-
Notifications
You must be signed in to change notification settings - Fork 6
/
Copy pathprivate_money.html.pm
626 lines (459 loc) · 34.6 KB
/
private_money.html.pm
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
#lang pollen
◊(define-meta title "Private money")
◊(define-meta subtitle "Reclaim your financial privacy with cryptocurrencies")
◊(define-meta published "2019-12-09T00:00:00+01:00")
◊(define-meta updated "2021-05-07T19:11:00+01:00")
◊(define-meta uuid "9f90581c-24f1-4653-9b4a-d86a9ec9e365")
◊(define-meta template "chapter.html")
◊(clear-sidenotes)
◊epigraph{
◊qt[#:author "Edward Snowden"
#:date "May 21, 2015"
#:url snowden-ama]{
Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say.
}
}
◊(define snowden-ama
(x-ref
"2019-12-09"
"https://www.reddit.com/r/IAmA/comments/36ru89/just_days_left_to_kill_mass_surveillance_under/crglgh2/"
"Edward Snowden (2015) Ask Me Anything on Reddit"))
The erosion of personal privacy is one of the many important issues in today's society. Everything we do digitally is tracked---what sites we visit, how long and what we do there. This data is then packaged and stored, waiting to be used to convince us to buy stuff or used to attack us. Even what we do with our own money is tracked and used to figure out how to separate it from us.
One of the very good things about cash---physical coins or bills---is that there's very little tracking on them. You can buy things with them, or give them to someone, and nobody else needs to know about it. Unfortunately people aren't using cash as much anymore, some have even stopped accepting cash, and all commonly used alternatives come with the privacy trade-off.
Cryptocurrencies can help us with this---they're digital and just like cash they can be ◊link[private_property]{used privately}.◊mn{vpn}
◊ndef["vpn"]{
For instance if you want to purchase a VPN, a domain or a VPS anonymously it's probably a good idea to use cryptocurrencies.
But remember that most cryptocurrencies, Bitcoin included, are ◊link[privacy-challenge]{only pseudo-anonymous} and it's easy to make a mistake and break your anonymity.
}
◊subhead{What is privacy and anonymity?}
It's easy to mix-up the terms "privacy" and "anonymity" (which I've done many times myself writing this chapter). They're related, but different:
◊dl{
◊dt{Privacy}
◊dd{Concerns content, for example text in messages you send to your friends.}
◊dt{Anonymity}
◊dd{Refers to identity, for example that I, Jonas, received a text message.}
}
In practice they often overlap. For example if all my emails were available online for anyone to read, it would be a breach of my privacy. But it would also affect my anonymity, since my name is included in the emails.
◊;https://invisibler.com/privacy-and-anonymity/
◊subhead{Why privacy matters}
Privacy and anonymity are important issues in the modern world and there are examples of privacy violations everywhere. Before we get to some of them we first need to address why privacy matter, because today government officials, company owners, the news and regular people all ask the same questions:
Why would you want privacy? What are you hiding? Are you criminal?◊mn{summary-discussion}
◊ndef["summary-discussion"]{
Privacy discussions can often be summarized as:
◊span[#:class "talking"]{
◊trow{Why do I need privacy? I have nothing to hide.}
◊trow{Then pull your pants down, send me a dick pick, your email password and your credit card number.}
}
I can't promise I'll do better, but I'll try.
}
◊(define (trow . args)
`(span ((class "row")) ,@args))
◊subhead3{It's natural to seek privacy}
When people are alone and relaxed, they do things they otherwise wouldn't. Maybe you like to dance when you're alone, sing in the shower or scratch yourself somewhere... nice. If you're caught in the act you immediately stop what you're doing and feel embarrassed.
If you don't recognize the situation please watch the scene where Hugh Grant plays the ◊link[love-actually-dance]{dancing prime minister in Love Actually}. Even if you do recognize the situation, the scene's so good you should watch it anyway.
◊img[#:src "/images/dancing.png" #:alt "A dude dancing naked, singing his favorite song."]{
What's better than dancing naked, singing your favorite song, without a care in the world?
