add 001-platform-independence and 002-public-keys posts.
This commit is contained in:
parent
e4acd1dd3d
commit
1867a806d1
|
@ -0,0 +1,25 @@
|
|||
# platform independence
|
||||
|
||||
one should expect any platform which achieves prominence to eventually be abused
|
||||
to the degree the power dynamics inherent to its design allow. e.g., no
|
||||
centralised platform, however well-meaning, can guarantee in perpetuity the
|
||||
protection of it's users' data and their social connections from one form of
|
||||
exploitation or another. such exploitation generally takes the form of
|
||||
psychological manipulation, transmuting the social capital of the privately
|
||||
owned "public square" into other forms of capital and, in some cases, destroying
|
||||
the communities who were responsible for the creation of that social capital in
|
||||
the first place. increasingly this exploitation is done without the platform
|
||||
owner's knowledge or consent; the simple fact that a lot of unencrypted data has
|
||||
been gathered together in one place makes the users of the platform vulnerable.
|
||||
(this problem is worsened by a lack of tooling targeting reputation and the
|
||||
deduplication of formal arguments, but that is a topic for a much later day.)
|
||||
|
||||
the problem with every platform built using the traditional methods of web
|
||||
development is that the traditional methods necessarily create an information
|
||||
asymmetry that favors the platform providers and those able to compromise
|
||||
such platforms. put another way, using such platforms could be seen as opting
|
||||
in to a form of mass surveillance.
|
||||
|
||||
in this author's opinion, one cannot be said to be platform independent unless
|
||||
one's ability to migrate one's identity and data and keep private communications
|
||||
private is _not_ dependent on the goodwill or competence of a platform provider.
|
|
@ -0,0 +1,16 @@
|
|||
-----BEGIN PGP SIGNATURE-----
|
||||
|
||||
iQIzBAABCAAdFiEE0ZVR9dPnC9rIvgC+tQHDCzf0gGwFAl+0QukACgkQtQHDCzf0
|
||||
gGw8HA//bMeOTB8/biQO0HxIcv06mMOqtUYp1wdMaJ5FnvNBv2WfqvfjC8UxKUs8
|
||||
tShsNgrY1ahYIwCfeE//+w71YBgoFK5zJIM14qogLOp8gupPa41+DI0B4lXX9wMI
|
||||
pX+evgmRPh2MOLyOVOUc8Fm6Eeo1+c5uWaH9AHW6t2a+ch45KrKy+8lYeT1PuwMj
|
||||
lQACQMu5UGGAC/RyrI2F/fWab4O7FlCl+8tbIKjkCUTrSEZSsqB0U1TMVUgmVWvU
|
||||
nXy9sDPJ0vZysy7OdYDDnImnj54inJ5LnmmP/9/bCd6ocRMh/BKxCgNhtOoRQHt1
|
||||
AbSNfsbgNESKXQvUaQ1aUP1S7aO0wUzYZClR5r2/r+jbZzCmQ+k2WHHLFMsNZvx8
|
||||
Yzq1s5xkihv1+cqheZq/xwemD15qpO5cg0KNNrzQvT1Q5Vg9APGeTlbY4GAxjfNs
|
||||
UbESZMqSMJ+neKLQyZ8OghwxYlPJk17TKnknyfInWnQ6BiZZAb6O/IMGqxemgpuB
|
||||
yeo5bB8+mkxUjS9mXpFUOhtn/rT8/ZbGuar4iplFeNLzJ5/GYnge2zXuocnxHSff
|
||||
icw61VMcZeYNgSzQdeHa+Y+9iDhIRc1AQu1a/5IWNM7ReQBfGZ4o66cWSszyd+VY
|
||||
FMBl18ACRcVDT41CRSqJDDuChyW1hiNbTzmCsLbVL/POWx1zqPw=
|
||||
=7XSx
|
||||
-----END PGP SIGNATURE-----
|
|
@ -0,0 +1,30 @@
|
|||
# public keys (and "cypherspace")
|
||||
|
||||
a public key is the ultimate platform independent, fully decentralised form of
|
||||
identity. for most there are still trust dependencies involved, of course: one
|
||||
must trust the design of the scheme itself, the programmers who implemented it,
|
||||
and all those involved in designing and building the hardware it runs on. as
|
||||
suggested in [000-readme.md](./000-readme.md), these dependencies may never be
|
||||
done away with entirely in this increasingly complex world. still, a public key
|
||||
is the closest thing to a discrete, physical body that exists in the digital
|
||||
world. all other forms of identity either introduce additional power imbalances
|
||||
and trustful dependencies, or else may be easily forged.
