Crypto Anarchy, Cyberstates, and Pirate Utopias Edited by Peter Ludlow

Total Page:16

File Type:pdf, Size:1020Kb

Crypto Anarchy, Cyberstates, and Pirate Utopias Edited by Peter Ludlow Ludlow cover 7/7/01 2:08 PM Page 1 Crypto Anarchy, Cyberstates, and Pirate Utopias Crypto Anarchy, Crypto Anarchy, Cyberstates, and Pirate Utopias edited by Peter Ludlow In Crypto Anarchy, Cyberstates, and Pirate Utopias, Peter Ludlow extends the approach he used so successfully in High Noon on the Electronic Frontier, offering a collection of writings that reflect the eclectic nature of the online world, as well as its tremendous energy and creativity. This time the subject is the emergence of governance structures within online communities and the visions of political sovereignty shaping some of those communities. Ludlow views virtual communities as laboratories for conducting experiments in the Peter Ludlow construction of new societies and governance structures. While many online experiments will fail, Ludlow argues that given the synergy of the online world, new and superior governance structures may emerge. Indeed, utopian visions are not out of place, provided that we understand the new utopias to edited by be fleeting localized “islands in the Net” and not permanent institutions. The book is organized in five sections. The first section considers the sovereignty of the Internet. The second section asks how widespread access to resources such as Pretty Good Privacy and anonymous remailers allows the possibility of “Crypto Anarchy”—essentially carving out space for activities that lie outside the purview of nation-states and other traditional powers. The Crypto Anarchy, Cyberstates, third section shows how the growth of e-commerce is raising questions of legal jurisdiction and taxation for which the geographic boundaries of nation- states are obsolete. The fourth section looks at specific experimental governance and Pirate Utopias structures evolved by online communities. The fifth section considers utopian and anti-utopian visions for cyberspace. Peter Ludlow is Associate Professor of Philosophy at the State University of New York at Stony Brook. editor Ludlow, Digital Communication series “An excellent book. Ludlow juxtaposes contrasting views in a way that amuses and enlightens.” —Amy S. Bruckman, College of Computing, Georgia Institute of Technology Cover images: © 2001 PhotoDisc, Inc. The MIT Press Massachusetts Institute of Technology Cambridge, Massachusetts 02142 http://mitpress.mit.edu 0-262-62151-7 ,!7IA2G2-gcbfbj!:t;K;k;K;k Crypto Anarchy, Cyberstates, and Pirate Utopias Digital Communication Edward Barrett, editor The Nurnberg Funnel: Designing Minimalist Instruction for Practical Computer Skill, John M. Carroll, 1990 Hypermedia and Literary Studies, edited by Paul Delany and George P. Landow, 1991 Rhetoric, Innovation, Technology: Case Studies of Technical Communication in Technology Transfers, Stephen Doheny-Farina, 1992 Sociomedia: Multimedia, Hypermedia, and the Social Construction of Knowledge, edited by Edward Barrett, 1992 The Digital Word: Text-Based Computing in the Humanities, edited by George P. Landow and Paul Delany, 1993 Contextual Media: Multimedia and Interpretation, edited by Edward Barrett and Marie Redmond, 1995 High Noon on the Electronic Frontier, Peter Ludlow, 1996 Forward through the Rearview Mirror: Reflections on and by Marshall McLuhan, edited by Paul Benedetti and Nancy DeHart, 1997 From Web to Workplace: Designing Open Hypermedia Systems, Kaj Grønb0k and Randall H. Trigg, 1999 Electric Rhetoric: Classical Rhetoric, Oralism, and a New Literacy, Kathleen E. Welch, 1999 Crypto Anarchy, Cyberstates, and Pirate Utopias, edited by Peter Ludlow, 2001 Crypto Anarchy, Cyberstates, and Pirate Utopias edited by Peter Ludlow The MIT Press Cambridge, Massachusetts London, England © 2001 Massachusetts Institute of Technology All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or informa- tion storage and retrieval) without permission in writing from the publisher. This book was set in Adobe Sabon in QuarkXPress by Asco Typesetters, Hong Kong. Printed and bound in the United States of America. Library of Congress Cataloging-in-Publication Data Crypto anarchy, cyberstates, and pirate utopias / edited by Peter Ludlow. p. cm. — (Digital communication) Includes bibliographical references and index. ISBN 0-262-12238-3 (hc: alk. paper)—ISBN 0-262-62151-7 (pbk: alk. paper) 1. Cyberspace—Social aspects. 2. Cyberspace—Political aspects. 3. Internet— Social aspects. 4. Internet—Political aspects. 5. Anarchy. 