And what's worse than having someone catching you in the act?
}
◊(define love-actually-dance
(x-ref
"2019-12-09"
"https://www.youtube.com/watch?v=aUm2K6eDuMU"
"YouTube (2010) Love Actually - Hugh Grant dancing (1 min)"))
I have a two year old child, and even he wants privacy sometimes. He likes to build a cabin made of pillows and hide in it, and if I disturb him he pushes me and shouts “Go away!”. After we recently renovated his room he was ◊em{so happy} that he had a room of his own again, which he likes to be alone in when he's pooping (in his diaper thank god).◊mn{children-privacy}
◊ndef["children-privacy"]{
It's really quite fascinating. Sometimes I can hug him while he's playing, but other times I'm not even allowed to be in the same room. I guess he just wants to be alone from time to time.
}
People may say privacy don't matter, yet their actions tell a different story. For example Facebook's founder Mark Zuckerberg has said that privacy is ◊link[zuckerberg-privacy-not-norm]{no longer a social norm}, but then he buys up four homes surrounding his home ◊link[zuckerberg-buy-privacy]{because he wants privacy}.
After all, we don't have curtains or blinders on our windows because we do something illegal, it's because we want control over our privacy.
◊(define zuckerberg-buy-privacy
(x-ref
"2019-12-09"
"https://www.inquisitr.com/989057/facebooks-zuckerberg-buys-his-neighborhood-because-get-this-he-wants-privacy/"
"Dusten Carlson (2013) Facebook’s Zuckerberg Buys His Neighborhood Because, Get This, He Wants Privacy"))
◊(define zuckerberg-privacy-not-norm
(x-ref
"2019-12-09"
"https://www.theguardian.com/technology/2010/jan/11/facebook-privacy"
"Bobbie Johnson (2010) Privacy no longer a social norm, says Facebook founder"))
◊subhead3{Personal security}
Caring about privacy is a natural instinct---for good reason. It's not just about avoiding embarrassment; it's also for your own personal safety. In fact privacy is closely related to security. Your passwords and credit card numbers are obvious examples, but there are more:
◊ul{
◊li{Identity theft can ruin your life
When someone assumes your identity, and use it to issue credit cards or promote scams, it can ruin your credit score, cost you millions, and force you to abandon your job and your house. Using only your private information people can literally ◊link[identity-theft-story]{take over your life}.◊mn{how-to-destroy-someones-life}
◊note-pos{how-to-destroy-someones-life}
}
◊li{Criminals target rich people
The most important advice if you win the lottery is to ◊link[windfall]{not tell anyone}---people will ◊link[windfall-happy]{target you like vultures}. The same advice is given to people who want to invest in physical gold, for similar reasons.
The best way to get targeted by criminals is to let them know how rich you are. And conversely the best way to avoid getting targeted is to hide your wealth.
}
◊li{Crime of opportunity
Many crimes aren't carried out by super-criminals with a master plan. Often they're done in the heat of the moment, when an opportunity arose. For example if everyone knows you're away for a week, the risk for a burglary rises. Or if you tell everyone that you're carrying $10,000 in your wallet, the risk of getting mugged increases.
}
}
◊ndef["how-to-destroy-someones-life"]{
I'm a problem solver, and I do wonder how everyday problems are solved. For example how milk ends up in the milk packages or how you paint a heart in the sky with an airplane. Not because I need to solve them---and I don't even want to know the right answer---I just need to let my mind work on something.
Sometimes the questions are darker, like what's the most effective way to destroy someone's life. Stealing their identity have to be one of the top candidates.
}
◊(define identity-theft-story
(x-ref
"2019-12-09"
"https://www.forbes.com/sites/laurashin/2014/11/18/someone-had-taken-over-my-life-an-identity-theft-victims-story/"
"Laura Shin (2014) 'Someone Had Taken Over My Life': An Identity Theft Victim's Story"))
◊(define windfall
(x-ref
"2019-12-09"
"https://www.reddit.com/r/personalfinance/wiki/windfall"
"r/personalfinance Wiki: Windfall"))
◊(define windfall-happy
(x-ref
"2019-12-09"
"https://www.reddit.com/r/AskReddit/comments/24vo34/whats_the_happiest_5word_sentence_you_could_hear/chb4v05/?context=1"
"Reddit: What's the happiest 5-word sentence you could hear?"))
