Using Technology to Deepen Democracy, Using Democracy to Ensure Technology Benefits Us All

Friday, April 22, 2005

Chapter Two: Markets from Math

The personal life of every individual is based on secrecy, and perhaps it is partly for that reason that civilized man [sic] is so nervously anxious that personal privacy should be respected. -– Anton Chekhov

It is insufficient to protect ourselves with laws, we need to protect ourselves with mathematics. -– Bruce Schneier

One: Weaving Nets, Smashing States

I. The "First Generation" of Cyberspatial Theory

II. Taking the First Generation Seriously

III. "California Ideology" Among the First Generation

Two: Arguments from Inevitability and from Desire

IV. Manifesto

V. What Is Manifest

VI. P2P, Not Anarchy

VII. Afterward

Three: Liber-Tech

VIII. Techniques of Secrecy

IX. Building Resistance In

X. e2e

Four: The Discretionary: Secrecy, Privacy, and Control

XI. From Privation to Discretion

XII. Description As Threat

XIII. Privacy Under Control

XIV. Digital Libertarianism

Go to Pancryptics Table of Contents

No comments: