The Unz Review • An Alternative Media Selection$
A Collection of Interesting, Important, and Controversial Perspectives Largely Excluded from the American Mainstream Media
 TeasersRaches' Political Proems
The Untouchable
Reach out and get in touch with me—if you at least minimally qualify.
Email This Page to Someone

 Remember My Information



=>

Bookmark Toggle AllToCAdd to LibraryRemove from Library • B
Show CommentNext New CommentNext New ReplyRead More
ReplyAgree/Disagree/Etc. More... This Commenter This Thread Hide Thread Display All Comments
AgreeDisagreeThanksLOLTroll
These buttons register your public Agreement, Disagreement, Thanks, LOL, or Troll with the selected comment. They are ONLY available to recent, frequent commenters who have saved their Name+Email using the 'Remember My Information' checkbox, and may also ONLY be used three times during any eight hour period.
Ignore Commenter Follow Commenter
Search Text Case Sensitive  Exact Words  Include Comments

The Big Data Soul-Market

A thousand times, I would rather be her than a Gmail user.  She still has some private thoughts.  (Jean-Léon Gérôme, Marché romain aux esclaves, c. 1884.)

A criss-crossing dragnet of corporate mass-surveillance and intelligence agency mass-surveillance perpetually sucks up the essence of you.  Your soul is stolen, filed away in a data warehouse, and held at the mercy of those who may wish to examine it, buy it and sell it, use and abuse it.  The mass-violation is enormous—indescribable.  And you probably do not even realize that it is happening to you.

If you fail to resist this—if you fail to reject it—then you are a slave of the soul subsisting in a global panopticon.  Your life, your personal relationships, and your very thoughts are not your own:  They are property owned by others, stored in databases and managed by robots.  You are soulless anthropoid livestock that exists for the pleasure and profit of your owners—and at their mercy.  A slave-girl seized in war and sold at auction has more inviolable dignity than you.

I am the free, the proud, the inviolable—the untouchable.  My soul belongs to me. ®

The Mass-Rape of Souls

What is best called a “soul”, if we avoid any mystical propositions of immaterial beings that cannot be observed?

Your innermost thoughts, your dreams, your most secret fears and hopes.  Your fantasies—and your most private realities.  Your closest and most intimate connections with other people.  Your own perceptions from the cradle to the grave, looking outwards from inside yourself—and looking into yourself, from within.

Your psyche.

Nowadays, you ask Google Search the secret thoughts and questions that you would never reveal to your spouse, your clergy, or your psychiatrist.  If you lie awake at three in the morning with some hidden preoccupation, and you want to put your mind at ease, you ask Google for the answers.  If you heard of some erotic diversion that you would never admit to intrigue you, and which you perhaps may not ever intend to do, you ask Google to sate your idle curiosity.  Your medical condition, your financial plans, and most all else about you is revealed to Google by your queries.

Google Search is the most powerful psychological interrogation and profiling tool ever invented.  The record of your queries gives Google a record of your thoughts, almost as if by mind-reading.

If you use Gmail, then Google also has a complete record of your intimate communications and your inviolable personal relationships.  And the same principle applies in different degree to any unencrypted, insecure email.  —And the same principle applies to all unencrypted electronic communications.

Imagine someone out there having a transcript of all your discussions with your wife or husband, your parents, your children, your best friends…  Then, realize that someone does have that, more or less.

Now, consider your phone.  You carry it everywhere.  Around 2012, I put on my “evil hat”, imagined being the NSA, and asked myself what the most important ways would be to watch everybody all the time.  One of my top answers:  Location.  My conclusion as such was vindicated by the Snowden revelations in 2013.