◊subhead3{Others have important things to hide}
Even if you don't think you have anything to hide, others do. Here are some examples where lack of economic privacy is harmful:◊mn{focus-economic}
◊ndef["focus-economic"]{
I focus on the economic side of privacy here, because that's related to cryptocurrencies, but it should be easy to find examples in other areas.
}
◊ul{
◊li{Unwanted pregnancies
There was a story that went viral years ago on how Target ◊link[teenage-pregnancy]{predicted a teenage pregnancy and exposed it to her father}. In a normal western household it might not be that big of a deal, but ◊link[murder-family-honor]{thousands of women are killed each year} for family "honor"---often for much less than a teenage pregnancy, such as ◊link[dowry-murder]{not getting paid enough for marrying the bride}.
}
◊li{Sexual preference
While homosexuality is becoming more accepted, it's still ◊link[gay-illegal]{illegal in some countries} where you might face execution. Similar to the story of the girl's pregnancy above, having a history of your purchases might expose you. (Why did you visit this gay bar?)
There's also nothing wrong with having a fetish and engaging in strange sexual fantasies in your own home, but maybe you don't want your neighbourhood to know you bought a vibrating horse dildo.◊mn{porn-story}
◊note-pos{porn-story}
◊ndef["porn-story"]{
I read a story long ago, but I can't remember if it was real or made up.
It was about a couple and their son who liked to play with their neighbours. They were happy to let him, the neighbours were really friendly, and they liked to spend time with them too. But one day they found an amateur porn DVD---the neighbours apparently liked to create porn.
The DVD never harmed them, and their son didn't know about it, but they never allowed their son to visit the neighbours anymore, and the couple stopped spending time with them because it "felt weird".
I guess the point of the story is that some things are best left unknown.
}
}
◊li{A cause for oppression
In China if you're end up on the ◊link[china-social-credit]{wrong side of their social credit system}, you're banned from spending on "luxuries". If prospective business partners or customers discovers your status as a "deadbeat", you might get shunned and your hope of climbing out of your situation disappear.
◊;Keeping your economy private to outsiders would be a great help.
}
}
As Snowden's quote in the beginning of the chapter says: just because you choose not to exercise your right, why should you remove the right for others? Privacy should be a ◊em{choice}---not something that's chosen for you.
◊(define teenage-pregnancy
(x-ref
"2019-12-09"
"https://www.nytimes.com/2012/02/19/magazine/shopping-habits.html?pagewanted=all&_r=0"
"Charles Duhigg (2012) How Companies Learn Your Secrets"))
◊(define murder-family-honor
(x-ref
"2019-12-09"
"https://www.nationalgeographic.com/culture/2002/02/thousands-of-women-killed-for-family-honor/"
"Hillary Mayell (2002) Thousands of Women Killed for Family \"Honor\""))
◊(define dowry-murder
(x-ref
"2019-12-09"
"https://en.wikipedia.org/wiki/Dowry_system_in_India#Dowry_murder"
"Wikipedia: Dowry murder"))
◊(define gay-illegal
(x-ref
"2019-12-09"
"https://www.theguardian.com/world/2016/jun/21/gay-lgbt-muslim-countries-middle-east"
"Brian Whitaker (2016) Everything you need to know about being gay in Muslim countries"))
◊subhead3{Privacy is a human right}
That privacy is important is widely acknowledged. It's for example recognized as a human right by the United Nations, along with the right to food, clothing and medical care:
◊qt[#:src "Universal Declaration of Human Rights"
#:url un-human-rights]{
No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.