6. State, The. I. Ludlow, Peter. II. Series. HM851 .C78 2001 00-064597 per i nipoti Jay, Eliza, Robert, Stefanie, Giuliana, Daniela and in memory of John Calvin Robertson, who visited many Temporary Autonomous Zones in his 43 years Let us admit that we have attended parties where for one brief night a republic of gratified desires was attained. Shall we not confess that the politics of that night have more reality and force for us than those of, say, the entire U.S. Government? —Hakim Bey Contents Series Foreword xiii Preface xv About the Contributors xxi 1 New Foundations: On the Emergence of Sovereign Cyberstates and Their Governance Structures 1 Peter Ludlow I The Sovereignty of Cyberspace? 25 2 A Declaration of the Independence of Cyberspace 27 John Perry Barlow 3 Getting Our Priorities Straight 31 David Brin 4 United Nodes of Internet: Are We Forming a Digital Nation? 39 David S. Bennahum 5 HyperMedia Freedom 47 Richard Barbrook II Crypto Anarchy 59 6 The Crypto Anarchist Manifesto 61 Timothy C. May 7 Crypto Anarchy and Virtual Communities 65 Timothy C. May 8 A Cypherpunk’s Manifesto 81 Eric Hughes x Contents 9 The Future of Cryptography 85 Dorothy E. Denning 10 Afterword to “The Future of Cryptography” 103 Dorothy E. Denning 11 Re: Denning’s Crypto Anarchy 105 Duncan Frissell 12 Hiding Crimes in Cyberspace 115 Dorothy E. Denning and William E. Baugh Jr. III Shifting Borders: How VR Is Claiming Jurisdiction from RL 143 13 Law and Borders: The Rise of Law in Cyberspace 145 David R. Johnson and David G. Post 14 Anarchy, State, and the Internet: An Essay on Lawmaking in Cyberspace 197 David G. Post 15 Prop 13 Meets the Internet: How State and Local Government Finances Are Becoming Road Kill on the Information Superhighway 213 Nathan Newman IV The Emergence of Law and Governance Structures in Cyberspace 243 16 Virtual(ly) Law: The Emergence of Law in LambdaMOO 245 Jennifer L. Mnookin 17 “help manners”: Cyberdemocracy and Its Vicissitudes 303 Charles J. Stivale 18 Due Process and Cyberjurisdiction 329 David R. Johnson 19 Virtual Magistrate Project Press Release 339 20 Virtual Magistrate Issues Its First Decision 343 V Utopia, Dystopia, and Pirate Utopias 347 21 Utopia Redux 349 Karrie Jacobs Contents xi 22 The God of the Digerati 353 Jedediah S. Purdy 23 Californian Ideology 363 Richard Barbrook and Andy Cameron 24 Bit Rot 389 Mark Dery 25 The Temporary Autonomous Zone 401 Hakim Bey Appendix: Interview with Noam Chomsky on Anarchism, Marxism, and Hope for the Future 435 Kevin Doyle Name Index 451 Index of Corporations, Organizations, Agencies, and Other Groups 459 Subject Index 463 Series Foreword Digital communication is one of the most exciting, rapidly expanding fields of study and practice throughout the world, as witnessed by the increasing number of Web sites and users of the Internet, as well as pub- lication and use of multimedia CD-ROM titles in schools, homes, and corporate environments. In addition, Web and multimedia publications have created a vast secondary literature of scholarly analysis in a range of subject areas. Professional societies and degree-granting programs devoted to digital communication have steadily increased. And the lan- guage and concepts of digital life have become central in popular culture. In cyberspace the roles of writer and audience are no longer static but dynamic; the concept of text is no longer fixed but fluid. Computational technology has delivered us a powerful tool for the creation, presenta- tion, exchange, and annotation of a text (in words, images, video, and audio)—so powerful that we speak in terms of transparent and seamless information environments that integrate all media. We are witnessing a profound revolution in communication and learning in a post-Gutenberg world. The MIT Press series on digital communication will present advanced research into all aspects of this revolutionary change in our forms of expression, thought, and being. This research will be published in traditional book format or as Web sites or multimedia CD-ROM titles as demanded by content. As this series finds its expression in hard-copy or in digital format, it will seek to explore and define new genres of thought and expression offered by digital media. Edward Barrett Preface When I edited High Noon on the Electronic Frontier (MIT Press, 1996), my principle strategy was to include a number of nonacademic “rants and manifestos” that would raise philosophical issues in an interesting and provocative way. I explained the genesis of the strategy as follows (pp. xvii–xviii): In the fall of 1994 I taught an undergraduate course entitled “Philosophical Issues on the Electronic Frontier.” My plan was to lead with Julian Dibbell’s Village Voice article “A Rape in Cyberspace” and then move to more standard readings that might typically be taught in a course on computer ethics. Things began well enough, but the class slipped into a collective coma when we moved on to the standard academic readings in this area. Accordingly, I did what any reasonable person would do under the same circumstances—I sold out. I went back to assigning the more “in your face” rants and manifestos that are easy enough to find in cyberspace but virtually impossible to find in textbooks. When I turned to the more gonzo readings, the class woke up (which always helps when you are trying to teach something) and it actually began to think seriously about some of the deeper issues underlying these assigned electronic rants. This shouldn’t be surprising, really. Most of the academic writing on cyberspace is just awful. It either reeks of half-learned post-modern cant, or is a dense thicket of bad sociology.
Recommended publications
  • A Road Map for 21St Century Geography Education Assessment
    Editors Daniel C. Edelson A ROAD MAP Richard J. Shavelson Jill A. Wertheim FOR 21st CENTURY GEOGRAPHY EDUCATION Assessment Recommendations and Guidelines for Assessment in Geography Education A Report from the Assessment Committee of the Road Map for 21st Century Geography Education Project Road Map for 21st Century Geography Education Project Assessment Recommendations and Guidelines for Assessment in Geography Education Editors Daniel C. Edelson, Richard J. Shavelson, Jill A. Wertheim National Geographic Society Washington, DC A Report from the Assessment Committee of the Road Map for 21st Century Geography Education Project 2 of 75 This report was created by the Road Map for 21st Century The National Geographic Society is one of the world’s largest nonprofit scientific and Geography Education Project. educational organizations. Founded in 1888 to “increase and diffuse geographic knowledge,” the Society’s mission is to inspire people to care about the planet. It reaches more than 400 Road Map for 21st Century Geography Education Project million people worldwide each month through its official journal, National Geographic, and other magazines; National Geographic Channel; television documentaries; music; radio; Daniel C. Edelson, Principal Investigator films; books; DVDs; maps; exhibitions; live events; school publishing programs; interactive Virginia M. Pitts, Project Director media; and merchandise. National Geographic has funded more than 10,000 scientific research, conservation and exploration projects and supports an education program promoting The Road Map for 21st Century Geography Education Project is a collaboration between the geographic literacy. National Geographic Society, the Association of American Geographers, the National Council for Geographic Education, and the American Geographical Society. The views expressed in the report The Association of American Geographers (AAG) is a nonprofit scientific, research, and are those of the authors and do not necessarily reflect the views of these organizations.
    [Show full text]
  • Touring Exhibitions Programme 2020 – 22
    touring exhibitions programme 2020 – 22 designmuseum.org Design Museum Touring Programme Contents The programme was set up in 2002 with the aim of bringing Exhibitions design exhibitions to audiences around the UK and internationally. 4 Material Tales Since then, the museum has organised more than 130 tours to 6 Sneakers Unboxed 104 venues in 31 countries worldwide. 8 Waste Age 10 Football The Design Museum’s touring exhibitions range in size from 12 Got to Keep On 150 to 1000 square metres and encompass all areas of design – 14 Moving to Mars architecture, fashion, graphics, product, digital and more. 16 Breathing Colour by Hella Jongerius 18 Exhibition Catalogues About the Design Museum 24 Terms and Conditions 25 Contacts The Design Museum is the world’s leading museum devoted to architecture and design. Its work encompasses all elements of design, including fashion, product and graphic design. Since it opened its doors in 1989, the museum has displayed everything from an AK-47 to high heels designed by Christian Louboutin. It has staged over 100 exhibitions, welcomed over five million visitors and showcased the work of some of the world’s most celebrated designers and architects including Paul Smith, Zaha Hadid, Jonathan Ive, Miuccia Prada, Frank Gehry, Eileen Gray and Dieter Rams. On 24 November 2016, the Design Museum relocated to Kensington, West London. Architect John Pawson converted the interior of a 1960s modernist building to create a new home for the Design Museum, giving it three times more space in which to show a wider range of exhibitions and significantly extend its learning programme.