I mused that in modern times, a stereotypical psychotic delusion is the belief that the government or space aliens has implanted a person with a tracking chip—in the manner of tracking cattle.  Whereas now, in reality, the anthropoid herds voluntarily carry the tracking devices—and they even pay for the privilege of carrying a device which is not only a location-tracker, but a network-controllable bugging device.  Your phone can unobtrusively capture audio—and nowadays, video; and it can be controlled by hackers, whether those hackers are called “intelligence”, “police“, or “criminals”.  It also hooks you up to a 24/7 propaganda stream via the Facebook app, the Twitter app, and the apps or websites for your favorite sources of “news” and other entertainment.

Without exaggeration, you are choosing to carry with you the v2.0 upgrade of an Orwellian telescreen—with location-tracking.

Now, let me not even get started on the state of privacy on the Web; I must reserve that for future commentary.

I must emphasize that plutocratic corporate mass-surveillance, “surveillance capitalism”, is of even greater concern to me than intelligence agency mass-surveillance.  Of course, I am worried about the NSA, et al.  But what is worse, much worse in practice, is the unbounded hunger of surveillance capitalists to tap, track, trace, data-mine, and manipulate Big Data for commercial gain.  The tyrants of corrupt governments are primarily interested in preventing threats to the state—and to that end, they have at their disposal raw power beyond the wildest fantasies of Stalin’s NKVD.  The Big Data surveillance capitalists have an insatiate lust to steal the soul of each and every individual on Earth, because “data is [sic] the new oil”.  And the latter feed the former, too.  Every which way, for those who seek privacy on ideological (or even religious) grounds, or for a simple desire for human dignity, corporations are the primary threat.

The Hidden War

Against the thieves of souls, who rob you of your privacy and violate every intimate detail of your life, there is a hidden war, a Crypto-War, in which the free and the proud must use every tool at their disposal.  And it is not a war of “left” versus “right”.

Those who duly appreciated Philip Giraldi’s recent article on Julian Assange will be unsurprised to find me going full cypherpunk here.  By historical analogy hereto:  Assange and Timothy C. May were basically on “the same side” about privacy and encryption, even though May was an elitist and Assange is an egalitarian believer in democracy.  Although I will assuredly beat good old T. C. May hands down for political incorrectness, the same principle hereby applies.

To Touch the Untouchable

I believe in praxis.  Ideology must be lived.  The political is personal.

Thus, synthesizing the thoughts that I have expressed, plus my dream of establishing an intellectual aristocracy, I reach the following conclusions:

1. If I represent hereby any truth, I must be hard to get.  (That blog post on “Truth Wisdom” was originally the beginning of this post.)

2. My private communications must be kept private, as always they are:  My soul is inviolable.

This is consistent with my general policy in life.  I always want to make new friends—but quality is more important than quantity; and I am not desperate for fan mail.  I always encrypt all of my electronic communications, absolutely without exception, to the maximal extent that is feasible.  I dearly appreciate eloquent epistolary exchanges with people who are not stupid and not lazy.

Wherefore to reach me, you must at least minimally qualify.  My criteria:  A modicum of knowledge, or a modicum of effort to attain new knowledge.  Also, as another selection filter, my contact information is buried at the bottom of an essay where only my regular readers will find it, unless I “deep link” to it from elsewhere.

(Note that this policy may change.  Depending how my blog goes, for practical reasons, I may need to put out an email address someday.  If so, I will edit this paragraph, and the relevant sections below; but I will leave the rest hereof for historical reference.  Of course, I will always minimize or refuse unencrypted personal contact.)

Raches versus Email

Being so selective cuts spam, and makes email tolerable to me.  Whereas email is so disruptive that some people altogether eschew it.  Most famously, Professor Knuth, the scholar of computer science, has an essay on his site titled “Knuth versus Email”:

I have been a happy man ever since January 1, 1990, when I no longer had an email address.  I’d used email since about 1975, and it seems to me that 15 years of email is plenty for one lifetime.

Email is a wonderful thing for people whose role in life is to be on top of things.  But not for me; my role is to be on the bottom of things.  What I do takes long hours of studying and uninterruptible concentration.

[…]

`I don’t even have an e-mail address. I have reached an age where my main purpose is not to receive messages.' --- Umberto Eco, quoted in the New Yorker

A recent article in The Chronicle of Higher Education provocatively entitled, “Is Email Making Professors Stupid?” (February 12, 2019) is inspired by Knuth; and it opines:  “Email has become a kind of digital water torture for the scholar struggling to think without interruption.”

If I did not so treasure the secret exchange of encrypted letters, I may agree with Knuth.  I do mean letters.  Outside quick memoranda, I treat writing an email in the same manner as I treat writing an old-fashioned letter.  It is a good mental model for enjoying all the good characteristics of email, without its disruptive effects.

The Rules of Secure Communication

In brief hereby—to be elaborated in future Proems:

1. Never send anything in unencrypted email that you would not snailmail on a postcard.  This is a very old rule on the Internet.  The fact that so many people have not learned it makes me pessimistic for the future of the world.

2. All nonpublic communications should be encrypted all the time—no exceptions.  If you distinguish between “really private stuff” and “eh, I’m not encrypting this”, that has three problems:  You flag to any observer the particular messages that may be “interesting”.  You misjudge between the two categories—inevitably; you cannot always predict what may be “interesting” in the future.  And you develop bad habits.  You need to set yourself up so that encryption is convenient, so you can use it for everything.

3. First contact is oft the most important to secure.

I do mean that I encrypt everything all the time.  If I want to send one of my friends a cute cat photo, I encrypt it.  If I want to discuss recipes for chocolate-chip cookies, I encrypt it.  This takes no effort.  I am properly set up so that encryption is automatic; once I have a correspondent’s key in my system, all that I need to do is to keep out a vigilant eye to make sure that the system continues doing what it is supposed to do.

Contact

For the above-stated reasons, this is how to contact me:

  1. Use the below PGP key, which does not include an email address, to encrypt a message to me.  If you do not know how to use PGP/GPG, this is your opportunity to learn.  Do some research—or just wait for me to blog an introduction to PGP, as I intend sometime to do.  Don’t avoid it; if you don’t invest the modest effort to get up and running with PGP, then you may later suffer from what I call Greenwald’s Regret.
  2. Leave the encrypted message in a comment on this thread, with no other text.  Comments that contain any unencrypted text may be published.  Just slap in a blob of ASCII-armored PGP-encrypted gibberish—that’s it!
  3. I will receive your message in my moderation queue.  It should not be published—but if it is by accident, the damage is limited:  It is encrypted.  You should always assume that anything entered in the comment form is not private.
  4. Inside your encrypted message, be sure to include your email address and your own PGP key, so that I can reply.  I will not reply without encryption.  As an exception to the above rules, you may include your PGP key separately from your message if you find it too inconvenient to put inside; however, this is not preferable.  (Those who use Protonmail may omit their keys, which I can easily obtain myself; but Protonmail is not preferred with me, although it is acceptable.  I can also fetch keys via WKD; but if I have any difficulty finding your key, I will not reply.  I will not search keyservers.)
  5. Be sure to check your spam folder.  If I reply, I may reply from an anonymous throwaway address that tends to get messages eaten by a robot.  Spies who solicit contact here to discover my email address will be sad to discover:  I use no-value throwaway addresses, and I change them more often than most people change their socks.
  6. If you fail to encrypt your message properly (so I can’t decrypt it), or my reply is lost in the mail, then unfortunately, I cannot do anything about that.
  7. Unencrypted comments may be published, even if they express a request not to publish.  To contact me privately, you MUST use encryption.  DO NOT say anything unencrypted here that you would be upset to see published to the whole world!