}
◊(define un-human-rights
(x-ref
"2019-12-09"
"https://www.un.org/en/universal-declaration-human-rights/"
"United Nations: Universal Declaration of Human Rights"))
Children's right to privacy is also acknowledged by UNICEF:◊mn{adult-version}
◊ndef["adult-version"]{
I was going to quote the ◊link[child-rights-adult]{grown-up version} of the children's rights, but they use a muddy language that's difficult to read.
}
◊qt[#:src "Convention on the Rights of the Child: The children's version"
#:url child-rights-children]{
Every child has the right to privacy. The law must protect children’s privacy, family, home, communications and reputation (or good name) from any attack.
}
◊note-pos[#:top -3]{adult-version}
◊(define child-rights-children
(x-ref
"2019-12-09"
"https://www.unicef.org/child-rights-convention/convention-text-childrens-version"
"UNICEF: Convention on the Rights of the Child: The children's version"))
◊(define child-rights-adult
(x-ref
"2019-12-09"
"https://www.unicef.org/child-rights-convention/convention-text"
"UNICEF: Convention on the Rights of the Child"))
Even the constitution of the United States---written more than a hundred years before the first computer---intends to protect our privacy:
◊qt[#:src "Fourth Amendment"
#:url 4th-amendment]{
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
}
◊(define 4th-amendment
(x-ref
"2019-12-09"
"https://www.britannica.com/topic/Fourth-Amendment"
"Brian P. Smentkowski: Fourth Amendment"))
◊subhead{We're living in a Stasi fantasy}
The ◊link[stasi]{Stasi}, the secret police of East Germany, has ◊link[stasi-repression]{been described} as one of the most repressive organizations in the world. One of their purposes was to find and imprison political enemies, which basically meant anyone critical of the government.
They used 100,000 employees and between 500,000 to 2,000,000 snitches to maintain files on more than one-third of the population. There were always spies in the bars and libraries who listened to your conversations and they encouraged (or threatened) people to snitch on their co-workers, neighbours and family.◊mn{threats}
◊ndef["threats"]{
People could be placed in prison and tortured by isolation or sleep deprivation in the hopes of getting them to snitch on others.
}
◊book-qt[permanent-record-book]{
In an authoritative state, rights derive from the state and are granted to people. In a free state, rights derive from people and are granted to the state.
}
◊note-pos[#:top -12]{threats}
The goal of the Stasi was to imprison everyone critical of the regime. To do that they tried to map out the lives of everyone---where they went, what they did, what they said and who they talked to. This was painstakingly difficult and required tremendous resources.
Today we live in a society the Stasi couldn't even dream of. There's no need for a shady person to follow us around, because we already have a surveillance device in our pocket. All information they could ever want is already available, they just have reach out and grab it.◊mn{phone-surveillance}
◊ndef["phone-surveillance"]{
Our smartphone really do everything the Stasi spies tried to do. It tracks your location, it listens to your conversations and it follows you everywhere. And it always keeps a perfect record.
}
Back in 2013 Edward Snowden revealed that governments were doing just this.
◊note-pos[#:top -6]{phone-surveillance}
Here are just ◊link[snowden-leaks]{some of the things} he leaked:
◊ul[#:class "snowden-leaks"]{
◊leak["All phone calls are recorded"
#:url recorded-phone-calls]{
The N.S.A. (the U.S. intelligence service) collect all U.S. phone calls and text messages. They also collect foreign phone calls, including those of foreign leaders such as ◊link[hack-merkel]{Angela Merkel}.
}
◊leak["Remotely controlled phones"
#:url remotely-controlled-phones]{
The GCHQ (the british intelligence service) can remotely control your phone. They can for example turn it on remotely and use the microphone to record you.
}
◊leak["Big tech data isn't private"
#:url big-tech-data]{
The government can ask for (or rather demand) data from the big tech companies like Facebook, Google or Apple. If they refuse they can ◊link[hack-big-tech]{just hack them} and steal the data anyway.◊mn{nsa-legality}
◊note-pos{nsa-legality}
◊ndef["nsa-legality"]{
The N.S.A. has proved again and again that they stand above such trivial things as legality. For example James Clapper, the Director of National Intelligence, ◊link[clapper]{lied under oath to the Senate}, without any consequence.