|
||||
|
||||
keyed entities, signed statements, and encrypted data storage and communications
|
||||
together form what may be termed 'cypherspace.' only entities with
|
||||
cryptographically sound ways of proving ownership of identities exist in
|
||||
cypherspace. cypherspace exists primarily on the internet, but it also exists
|
||||
offline, in local networks, and even sneakernets. because it is defined by
|
||||
information, it _can_ exist anywhere information may be stored. because
|
||||
information is defined as a change from some initial state, this means it can
|
||||
technically exist anywhere mutable (though of course many such places may be of
|
||||
no utility).
|
||||
|
||||
because information is channel-independent and ubiquitous, cypherspace is nearly
|
||||
unstoppable. the weak points in cypherspace are the gaps in one's understanding
|
||||
of the _actual behavior_ of one's tools, a lack of knowledge regarding how to
|
||||
_use_ one's tools to engage in cypherspace, and the obvious nature of the most
|
||||
common ways of engaging with it across long distances. (e.g., two devices
|
||||
sending apparently random data back and forth across the continent are almost
|
||||
certainly engaging in some form of encrypted communication, which may itself
|
||||
be enough to make one a target for malicious actors.)
|
|
@ -0,0 +1,16 @@
|
|||
-----BEGIN PGP SIGNATURE-----
|
||||
|
||||
iQIzBAABCAAdFiEE0ZVR9dPnC9rIvgC+tQHDCzf0gGwFAl+0RJgACgkQtQHDCzf0
|
||||
gGxA5A/+KtOTtryEdCWpKjv909gzkk2KG8x4B+FoQkzrsuOsfpMW9o3fsEV/ESIR
|
||||
GqSdZvXnSiyHJdnfVaijlHS+rR57Y/KukGOfg9jpjI89NJLiiyQD3/wus969BV37
|
||||
/VyM+U4+kQTGmY2aOD7kpu0cgfpKK9FNmHH0FIMOFe4L2uK2f/vxLkfWVzwuINa4
|
||||
0EPVjWOqZNaVK/WN0lXLED0aK/1KpOpnHFeV641NY5h+/Q/tEq4KA7NylE85E0oy
|
||||
Tq3domk4YatN7Ne0qMhqi5d/Gfx5bOFPzvBhh4+YCk7xLZoAR+RN2Xc1E0eHdU3x
|
||||
UbenQiiN6G1Ak7i7YGabgESZnFa8jFvRyt0SeIVGL1NXclcozaJNp+nDbUUP4/Ci
|
||||
l13yhWCaIG61INx2FD/Gmx9VB/9VVn0omUnxvJzvvcvIndyVzcLTd1slgyKSXanH
|
||||
17sadxBdhGgHSc1uA1VvfFKa/OECmFJLQUq4IKvEKWDUpinBFGaHn2i5W/QW4vHO
|
||||
xpd5YWQnggHe2maDDe8yj8JQDp0hRQ6o2XHQxn4BefHrkSCqsscQMJNO5oDHuD8O
|
||||
saqyXrGPuiP+ULyrFP+lkMfgmaqvQoxOUKmgehKRpLq3sV1gMSXL7I6dabQQxoZG
|
||||
V/DwHNqE4j+yuXLaCTLSWxF8OkofzV/rJwrOYFyIieUwR2jkg3k=
|
||||
=k9Uh
|
||||
-----END PGP SIGNATURE-----
|
Loading…
Reference in New Issue