m to engender
> jealousy.
--
http://felix.openflows.com
|Open PGP http://pgp.mit.edu/pks/lookup?search=0x0bbb5b950c9ff2ac
I suspect a misunderstanding.
Vaidhyanathan is playing with _cryptic_, as in obscure, not
cryptography:
"Unlike Bentham's Panopticon, the Cryptopticon is not su
gender
> > jealousy.
> --
> http://felix.openflows.com
> |Open PGP http://pgp.mit.edu/pks/lookup?search=0x0bbb5b950c9ff2ac
I suspect a misunderstanding.
Vaidhyanathan is playing with _cryptic_, as in obscure, not
cryptography:
"Unlike Bentham'
A technical note: the actual SIM card, while helpful, is not essential
for tracking. What is far more useful and harder to circumvent are
identifier associations and turning patterns into identifiers:
1. If you ever use a particular cell phone (IMEI), a browser with high
entropy fingerprint, a
Absolutely agree with the thread sentiments of driving people
underground and into disadvantage.
However, situations like this demand effort to circumvent and encourage
the exploration of methods allowing the routing around of such censor
blocks.
For instance in Germany, VoIP gateways (eg sipgate
It swings both ways, stricter registration requirements eventually
pushes more people underground. For example, immigrants in Germany
with temporary visas (fiktionsbescheinigungen) cannot buy SIM cards,
but they can hardly complete the administrative process without one.
E.
On Monday, January 7,
In 2014, a protestor at an anti-fascist rally in Vienna was sentenced to
12 months of jail, for alleged participation in violent action.
Among the evidence that was held against him was using an non-registered
prepaid card. Even though that was entirely legal at the time, it was
held against him a
Aloha,
Agreing with Morlock, but it's in fact even worse than. Before using
crypto, you're already into using a lot of devices, and non-possession
of these, e.g. smartphones, not only makes you suspect, it increasingly
makes your life impossible. Same with banking without a debit/credit
card
There isn't much there, other than expanding on the nature of the
invisible threat with long term consequences, which is usually dealt
with by the organized government (smoking, pesticides, etc.), except
that in this case the government is the cause of the threat, so it won't
touch it, and ther
Why haven't this list's mavens de-, re-, pre- and otherwise-
constructed Siva Vaidhyanathan's Cryptopticon?
If for no other reason than it is such a lovely neologism?
--
Dave Williamsd...@eskimo.com
# distributed via : no commercial use without permission
#is a moderated mailing list f