If I did that I'd be in prison for years.
}
}
◊leak["A search for you"]{
There's an internal search engine where N.S.A. employees can search through your emails, pictures, medical records and private Facebook messages. Like Google, but with the contents of your online life.
Snowden writes in ◊(book-link permanent-record-book) that it was common for N.S.A. employees to abuse this to spy on their girlfriends, ex-girlfriends or girls they were interested in. This includes sharing nude photos with their co-workers, which the girls either took themselves or photos the N.S.A. took by hacking their webcam. (Quite literally a stalker's wet dream.)◊mn{no-good-guys}
◊note-pos{no-good-guys}
◊ndef["no-good-guys"]{
This is a counterpoint to the argument that it's fine for the government or the police to have this data. The government or the police aren't full of only good people---there will always be bad ones somewhere.
}
}
}
◊(define recorded-phone-calls
(x-ref
"2019-12-09"
"https://www.newyorker.com/news/amy-davidson/the-n-s-a-verizon-scandal"
"Amy Davidson Sorkin (2013) The N.S.A.-Verizon Scandal"))
◊(define remotely-controlled-phones
(x-ref
"2019-12-09"
"https://www.theregister.co.uk/2015/10/06/gchqs_smurf_army_can_hack_smartphones_says_ed_snowden/"
"Simon Sharwood (2015) GCHQ's SMURF ARMY can hack smartphones, says Snowden. Again."))
◊(define big-tech-data
(x-ref
"2019-12-09"
"https://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html"
"Barton Gellman, Laura Poitras (2013) U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program"))
◊(define hack-big-tech
(x-ref
"2019-12-09"
"https://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html"
"Barton Gellman, Ashkan Soltani (2013) NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say"))
◊(define hack-merkel
(x-ref
"2019-12-09"
"https://www.spiegel.de/international/germany/cover-story-how-nsa-spied-on-merkel-cell-phone-from-berlin-embassy-a-930205.html"
"Von SPIEGEL (2013) The NSA's Secret Spy Hub in Berlin"))
◊(define (leak title #:url [url #f] . text)
(define xtitle (if url
(link url title)
title))
`(li ((class "leak"))
(div [[class "title"]] ,xtitle)
,@text))
As is praxis for authoritative regimes, this capability isn't used to protect the people of the state, but the state itself. Snowden's leaks were to the benefit of the people, yet he and other whistleblowers like him are ◊link[full-power]{facing the full power of the U.S. aimed at them}. This despite the U.S. court finding that ◊link[surveillance-illegal]{the mass surveillance program was illegal}.
You see, all this data is stored ◊em{forever}, just waiting to be used to nail you for a crime. And let's be clear: everyone has committed a crime. For example how many have ever illegally downloaded a movie or music? Or driven too fast? Not to mention ◊link[uk-stupid-laws]{old ridiculous laws} that are still in effect, such as the ◊link[metropolitan-police-act]{Metropolitan Police Act of 1839}, which makes carrying a plank along a pavement illegal in the U.K. (section 54).◊mn{jews}
◊ndef["jews"]{
It's not something wrong with being a Jew, so why would a record of all Jews living in a country be problematic?
The problem is when a group like the Nazis take control over the country (which only took a few years).