PGP Key

Last modified:  2021-10-11.  Subject to change; always check back here for the current key, unless or until I declare a key stable.  For usage, read the above instructions.

pub   ed25519/0xA93EEAE36F060709 2021-10-11 [SC] [expires: 2022-10-11]
      Key fingerprint = 4BFE 86C5 2A9C AB1D 93D7  CD2E A93E EAE3 6F06 0709
uid                   [ultimate] Raches (https://www.unz.com/proems/untouchable/#contact)
sub   cv25519/0x708430F2EB7B8585 2021-10-11 [E] [expires: 2022-10-11]

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=GVOt
-----END PGP PUBLIC KEY BLOCK-----
 
Hide 17 CommentsLeave a Comment
Commenters to Ignore...to FollowEndorsed Only
Trim Comments?
    []
  1. Raches says: • Website

    —–BEGIN PGP MESSAGE—–

    hF4DcIQw8ut7hYUSAQdANvmlR9uMWA0YnXaHjT1Xv+f2XnLoK9laxCEefkacVE8w
    6p12//gB5HPWfQxlUBHTk4kquiJi0l68WnVX/hGLxOHGt3FiEUla1yYDvyYsEdpe
    0sBQAQxGe4e3hNLSXUAH93jhD4BIFa0nkIizl5gY5RuCtcej5/OyoCzYiRq26abm
    Z6lUpUPLVe8u+hdFGtEoYcIdgEfXkGxe66BWpqIYzcfyEcVgYzfyIG9aiOnIoyRV
    ttmcTVVEAb29CwpuhKOXxlhSRe50U9hfrcKa0gEUBVKFS4T4YOHnbv5vIV62IMGQ
    WZ4VvLFl89czDDdaqINpHSZv6pQnNVZCUvM3d4loLweqUANh3LSkPWNm4Dx/n4cF
    w75gtSx4MJ2e68BnGVI3IfV705q5qHRJc6vB19SDNjtitopRRgwoXtnjPBir2uBi
    fk+C+lgci1PqcKxj3/hlcyf/u2qybnwFUPzv8pp1Hsiu9Ic=
    =7oGf
    —–END PGP MESSAGE—–

  2. Are you based at Quantico or the Hoover building in DC?

    • LOL: Commentator Mike
    • Replies: @Raches
  3. S says:

    I am reminded of the famous 1960’s British TV series The Prisoner. Wouldn’t half surprise me someday if The Prisoner, along with 1984 and Animal Farm, are banned as ‘hatelit’ as they strike too close to home.

    ‘I am not a number! I am a free man!’

    https://en.m.wikipedia.org/wiki/The_Prisoner

  4. Raches says: • Website
    @SunBakedSuburb

    Are you based at Quantico or the Hoover building in DC?

    Neither.  Fort Meade.  Tailored Access Operations.  I have already exfiltrated all “interesting” data from your computer; and I am about to overwrite your massive porn collection with cute cat photos.  Muahahahahaha!

    ——————————

    This is weird.  In other forums, I have been accused of being from the NSA—but never the FBI.

    Now, why would the FBI promote the use of encryption?  They are the faction of the USG which is most vocally opposed to civilian use of encryption, in the mainstream media and in what they tell the U.S. Congress.  Your suggestion makes no sense.  At risk of derailing my own thread with conspiracy theories, I am curious about this leap of (lack of) logic.  Say what? ®

  5. Yevardian says:

    I think it’s rather a stretch at this point to believe anything on the internet at all is truly private. I’m not a tech-person, but it doesn’t seem at all of a stretch that each and every one of these ‘private’ and ‘encrypted’ methods of online communication simply exist to sort and lump together ‘interesting’ individuals from the herd.
    Even various methods of banning, threatened jailtime for use, and so on, can simply be seen as barriers of entry, its useful information for an agency to see if a person of interest is savy enough to use (say) Tor (it would still exclude most people on this site, crawling with conspiracy nuts as it is).

    More importantly, why should I (or almost anyone else) care about something over which I have no control over, have zero power to change, and has no direct impact on my life whatsoever?

