0RJgACgkQtQHDCzf0 +gGxA5A/+KtOTtryEdCWpKjv909gzkk2KG8x4B+FoQkzrsuOsfpMW9o3fsEV/ESIR +GqSdZvXnSiyHJdnfVaijlHS+rR57Y/KukGOfg9jpjI89NJLiiyQD3/wus969BV37 +/VyM+U4+kQTGmY2aOD7kpu0cgfpKK9FNmHH0FIMOFe4L2uK2f/vxLkfWVzwuINa4 +0EPVjWOqZNaVK/WN0lXLED0aK/1KpOpnHFeV641NY5h+/Q/tEq4KA7NylE85E0oy +Tq3domk4YatN7Ne0qMhqi5d/Gfx5bOFPzvBhh4+YCk7xLZoAR+RN2Xc1E0eHdU3x +UbenQiiN6G1Ak7i7YGabgESZnFa8jFvRyt0SeIVGL1NXclcozaJNp+nDbUUP4/Ci +l13yhWCaIG61INx2FD/Gmx9VB/9VVn0omUnxvJzvvcvIndyVzcLTd1slgyKSXanH +17sadxBdhGgHSc1uA1VvfFKa/OECmFJLQUq4IKvEKWDUpinBFGaHn2i5W/QW4vHO +xpd5YWQnggHe2maDDe8yj8JQDp0hRQ6o2XHQxn4BefHrkSCqsscQMJNO5oDHuD8O +saqyXrGPuiP+ULyrFP+lkMfgmaqvQoxOUKmgehKRpLq3sV1gMSXL7I6dabQQxoZG +V/DwHNqE4j+yuXLaCTLSWxF8OkofzV/rJwrOYFyIieUwR2jkg3k= +=k9Uh +-----END PGP SIGNATURE-----