}
◊(define snowden-lawsuit
(x-ref
"2019-12-09"
"https://news.bitcoin.com/snowden-us-seizing-my-book-revenue-is-good-for-bitcoin/"
"Jamie Redman (2019) Snowden: US Seizing My Book Revenue is 'Good for Bitcoin'"))
◊(define full-power
(x-ref
"2019-12-09"
"https://theintercept.com/2019/08/04/whistleblowers-surveillance-fbi-trump/"
"Micah Lee (2019) The Metadata Trap: The Trump Administration Is Using the Full Power of the U.S. Surveillance State Against Whistleblowers"))
◊(define uk-stupid-laws
(x-ref
"2019-12-09"
"https://www.lawcom.gov.uk/app/uploads/2015/03/Legal_Oddities.pdf"
"Law Commission (2015) Legal Curiosities: Fact or Fable? (PDF)"))
◊(define metropolitan-police-act
(x-ref
"2019-12-09"
"https://www.legislation.gov.uk/ukpga/Vict/2-3/47/section/54"
"UK Legislation: Metropolitan Police Act 1839"))
◊(define clapper
(x-ref
"2019-12-09"
"https://www.youtube.com/watch?v=AGYn7ER5U_0"
"YouTube (2013) James Clapper (DNI) Lies to the Senate About the NSA (30 sec)"))
◊(define stasi
(x-ref
"2019-12-09"
"https://www.britannica.com/topic/Stasi"
"Joel D. Cameron: Stasi"))
◊(define stasi-repression
(x-ref
"2019-12-09"
"https://www.reuters.com/article/us-germany-wall-stasi/no-remorse-from-stasi-as-berlin-marks-fall-of-wall-idUSL118487020091104"
"Madeline Chambers (2009) No remorse from Stasi as Berlin marks fall of Wall"))
◊(define snowden-leaks
(x-ref
"2019-12-09"
"https://prefuse.org/edward-snowden-leaks"
"Bill Mann (2020) The Biggest Leaks Revealed by Edward Snowden"))
◊;link{https://mashable.com/2014/06/05/edward-snowden-revelations/?europe=true}
◊;link{https://prefuse.org/edward-snowden-leaks#the-nsa-can-demand-call-records-and-data-from-telephone-companies}
◊book-qt[permanent-record-book]{
Once the ubiquity of collection was combined with the permanency of storage, all any government had to do was select a person or a group to scapegoat and go searching---as I'd gone searching through the agency's files---for evidence of a suitable crime.
}
Now, Snowden lives in exile in Russia, where the black bags of the U.S. cannot reach. He recently released his memoir ◊(book-link permanent-record-book) that details his life leading up to the leaks. It's a great book, but the U.S. doesn't want you to read it. They even ◊link[snowden-lawsuit]{filed a lawsuit against him} and seized the revenue of the book.◊mn{post-lawsuit}
◊ndef["post-lawsuit"]{
As in response to the lawsuit his book shot up to the Amazon bestseller list. Snowden concluded that ◊link[snowden-good-for-bitcoin #:quote #t]{this is good for bitcoin}.
The ◊link[streisand]{Streisand effect} strikes again.
}
◊;Administration Using the Full Power of the Surveillance State on Whistleblowers
◊;◊link{https://news.ycombinator.com/item?id=20615084}
◊;
◊;◊link{https://news.bitcoin.com/snowden-us-seizing-my-book-revenue-is-good-for-bitcoin/}
◊;Supporting finanical privacy makes me an extremist
◊;◊link{https://www.coingecko.com/buzz/erik-voorhees-supporting-financial-privacy-extremist}
◊(define snowden-good-for-bitcoin
(x-ref
"2019-12-09"
"https://twitter.com/snowden/status/1174090027648868353?s=21"
"Edward Snowden (2019) in conclusion this is good for bitcoin"))
◊(define streisand
(x-ref
"2020-12-08"
"https://en.m.wikipedia.org/wiki/Streisand_effect"
"Wikipedia: Streisand effect"))
◊subhead{Fear is the mind-killer}
◊qt[#:author "Proverb"]{
The road to hell is paved with good intentions.
}
I think people often give up their privacy because of ◊strong{fear}. Since the ◊link[9-11]{September 11 attacks} we've been showered with fear-inducing news and propaganda, making our minds numb. This fear of terrorism (and murderers, pedophiles and other Bogeymen) has made us go to war, consent to torture (or "advanced interrogation") and give up our human rights.◊mn{retaliation}
◊ndef["retaliation"]{
Just to put the overreaction in perspective: 2,977 people died in the 9/11 terrorist attacks, but one million died because of the American retaliation.
◊(cite-book permanent-record-book)
That's like sentencing a shoplifter to death---a completely disproportionate response.