    Counting people who regularly use the internet, that puts me among something like 2 billion people. Even narrowing down by various filters (country, age, ethnicity, expressed political views), that still puts me in the company of hundreds, if not hundreds of thousands.
    What are the chances some pajeet intern at the NSA, Five-Eyes, or some other agency actually reads my private online communication, and finds anything of interest whatsoever?
    Furthmore, why should I care? People stupid enough to detail concrete plans of overthrowing their government on the internet deserve to be put away for such incompetence. Universal, intrusive surveillance is here to stay, in the long run, it should only mean that states/human-societies (how long will there be a plural?) become more effective in organising themselves, to the benefit of everyone involved, except for the insane, the criminal, the incompetent and the retarded.
    Conceptual fads like racial egalitarianism and this LBBTQAXSIAJX% idiocy will either burn themselves out or be eliminated from outside, as they’re so self-evidently destructive and anti-competitive.

    Since the Industrial Revolution, the state became all-encompassing, and will only continue to become more so, at an increasing pace, well into the foreseeable future. I see no credible counterweight to this coming from anywhere (bitcoin? don’t make me laugh).

    Every single of your thoughts (and mine) ultimately came from somewhere else. And unless you’re a primitive from an African or Papuan jungle or an Andaman islander, it’s likely nearly everyone of these could be traced back to the state, either directly echoing it or as a reaction to it.

    Your unique, precious individuality is an illusion. A human only has any value or identity in their relation to others. You seem uncertain about your place in this regard, which is probably why behind the extreme bombasticity of all your writing, they all contain an undercurrent of fear.

    • Agree: Daniel Chieh
    • Replies: @Almost Missouri
  6. Max Payne says:

    Google didn’t capture my soul, it captured the virus it assumed was my soul.

    My trusty pirated Windows 7 has yet to fail me! “Yes To All” is my second favorite button next to “Ignore” (like all problems in life).

    Drunken posts and weak individuals hopped up on their own high-impact emotion (suspicion, lust, rage, envy) make for a poor source in psychological profiling. If anything it has skewed data negatively.

    My true fear is the conspiracy theory of “they want to control all computers, networked or not”.

    Thus the discussion of encryption is mute. While I would never buy an Apple product I am now hearing that end users are unable to replace parts inside their Apple as the serials numbers of individual parts are tied together (thus requiring Apple to reflash the board).

    I can’t take crypto people seriously because the hardware aspect is not secure:
    https://www.fsf.org/blogs/sysadmin/the-management-engine-an-attack-on-computer-users-freedom
    https://meltdownattack.com/

    No one talks about Intels management engine security holes. And that was only discovered 3-4 years ago. Did we all break out our AMD Athlon X2 CPUs from 20 years ago or something? Did everyone build an 8-bit graphic card on a bread board? Is the faith in ARM architecture rock solid these days? Do 3D printers make CPUs? They can’t even make the most important parts of a firearm (how useless, it’s rudimentary additive manufacturing….)

    You’re talking about securing a petrol source when we have no end-user infrastructure to build a car.

    Karlin is going on about Web 3.0 (there was a Web 1.1?) without touching once about the literal physical hardware all that software is running on (which is how he fell for Urbit).

    Whispering sweet nothings between each other over encrypted channels might make you feel like you have a big dong, but in reality it’s just a grown up version of what girls used to do in grade school with their “secret code language”. And worse it makes you a target. Is NSA looking at me and my questionable search habits or the guy who has an e-shrine of Goebbels and is encrypting all his messages (laden with twirling swastikas and dancing elephants no less)?

    I’m just saying… if I was an intel officer and two folders came by my desk it’s not hard to tell you which one I’ll process to schedule time on the brute force super computer decrypter

    I want to hear how the NSA was the one to develop SHA-2 (though I suspect you might write something on this if you are planning a how-to for PGP). I want to hear about BitCoin and the 51% attack. I want to hear about the security in low-level close-to-the-metal proprietary software that ALL consumer motherboards have (UEFI, BIOS, etc.) and how are they compromised?
    Tell us more about those “interesting websites” that are designed to identify “hard targets”. You seem like someone who is able to distinguish the BS from the less nutty-tasting BS.