    [Show full text]
  • A History of End-To-End Encryption and the Death of PGP
    25/05/2020 A history of end-to-end encryption and the death of PGP Hey! I'm David, a security engineer at the Blockchain team of Facebook (https://facebook.com/), previously a security consultant for the Cryptography Services of NCC Group (https://www.nccgroup.com). I'm also the author of the Real World Cryptography book (https://www.manning.com/books/real-world- cryptography?a_aid=Realworldcrypto&a_bid=ad500e09). This is my blog about cryptography and security and other related topics that I Ûnd interesting. A history of end-to-end encryption and If you don't know where to start, you might want to check these popular the death of PGP articles: posted January 2020 - How did length extension attacks made it 1981 - RFC 788 - Simple Mail Transfer Protocol into SHA-2? (/article/417/how-did-length- extension-attacks-made-it-into-sha-2/) (https://tools.ietf.org/html/rfc788) (SMTP) is published, - Speed and Cryptography the standard for email is born. (/article/468/speed-and-cryptography/) - What is the BLS signature scheme? (/article/472/what-is-the-bls-signature- This is were everything starts, we now have an open peer-to-peer scheme/) protocol that everyone on the internet can use to communicate. - Zero'ing memory, compiler optimizations and memset_s (/article/419/zeroing-memory- compiler-optimizations-and-memset_s/) 1991 - The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations The US government introduces the 1991 Senate Bill 266, (/article/461/the-9-lives-of-bleichenbachers- which attempts to allow "the Government to obtain the cat-new-cache-attacks-on-tls- plain text contents of voice, data, and other implementations/) - How to Backdoor Di¸e-Hellman: quick communications when appropriately authorized by law" explanation (/article/360/how-to-backdoor- from "providers of electronic communications services di¸e-hellman-quick-explanation/) and manufacturers of electronic communications - Tamarin Prover Introduction (/article/404/tamarin-prover-introduction/) service equipment".
    [Show full text]
  • The Only Ones Free Encyclopedia
    FREE THE ONLY ONES PDF Carola Dibbell | 344 pages | 10 Mar 2015 | Two Dollar Radio | 9781937512279 | English | Canada The Only Ones - Wikipedia More Images. Please enable Javascript to take full advantage of our site features. Edit Artist. The Only Ones were an influential British rock and roll band in The Only Ones late s who were associated with punk rock, yet straddled the musical territory in between punk, power pop and hard rock, with noticeable influences from psychedelia. They are best known for the song " Another Girl, Another Planet ". Viewing All The Only Ones. Data Quality Correct. Show 25 50 Refresh. Reviews Add Review. Artists I The Only Ones seen live by lancashirearab. Artists in My LP Collection by sillypenta. Master Release - [Help] Release Notes: optional. Submission Notes: optional. Save Cancel. Contained Releases:. The Only Ones Album 20 versions. Sell This Version. Even Serpents Shine Album 15 versions. Baby's Got A Gun Album 24 versions. Remains Comp, EP 6 versions. Closer Records. Live Album 8 versions. Mau Mau Records. The Peel Sessions Album Album 8 versions. Strange Fruit. The Big Sleep Album 5 versions. Jungle Records. Windsong International. Live In Chicago Album 2 versions. Alona's Dream RecordsRegressive Films. Lovers Of Today 2 versions. Vengeance Records 2. Another Girl, Another Planet Single 5 versions. You've Got To Pay Single 3 versions. Fools Single 5 versions. Trouble In The World The Only Ones 8 versions. Special View Comp, Album 11 versions. Alone In The Night Comp 2 versions. The The Only Ones Story Comp 5 versions. ColumbiaColumbia. Hux Records.