}
Terrorism is real and scary, there's no denying that. But our level of fear is irrational and would be better placed worrying about cars or unhealthy food---both of which kill more people than terrorism do. Yet fear is such a powerful emotion that it prevents us from thinking logically.
For example people may be willing to give up their privacy, because it might make it easier to catch terrorists. But if we try to compromise everyone's privacy, we'll jeopardize the personal security of the innocent, yet the terrorists will still have access to privacy through strong encryption (with strong encryption it's impossible for ◊em{anyone} to read what you write or access your data). We may think we're more secure, but we're really not.◊mn{tsa}
◊ndef["tsa"]{
The security checks at airports are annoying, ◊link[tsa-security-theater]{expensive and ineffective}. It's ◊def{security theater}.
}
◊qt[#:author "Philip R. Zimmermann"]{
If privacy is outlawed, only outlaws will have privacy.
}
◊note-pos[#:top -10]{tsa}
◊(define 9-11
(x-ref
"2019-12-09"
"https://en.wikipedia.org/wiki/September_11_attacks"
"Wikipedia: September 11 attacks"))
◊(define tsa-security-theater
(x-ref
"2019-12-09"
"https://www.aclu.org/sites/default/files/field_document/dem17-tsa_detection_report-v02.pdf"
"ACLU Foundation (2017) BAD TRIP Debunking the TSA’s ‘Behavior Detection’ Program (PDF)"))
◊subhead{You're the product}
It's not just the governments of the world who are collecting our data and violating our privacy. Companies of all sort do this too, but they sell it for profit.
Alphabet Inc. (company name of Google) and Facebook are two of the most valuable, richest and powerful companies in the world. Yet their main services---search and social networking---are completely free for us to use. So where do they make their money? And where's the product they're selling?
The product they're selling is ◊strong{you}.
They're selling knowledge about you. What you're searching for, what sites you visit, what products you buy, what places you visit, what friends you have and what you're talking about with your friends. With the combination of massive data collection and clever computer algorithms it's scary what they know about you.◊mn{predictions}
◊ndef["predictions"]{
It might be hard to come to terms with how the algorithms can predict your behavior. But it's really not that different from how Youtube, Netflix or Spotify recommends videos and songs to you.
Oh? He watched a video of a Japanese rock band? And he has listened to Raubtier? Then let's recommend ◊link[band-maid]{Band-Maid}, he'll love them! (I assume this is how YouTube decided to recommend me ◊link[band-maid]{Band-Maid}---the best rock band in the world.)
}
◊(define band-maid
(x-ref
"2019-12-09"
"https://www.youtube.com/user/BANDMAID"
"YouTube: BAND-MAID on YouTube"))
For example they probably know if you're gay or if you're pregnant (and if you are, they'll know if it was an accident, if your parents know about it and who is the father). They might also predict---with high confidence---if you're religious, even if you don't want anyone to know. Or who you're going to vote for in the ◊em{next} election or how likely you are to commit a crime.◊mn{thoughtcrime}
◊ndef["thoughtcrime"]{
◊def{Pre-crime}, like in the movie ◊link[minority-report]{Minority Report (2002)}, is the idea that you can predict someone committing a crime and catching them before they do.
◊def{Thoughtcrime}, as explored in the book ◊(book-link 1984-book), says that thoughts are criminal. Like entertaining a politically unacceptable thought.
While this is fiction, our technology is edging ever closer. Soon we might have killer robots going around streets enforcing laws on our predicted behaviour. (The U.S. already deploys killing drones, which kill civilians.)
}
◊(define minority-report
(x-ref
"2019-12-09"
"https://www.imdb.com/title/tt0181689/"
"IMDb: Minority Report (2002)"))
And it's not just a problem with Google and Facebook. An increasing number of companies are discovering how lucrative your data is. If you buy a Coca-Cola, the information that you bought it at this place and at this specific time might even be worth more than the Coca-Cola itself!