    • Replies: @peterAUS
    , @Raches
  7. Begone Satan your time is nearly up.

    • LOL: Raches
    • Replies: @Raches
  8. Raches says: • Website
    @Jack McArthur

    So, I am Satan’s sockpuppet!  I did admit—nay, proclaim that I am arrayed in “‘devil’s wiles… devil’s wit and devil’s dress’”; and I quoted Milton’s Satan semi-approvingly in a 3,600-word anti-Christian polemic.

    Alas, to believe in the Christians’ devil, I would first need to believe in the Christians’ god.  My mind was born hermetically sealed against Christian faith, including its antithesis.  Therefore, I will just need to muse on Greek polytheistic myths whilst urging people to use PGP and Bitcoin—surely the devil’s tools, if you believe the sermons of various USG/Federal Reserve propagandists. ®

  9. peterAUS says:

    Got here as asked by a fellow from another thread.

    Just to say, on my way out, good comment, Yevardian.

    If I may say, very good comment, Max Payne.
    Re

    …I want to hear about the security in low-level close-to-the-metal proprietary software that ALL consumer motherboards have (UEFI, BIOS, etc.) and how are they compromised?…

    I HAVE read/seen presentation of a guy (and his small team..) about that.
    Can’t recollect the names from top my head; I am sure you can find him/them on the Web.

    Long story short, they’ve been able, apparently, to produce “open source and secure” hardware to make PC type device from.
    Problem: in small numbers, expensive and really slow. That effort, to be feasible for public, would require a tremendous capital input, which, itself, just can’t work in this increasing technocracy.
    And, again, if you had it that would “mark” you as “person of interest”. Haha…your folder does get picked up.
    Which opens another barrel of worms, some of an anaconda size. A step from IT security to physical, if you will.
    Including, if deemed necessary, a visit to one of:
    https://en.wikipedia.org/wiki/Extraordinary_rendition#CIA_participating_countries

  10. Doctor Lecter, I presume.

    Much too much about how we be, rather than why we be.

    Regards.

    The Truman Show

  11. @Yevardian

    Universal, intrusive surveillance is here to stay, in the long run, it should only mean that states/human-societies (how long will there be a plural?) become more effective in organising themselves, to the benefit of everyone involved

    Now why would you assume a silly thing like that?

  12. I must emphasize that plutocratic corporate mass-surveillance, “surveillance capitalism”, is of even greater concern to me than intelligence agency mass-surveillance. Of course, I am worried about the NSA, et al. But what is worse, much worse in practice, is the unbounded hunger of surveillance capitalists to tap, track, trace, data-mine, and manipulate Big Data for commercial gain. The tyrants of corrupt governments are primarily interested in preventing threats to the state—and to that end, they have at their disposal raw power beyond the wildest fantasies of Stalin’s NKVD. The Big Data surveillance capitalists have an insatiate lust to steal the soul of each and every individual on Earth, … Every which way, for those who seek privacy on ideological (or even religious) grounds, or for a simple desire for human dignity, corporations are the primary threat.

    I can’t quite agree with this. While both corporations and intelligence agencies surveil you in order to exploit you, for corporations, that exploitation is merely economic (and may inadvertently aid you), but for intel agencies, that exploitation is unlimited (and will never redound to your benefit).

    You express that corporations are stealing your soul by knowing stuff about you, but this sentiment seems a little odd coming from someone ostentatiously skeptical about monotheism. Whatever the truth or errors of monotheism (which was implicitly accepted at least by Aristotle, who was no dummy), they would seem to pale in comparison to the tribesman-tier superstition that passing a message through an algorithm results in the loss of the message writer’s soul.

