Month: January 2015

Book Club on the Radio, v. 3

Posted on Updated on

Our #Radiobookclub group is doing another Book-Chat on the Radio.

The event is January 20, 2015 at 8 pm on Fairfax Public Access Radio.

We’re reading Dana Shavin’s The Body Tourist.

bodytourist

(cover courtesy of the author’s website, accessed 11 Jan 2015)

You can order the book directly from the publisher, Little Feather Books.

I won’t be there this time, not even as a long-distance call-in. But Jenn Lawrence of @Indiethursday and Jenn’s Bookshelves, Ellen Clair Lamb and Jill of One More Page Books will all be there to do a live-close reading, review the work as a piece of writing, and surely talk about the book’s observations on anorexia.

Listeners can call in (please do): (703)-560-8255 and maybe watch a few Tweets with the #radiobookclub hashtag.

Thank you for reading.

Jesse L.

#Privacy in Consumer Communications and #Information Searches

Posted on Updated on

PRC-Logo

I believe privacy in information access and communication is part & parcel to engagement in full intellectual freedom.

———————————————————————————————————————

Connected with a recent Pew Research Center survey on privacy, The Future of Privacy, Digital Life in 2025,  Hal Varian, Chief Economist for Google said something to the affect that users are so in love with convenience that they will fully accept their transactions and access to the network being monitored.

Hmmm.

If that was the case, we would not see an increase in the use of privacy based Web browsers such as DuckDuckGo, StartPage and of course increase in Tor usage.

startp_logo     tor-the-onion1

These are protocols and browsers that have found various ways of accessing the open web by submitting queries in ways that are not connected to your IP address etc. I recommend you look into each on of the above systems to see which will work for you.*

The other aspect of Varian’s “convenience” justification for being monitored by corporations and governments is the routine scanning and reading of communications in e-mail, chat and video-conversations.

Google offers “free” e-mail, chat and video conversation technologies under their banner. But these are all data-tracking (and content reading) systems.** Even Microsoft’s Skype is not secure.

enigmaillogo

But there are a wide array of encryption packages (that are free right now) for e-mail and chat. One such package for e-mail is, Enigmail OpenPGP (there are others, but I use this one: jesse@meta21st.com) and OTR Chat, which stands for Off-The-Record. These work with client-based applications so encryption is done on the machine at hand and decrypted at the destination machine by the person intended to receive it. This is referred to as end-to-end encryption (E2EE).

I bring up these few examples of applications being developed that use the internet to accomplish all the same goals as main-stream internet use, but in methods that prioritize privacy and the right the be left alone on one’s own pursuits of life, liberty and happiness in order to highlight one single important idea>

Why can’t these same companies or others develop products to sell that work in the same way as these open-source privacy-advocacy projects? Think about it. Google sells applications for e-mail, websites, etc through their Google Apps programs. But all these also collect data and read e-mails. I don’t see why a convenient (to counter Varian’s above point) product can’t be sold at a profit by these same companies: Google, Microsoft, Yahoo! that would also encrypt to enhance privacy of e-mail and communication.

Maybe information wants to be free. I can’t say. But, obviously, “information,” according to the model to which we are used to living, operates under a for-profit model. This means that even as communications technologies could be sold (we are already paying for internet access in some way), routine access to information sources on the Internet in an encrypted, private mode might also need to be built on a for-pay model. Right now, those same information searches are being gathered so somebody else can make money. I think we might need to realize that “information” is a product in some format.

As consumers, we should be able to choose to reject the internet as a whole, or…in the name of convenience, might have to choose to accept a small payment to access the Networked world’s vast information sources in privacy and true intellectual freedom.

There are already a few examples of companies looking for profit while even building technologies that encourage privacy and the right to be completely “forgotten” by server logs. Laws and/or technology must not out-step each other. DuckDuckGo uses general advertising in the browser and StartPage submits anonymizing queries through its servers to Google (which is an attempt to accept the convenience of the Google search model). There are ways to make money even while the Web is accessed in anonymously.

The next step is e-mail. I already mentioned Enigmail OpenPGP above, a client-based encryption program that uses a pre-existing e-mail account to encrypt using a desk-top client. This is “free” software that uses an account that already exists. All e-mail submitted through the encryption client is sent encrypted so the host servers can’t read it. But StartPage has been working on a subscription e-mail service called Startmail that I think function on the same encryption standards as as GPG encryption (please read further on this if you are so inclined). They have released a whitepaper on the technical aspects of their e-mail project linked here.

I hope to suggest there are modes of producing a profit even while respecting one’s human dignity and privacy. With that intention, I have included a few companies that are working with that agenda. We need not give up on all privacy for the sake of convenience.

At the level of the library: academic, public an special libraries alike, all can find ways of formatting technologies and services with privacy and intellectual freedom re-centralized.

I challenge this conversation to take the next level.

Thank you for reading.

Jesse L.

———————————————————————————————————————

* I must add the caveat that when people use anonymizing technologies to access the world of networked information (the Internet), they must also conform to the technical requirements to support that anonymization. Some changes must be made.

** Please read Google’s privacy policy here.