    [Show full text]
  • Battle of the Clipper Chip - the New York Times
    Battle of the Clipper Chip - The New York Times https://www.nytimes.com/1994/06/12/magazine/battle-of-the-clipp... https://nyti.ms/298zenN Battle of the Clipper Chip By Steven Levy June 12, 1994 See the article in its original context from June 12, 1994, Section 6, Page 46 Buy Reprints VIEW ON TIMESMACHINE TimesMachine is an exclusive benefit for home delivery and digital subscribers. About the Archive This is a digitized version of an article from The Times’s print archive, before the start of online publication in 1996. To preserve these articles as they originally appeared, The Times does not alter, edit or update them. Occasionally the digitization process introduces transcription errors or other problems; we are continuing to work to improve these archived versions. On a sunny spring day in Mountain View, Calif., 50 angry activists are plotting against the United States Government. They may not look subversive sitting around a conference table dressed in T-shirts and jeans and eating burritos, but they are self-proclaimed saboteurs. They are the Cypherpunks, a loose confederation of computer hackers, hardware engineers and high-tech rabble-rousers. The precise object of their rage is the Clipper chip, offically known as the MYK-78 and not much bigger than a tooth. Just another tiny square of plastic covering a silicon thicket. A computer chip, from the outside indistinguishable from thousands of others. It seems 1 of 19 11/29/20, 6:16 PM Battle of the Clipper Chip - The New York Times https://www.nytimes.com/1994/06/12/magazine/battle-of-the-clipp..
    [Show full text]
  • Philip Roth's Confessional Narrators: the Growth of Consciousness
    Loyola University Chicago Loyola eCommons Dissertations Theses and Dissertations 1979 Philip Roth's Confessional Narrators: The Growth of Consciousness. Alexander George Loyola University Chicago Follow this and additional works at: https://ecommons.luc.edu/luc_diss Part of the English Language and Literature Commons Recommended Citation George, Alexander, "Philip Roth's Confessional Narrators: The Growth of Consciousness." (1979). Dissertations. 1823. https://ecommons.luc.edu/luc_diss/1823 This Dissertation is brought to you for free and open access by the Theses and Dissertations at Loyola eCommons. It has been accepted for inclusion in Dissertations by an authorized administrator of Loyola eCommons. For more information, please contact [email protected]. This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License. Copyright © 1979 Alexander George PHILIP ROTH'S CONFESSIONAL NARRATORS: THE GROWTH OF' CONSCIOUSNESS by Alexander George A Dissertation Submitted to the Faculty of the Graduate School of Loyola University of Chicago in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy May 1979 ACKNOWLEDGE~£NTS It is a singular pleasure to acknowledge the many debts of gratitude incurred in the writing of this dissertation. My warmest thanks go to my Director, Dr. Thomas Gorman, not only for his wise counsel and practical guidance, but espec~ally for his steadfast encouragement. I am also deeply indebted to Dr. Paul Messbarger for his careful reading and helpful criticism of each chapter as it was written. Thanks also must go to Father Gene Phillips, S.J., for the benefit of his time and consideration. I am also deeply grateful for the all-important moral support given me by my family and friends, especially Dr.
    [Show full text]
  • Reusdigital.Cat Us Porta Cultura
    Cap de Setmana | Reusdigital.cat | Actualitzat el 20/08/2021 a les 08:00 Reusdigital.cat us porta cultura Kalifat és la recomanació d'Adrià de las Heras per al cap de setmana | Netflix Com cada cap de setmana, els periodistes de Reusdigital.cat hem seleccionat per a tots vosaltres, amics i lectors, un tast de la cultura que aquests dies ens fa gaudir a redacció. Parlem, com és habitual, de llibres, de discos i de pel·lícules. Esperem que siguin del vostre gust i que, si us complauen, les feu córrer. Alba Cartanyà recomana "El secret del meu turbant" Davant la greu situació que està vivint l'Afganistan amb el retorn dels talibans, m'ha vingut al cap un llibre que vaig llegir ja fa un temps. Es tracta d'El secret del meu turbant, de l'escriptora Nadia Ghulam (Kabul, 1985), que explica la història real (i dura) de l'autora. Amb tan sols vuit anys, va quedar malferida per l'impacte d'una bomba i en sortir de l'hospital, dos anys més tard, el règim talibà s'havia instaurat al seu país. Per fer front a totes les prohibicions a què estava subjecta pel fet de ser dona, Ghulam es va fer passar per un noi durant deu anys per poder portar un sou a casa. El podeu adquirir aquí (https://www.grup62.cat/llibre-el-secret-del-meu-turbant/96140) . https://www.reusdigital.cat/noticia/86789/reusdigital-us-porta-cultura Pagina 1 de 4 Marc Busquets recomana la sèrie "Homecoming" Un cop l'espectador descobreix que rere Homecoming hi ha els responsables de l'estimulant Mr.
    [Show full text]
  • Pirate and Hacking Speak Because Your Communicating with the World, Tell Them What You Think
    Pirate and Hacking Speak Because your communicating with the world, tell them what you think.... ----------------------------------------------------------------------- Afrikaans Poes / Doos - Pussy Fok jou - Fuck you Jy pis my af - You're pissing me off Hoer - Whore Slet - Slut Kak - Shit Poephol - Asshole Dom Doos - Dump Pussy Gaan fok jouself - Go fuck yourself ------------------------------------------------------------------------ Arabic Koos - cunt. nikomak - fuck your mother sharmuta - whore zarba - shit kis - vagina zib - penis Elif air ab tizak! - a thousand "dicks" in your ass! kisich - pussy Elif air ab dinich - A thousand dicks in your religion Mos zibby! - Suck my dick! Waj ab zibik! - An infection to your dick! kelbeh - bitch (lit a female dog) Muti - jackass Kanith - Fucker Kwanii - Faggot Bouse Tizi - Kiss my ass Armenian Aboosh - Stupid Dmbo, Khmbo - Idiot Myruht kooneh - Fuck your mother Peranuht shoonuh kukneh - The dog should shit in your mouth Esh - Donkey Buhlo (BUL-lo) - Dick Kuk oudelic shoon - Shit eating dog Juge / jugik - penis Vorig / vor - ass Eem juges bacheek doer - Kiss my penis Eem voriga bacheek doer - Kiss my ass Toon vor es - You are an ass Toon esh es - You are a jackass Metz Dzi-zik - Big Breasts Metz Jugik - Big penis ------------------------------------------------------------------------ Bengali baing chood - sister fucker chood - fuck/fucker choodmarani - mother fucker haramjada - bastard dhon - dick gud - pussy khanki/maggi - whore laewra aga - dickhead tor bapre choodi - fuck your dad ------------------------------------------------------------------------
    [Show full text]
  • State of the Art in Lightweight Symmetric Cryptography
    State of the Art in Lightweight Symmetric Cryptography Alex Biryukov1 and Léo Perrin2 1 SnT, CSC, University of Luxembourg, [email protected] 2 SnT, University of Luxembourg, [email protected] Abstract. Lightweight cryptography has been one of the “hot topics” in symmetric cryptography in the recent years. A huge number of lightweight algorithms have been published, standardized and/or used in commercial products. In this paper, we discuss the different implementation constraints that a “lightweight” algorithm is usually designed to satisfy. We also present an extensive survey of all lightweight symmetric primitives we are aware of. It covers designs from the academic community, from government agencies and proprietary algorithms which were reverse-engineered or leaked. Relevant national (nist...) and international (iso/iec...) standards are listed. We then discuss some trends we identified in the design of lightweight algorithms, namely the designers’ preference for arx-based and bitsliced-S-Box-based designs and simple key schedules. Finally, we argue that lightweight cryptography is too large a field and that it should be split into two related but distinct areas: ultra-lightweight and IoT cryptography. The former deals only with the smallest of devices for which a lower security level may be justified by the very harsh design constraints. The latter corresponds to low-power embedded processors for which the Aes and modern hash function are costly but which have to provide a high level security due to their greater connectivity. Keywords: Lightweight cryptography · Ultra-Lightweight · IoT · Internet of Things · SoK · Survey · Standards · Industry 1 Introduction The Internet of Things (IoT) is one of the foremost buzzwords in computer science and information technology at the time of writing.
    [Show full text]
  • Mirrorshade Women: Feminism and Cyberpunk
    Mirrorshade Women: Feminism and Cyberpunk at the Turn of the Twenty-first Century Carlen Lavigne McGill University, Montréal Department of Art History and Communication Studies February 2008 A thesis submitted to McGill University in partial fulfilment of the requirements of the degree of Doctor of Philosophy in Communication Studies © Carlen Lavigne 2008 2 Abstract This study analyzes works of cyberpunk literature written between 1981 and 2005, and positions women’s cyberpunk as part of a larger cultural discussion of feminist issues. It traces the origins of the genre, reviews critical reactions, and subsequently outlines the ways in which women’s cyberpunk altered genre conventions in order to advance specifically feminist points of view. Novels are examined within their historical contexts; their content is compared to broader trends and controversies within contemporary feminism, and their themes are revealed to be visible reflections of feminist discourse at the end of the twentieth century. The study will ultimately make a case for the treatment of feminist cyberpunk as a unique vehicle for the examination of contemporary women’s issues, and for the analysis of feminist science fiction as a complex source of political ideas. Cette étude fait l’analyse d’ouvrages de littérature cyberpunk écrits entre 1981 et 2005, et situe la littérature féminine cyberpunk dans le contexte d’une discussion culturelle plus vaste des questions féministes. Elle établit les origines du genre, analyse les réactions culturelles et, par la suite, donne un aperçu des différentes manières dont la littérature féminine cyberpunk a transformé les usages du genre afin de promouvoir en particulier le point de vue féministe.
    [Show full text]
  • The Internet Is a Semicommons
    GRIMMELMANN_10_04_29_APPROVED_PAGINATED 4/29/2010 11:26 PM THE INTERNET IS A SEMICOMMONS James Grimmelmann* I. INTRODUCTION As my contribution to this Symposium on David Post’s In Search of Jefferson’s Moose1 and Jonathan Zittrain’s The Future of the Internet,2 I’d like to take up a question with which both books are obsessed: what makes the Internet work? Post’s answer is that the Internet is uniquely Jeffersonian; it embodies a civic ideal of bottom-up democracy3 and an intellectual ideal of generous curiosity.4 Zittrain’s answer is that the Internet is uniquely generative; it enables its users to experiment with new uses and then share their innovations with each other.5 Both books tell a story about how the combination of individual freedom and a cooperative ethos have driven the Internet’s astonishing growth. In that spirit, I’d like to suggest a third reason that the Internet works: it gets the property boundaries right. Specifically, I see the Internet as a particularly striking example of what property theorist Henry Smith has named a semicommons.6 It mixes private property in individual computers and network links with a commons in the communications that flow * Associate Professor, New York Law School. My thanks for their comments to Jack Balkin, Shyam Balganesh, Aislinn Black, Anne Chen, Matt Haughey, Amy Kapczynski, David Krinsky, Jonathon Penney, Chris Riley, Henry Smith, Jessamyn West, and Steven Wu. I presented earlier versions of this essay at the Commons Theory Workshop for Young Scholars (Max Planck Institute for the Study of Collective Goods), the 2007 IP Scholars conference, the 2007 Telecommunications Policy Research Conference, and the December 2009 Symposium at Fordham Law School on David Post’s and Jonathan Zittrain’s books.
    [Show full text]
  • Privacy-Enhancing Technologies for the Internet
    Privacy-enhancing technologies for the Internet Ian Goldberg David Wagner Eric Brewer University of California, Berkeley iang,daw,brewer ¡ @cs.berkeley.edu Abstract ing privacy issues on the Internet, and Section 3 provides some relevant background. We then discuss Internet pri- The increased use of the Internet for everyday activi- vacy technology chronologically, in three parts: Section 4 ties is bringing new threats to personal privacy. This pa- describes the technology of yesterday, Section 5 explains per gives an overview of existing and potential privacy- today’s technology, and Section 6 explores the technology enhancing technologies for the Internet, as well as moti- of tomorrow. Finally, we conclude in Section 7. vation and challenges for future work in this field. 2. Motivation 1. Introduction The threats to one’s privacy on the Internet are two-fold: your online actions could be (1) monitored by unauthorized Recently the Internet has seen tremendous growth, with parties and (2) logged and preserved for future access many the ranks of new users swelling at ever-increasing rates. years later. You might not realize that your personal infor- This expansion has catapulted it from the realm of academic mation has been monitored, logged, and subsequently dis- research towards new-found mainstream acceptance and in- closed; those who would compromise your privacy have no creased social relevance for the everyday individual. Yet incentive to warn you. this suddenly increased reliance on the Internet has the po- The threat of long-term storage and eventual disclosure tential to erode personal privacies we once took for granted. of personal information is especially acute on the Internet.
    [Show full text]