    To take a very banal example, if I prefer swordfish to catfish and the surveillance algorithms of big data discern that fact, then … so what? I still prefer swordfish to catfish just as much as I did before, so I haven’t been changed, i.e., my soul is unaffected. A computer somewhere may now “know” (in quotes because I do not subscribe to the superstition that lumps of silicon and metal have sentience) my preference, but so what? When I order swordfish rather than catfish at the fishmonger, then the fishmonger too knows my preference, but he hasn’t stolen my soul by this knowledge, so how much less can an inanimate object have stolen my soul from this “know”ledge?

    There is one way, though, that corporations do pose a threat on par with intelligence agencies. That is that if an intelligence agency takes an interest in you, a quick and cheap way for them to get started is by buying all the available information about you from the corporate surveillance world, which will instantly provide them with a more complete picture than the NKVD would have had even about a very well studied target. But even so, that is only such a threat because the intel agencies are the bigger threat in the first place and corporations may serve as their handmaids. IMHO anyway.

    • Replies: @Raches
  13. Raches says: • Website
    @Almost Missouri

    Well, somebody does read the article!  I wrote a long rant in response to Max Payne, pointing out inter alia that he, who quotes GTA as if it were philosophy (!), and Yevardian, who is supposed to be literate, entirely missed this crucial point.  (I didn’t (yet?) publish it, because I am reluctant to publish my own rants—even if I was somewhat parodying Mr. Payne.)

    To avoid the scientifically unanswerable question of whether or not immaterial souls exist, I treat the term mythopoetically.  Even if we are all merely electrochemical wetware computing devices, a philosophical word is needed for the essence of a personality—ἡ ψῡχή, which may be studied by psychology, but which properly lives in the realm of the poet and the philosopher.  I far from alone in this type of usage, which is compatible with absolute atheism.  Cf. the word “spirit”, in the divers senses of “fighting spirit”, or “the spirit of the law” in contradistinction to its letter, or Zeitgeist, or many similar usages that do not necessarily imply or require any belief in immaterial things.

    To take a very banal example, if I prefer swordfish to catfish and the surveillance algorithms of big data discern that fact, then … so what?  […]  When I order swordfish rather than catfish at the fishmonger, then the fishmonger too knows my preference, but he hasn’t stolen my soul by this knowledge, so how much less can an inanimate object have stolen my soul from this “know”ledge?

    It is a very banal example.  Following it to its logical conclusion:  Is there anything that you do not tell the fishmonger?  Can the fishmonger peer into your private thoughts which you never tell anyone else (but which you may leak expressly or by implication to Google search!), your intimate moments, your bedroom habits, your reading list (no one knows the lengths to which I go to keep my reading list private), a complete 24/7 history of your physical location (do you carry a “phone”, a nice euphemism for “cattle-tracking device for anthropoid livestock”?), and otherwise all else about you?  Can the fishmonger gaze into your soul by psychological profiling?

    That is that if an intelligence agency takes an interest in you, a quick and cheap way for them to get started is by buying all the available information about you from the corporate surveillance world, which will instantly provide them with a more complete picture than the NKVD would have had even about a very well studied target.  But even so, that is only such a threat because the intel agencies are the bigger threat in the first place and corporations may serve as their handmaids.

    There is much truth to that.  (And just wait till I get to Cloudflare, which I just noticed is giving schnellandine trouble.)  I tend to split the two problems strategically, not from ignorance of the relation between them.

    In my not inconsiderable experience promoting privacy IRL at the grassroots level, “corrupt billionaires and giant multinational corporations are exploiting you” is a much more effective argument with average people than “the NSA”.  And since [0] state mass-surveillance is, as you implied, partly dependent on corporate mass-surveillance, and [1] even partly defeating pervasive corporate surveillance requires relatively easy, free or inexpensive measures that can also at least partly defeat NSA passive dragnet surveillance (thus requiring targeted attacks by TAO, etc.), attacking one problem effectively attacks the other.  My strategic subtleties may occasionally be discussed by me in the comments, but rarely the article. ®

