Using Technology to Deepen Democracy, Using Democracy to Ensure Technology Benefits Us All
Friday, April 22, 2005
Chapter Two: Markets from Math
The personal life of every individual is based on secrecy, and perhaps it is partly for that reason that civilized man [sic] is so nervously anxious that personal privacy should be respected. -– Anton Chekhov
It is insufficient to protect ourselves with laws, we need to protect ourselves with mathematics. -– Bruce Schneier
One: Weaving Nets, Smashing States
I. The "First Generation" of Cyberspatial Theory
II. Taking the First Generation Seriously
III. "California Ideology" Among the First Generation
Two: Arguments from Inevitability and from Desire
IV. Manifesto
V. What Is Manifest
VI. P2P, Not Anarchy
VII. Afterward
Three: Liber-Tech
VIII. Techniques of Secrecy
IX. Building Resistance In
X. e2e
Four: The Discretionary: Secrecy, Privacy, and Control
XI. From Privation to Discretion
XII. Description As Threat
XIII. Privacy Under Control
XIV. Digital Libertarianism
Go to Pancryptics Table of Contents
It is insufficient to protect ourselves with laws, we need to protect ourselves with mathematics. -– Bruce Schneier
One: Weaving Nets, Smashing States
I. The "First Generation" of Cyberspatial Theory
II. Taking the First Generation Seriously
III. "California Ideology" Among the First Generation
Two: Arguments from Inevitability and from Desire
IV. Manifesto
V. What Is Manifest
VI. P2P, Not Anarchy
VII. Afterward
Three: Liber-Tech
VIII. Techniques of Secrecy
IX. Building Resistance In
X. e2e
Four: The Discretionary: Secrecy, Privacy, and Control
XI. From Privation to Discretion
XII. Description As Threat
XIII. Privacy Under Control
XIV. Digital Libertarianism
Go to Pancryptics Table of Contents
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment