Reclaiming Territory in Cyberspace: #4 Communications
Making the most of your communications requires a solid understanding of how these tools work, and what are the common pitfalls and advantages.
The technocracy is highly motivated to take control of your means of communication. It’s no longer simply about who can promote messages to the masses, rather it’s increasingly focused on how you communicate with your inimate contacts.
Regardless of how the technical implementation turn out to be in detail: if the plans of the commission should be coming into action, the intrusion into privacy will be fairly deep. Just imagine for each and every message, regardless of a suspicion, to be automatically searched, evaluated and, in terms of a supposed match, reported — not only to the providers but straight to the authorities.
Inevitably, this would include countless perfectly normal, legitimate photos and videos that people send each other. If automatic detection, so far still unreliable, should raise alarm, the content would have to be checked by humans either way. Not only would this violate the right to privacy even more, but as well open another gateway that opens a possibility to be misused.
Public vs Private
There are all kinds of different choices you’ll want to make in terms of public vs private communication. For communications meant to be private you’re going to want to encrypt them in some way. It’s important to be clear with yourself about which communications are intended to be private or which are for the world to see. If you’re not careful they’ll often get mixed.
An N-Way street
Communications aren’t just about sending messages, it’s also about receiving them. It doesn’t matter if someone has a megaphone to the world if the systems in place have mechanisms to prevent that message from being received by anyone.