  14. Raches says: • Website
    @peterAUS

    The “rant” that I said I didn’t publish earlier started with something directly related to RISC-V, and not entirely unrelated to SiFive, but much more about the problem of open hardware.  I suspect that Mr. Payne was trolling, because he went off about ARM without even mentioning RISC-V, he inserted a link about Meltdown/Spectre between discussion of Intel ME, and a few other whoppers that you seem to have missed; if he was not Slashdot-tier trolling, he is rather ignorant of this topic.  He bandies about tech jargon like a House fanboy uses medical jargon, and like Yevardian regurgitates inane psychobabble that T-L brainwashed him to use—LOL, I will get to him later, maybe.  At least Yevardian is widely read, even if he lacks the capacity for critical thought—let alone original thought; so, he occasionally says something interesting, and he would not quote GTA as if it were philosophy.

    The better parts of the “rant” are being reworked into a relatively brief blog post; but I put extra effort into those, even for a relative quickie, and my attentions have been absorbed with trying to defuse a likely ignition point for the Americans to foment World War Three (as a hot war). ®

    • Replies: @peterAUS
  15. peterAUS says:
    @Raches

    Well….FIRST….I find your style irritating. Put it on my temperament, character, background and age.

    BUT, I do recognize and accept that your types, sometimes, can provide bloody smart input.

    So, let’s try to be positive and work, briefly, together, here.
    If/when the mix of arrogance/quality input becomes irritating I’ll walk.

    You, in spite all all the input on this site so far which often, IMHO, is working for the “other” side, have come with THIS topic and my compliments for that.

    Personally, I believe that, on practical level, that topic is the most important to discuss on any “alt-site”. You, maybe just intuitively, recognized that.

    Or, I believe that being able to establish secure communication, in times ahead, between the people who are on the “alternative” to what’s coming, is CRITICAL

    For example, where I live, people on “our” side, “Scamdemic” wise, are flocking to use Telegram as communication tool. I have SOME reservations there.
    Ah, yes, “Scamdemic” wise; you believe the shit is real; I don’t. But, I guess we could agree that we both don’t like The Reset. CDBC, Social Credit, austerity etc. Good enough for me.

    So…..the owner of this pub failed, miserably, in that area. Now, how about you try to put together a topic, here, where knowledgeable people (I suspect lurkers mostly….) could provide some advice.
    A healthy debate about HOW to make that communication as safe and secure as possible in months ahead.

    You create a new post/comment and we go from there.
    If not working at least we’ve tried; we’ll have clear conscience.

    Ah, yes, and that “intellectual aristocracy”. An EXCELLENT idea. Compliments there too.

    What say you?

  16. Raches says: • Website
    @Max Payne

    Drunken posts and weak individuals hopped up on their own high-impact emotion (suspicion, lust, rage, envy) make for a poor source in psychological profiling.  If anything it has skewed data negatively.

    Protip:  Serious-minded people will judge you for that behavior, and may treat you accordingly.  If you want to alienate people, and solicit them to treat you as a drunkposter and a weak individual hopped up on high-impact emotion, then your prior initial approach to me and a three-second look over your comment history are both consistent with your goals.

    https://www.unz.com/proems/kxpq/#a-warning-to-trolls-you-are-doomed

    It also doesn’t help that you patently don’t know what you are talking about here.  I am not trying to show off, beyond what is necessary to brush away annoying nonsense.  I have already encountered one commentator who could wipe the floor with me on technical subjects, and another who seems maybe in my league.  I need more like that, and less techno-babble. ®

Current Commenter
says:

Leave a Reply - Moderated by Raches (Cancel Reply


 Remember My InformationWhy?
 Email Replies to my Comment
$
Submitted comments have been licensed to The Unz Review and may be republished elsewhere at the sole discretion of the latter
Commenting Disabled While in Translation Mode
Subscribe to This Comment Thread via RSS Subscribe to All Raches Comments via RSS
PastClassics
The Shaping Event of Our Modern World
Analyzing the History of a Controversial Movement
The Hidden Information in Our Government Archives