For example smart TVs come with a microphone ◊link[smart-tvs]{that listens to everything you do}, and the TV company then ◊link[vizo-surveillance]{sell the recordings to the highest bidder}. Credit card companies have full records of all purchases you make---◊link[google-mastercard]{which they sell to someone else}. Even the banks, who we assume should work for us, ◊link[bank-shares]{sell our data to third parties}.
What about your privacy? That's not something they care about, because they can sell it and make lot's of money.
◊(define smart-tvs
(x-ref
"2019-12-09"
"https://www.washingtonpost.com/technology/2019/09/18/you-watch-tv-your-tv-watches-back/"
"Geoffrey A. Fowler (2019) You watch TV. Your TV watches back."))
◊(define bank-shares
(x-ref
"2019-12-09"
"https://www.cbc.ca/news/business/banking-information-shared-with-third-parties-1.5102931"
"Rosa Marchitelli (2019) 'Is that even legal?': Companies may be sharing new credit or debit card information without you knowing"))
◊(define google-mastercard
(x-ref
"2019-12-09"
"https://www.bloomberg.com/news/articles/2018-08-30/google-and-mastercard-cut-a-secret-ad-deal-to-track-retail-sales"
" Mark Bergen, Jennifer Surane (2018) Google and Mastercard Cut a Secret Ad Deal to Track Retail Sales"))
◊(define vizo-surveillance
(x-ref
"2019-12-09"
"https://www.techdirt.com/articles/20190114/08084341384/vizio-admits-modern-tv-sets-are-cheaper-because-theyre-spying-you.shtml"
"Karl Bode (2019) Vizio Admits Modern TV Sets Are Cheaper Because They're Spying On You"))
◊;Credit cards have a privacy problem
◊;link{https://news.ycombinator.com/item?id=20800115}
◊subhead{Reclaiming our financial privacy}
◊; I don't have anything to hide
◊; https://www.privacytools.io/
◊; TED talk, very good
◊; https://www.ted.com/talks/glenn_greenwald_why_privacy_matters
The ◊def[great-man]{great man theory} of history says that most of history can be explained by the impact of great men. Julius Caesar, Genghis Khan and Hitler are examples of "great men". (They don't have to be good or even be men, just people who cause large changes.) If Edward Snowden will be considered a great man depends on the effects of his leaks; they might mark a turning point for government surveillance, and change the course of history, or they might be forgotten as a side note in the history books.◊mn{nothing-changed}
◊ndef["nothing-changed"]{
It's still uncertain how much will really change, but either way Snowden is my hero.
}
While the great man theory is interesting, wouldn't it be better to describe modern history using a ◊em{great technology theory}? For example the printing press, the internal combustion engine, the atomic bomb, the transistor and the internet have had great impact on history---greater than any single person I can think of.◊mn{invention}
◊ndef["invention"]{
Proponents of the great man theory might say that these are inventions of a great person. To which I'd say that they weren't the result of a single person, but of many small improvements over existing tech, made by countless of people.
}
So instead of looking for a great man to solve our privacy problems, maybe technology is our solution? With strong encryption we can keep our messages private and our data safe, and with the great innovation called tape we can prevent our webcams from spying on us.
So far we've had to surrender our privacy to gain access to digital payments and even to our own money. But nobody needs to know how much cryptocurrencies we have or what we do with them.◊mn[#:top -6]{bitcoin-worse} They can help us claw back some of that privacy---and isn't that pretty great?
◊ndef["bitcoin-worse"]{
Unfortunately Bitcoin is sometimes ◊link[privacy-challenge]{even worse for privacy than regular payments}, because you have a permanent record of all transactions open for all to see. There are other cryptocurrencies that hides the transaction details.
}
◊(define great-man
(x-ref
"2019-12-09"
"https://en.wikipedia.org/wiki/Great_man_theory"
"Wikipedia: Great man theory"))
◊(define shoulders-of-giants
(x-ref
"2019-12-09"
"https://en.wikipedia.org/wiki/Standing_on_the_shoulders_of_giants"
"Wikipedia: Standing on the shoulders of giants"))
◊(define signal
(x-ref
"2019-12-09"
"https://www.signal.org/"
"Signal, a private messaging app"))