Skip to main content

Songs on the Security of Networks
a blog by Michał "rysiek" Woźniak

HOWTO: effectively argue against Internet censorship ideas

This is an ancient post, published more than 4 years ago.

As such, it might not anymore reflect the views of the author or the state of the world. It is provided as historical record.

During last few years I have been involved in arguing against several attempts at introducing Internet censorship in Poland. Some of these where very local and went almost unnoticed outside Poland (like Rejestr Stron i Usług Niedozwolonych – the Register of Unlawful Websites and Services, in 2010); some where a part of a larger discussion (like the implementation debate around EU directives, that allowed, but not mandated, introducing child porn filters in EU member states); one made a huge splash around the world (I write about anti-ACTA campaign efforts here).

At this point I have gathered quite some experience in this. Due to censorship ideas gaining support even in apparently democratic countries I have decided it’s time to get it all in one place for others to enjoy.

The Ground Rules

There are some very important yet simple things one has to keep in mind when discussing censorship ideas. They can be best summarized by an extended version of Hanlon’s Razor:

Never attribute to malice that which is adequately explained by incompetence, laziness or stupidity.

More often than not the fact that somebody proposes or supports Internet censorship is not a result of malicious intent – however tempting such an assumption might be. Usually such support stems from the fact that people (including policymakers):

  • do not understand how Internet works,
  • do not see the connection between their idea and censorship,
  • do not grasp the technical problems and the cost of implementing such ideas,
  • do not see nor understand the danger of implementing them.

There are two areas one has to win in in order to have a chance of striking down such ideas:

  • logical argumentation based on technical issues;
  • purely emotional public debate.

The former is the easier one, and can give a good basis for the latter one – which is the endgame, the crucial part of winning such arguments.

The Adversaries

There are usually five main groups of people that one has to discuss with in such a debate:

  • politicians;
  • civil servants;
  • law enforcement, uniformed and secret services;
  • genuinely involved (if sometimes misguided) activists;
  • business lobbyists.

There is also a sixth, crucial group that has to be swayed to win: the general public. To communicate with that group, you also need the media.


Politicians are very often the first to call for Internet censorship, and as a rule are in it for short-term political gain, not for long-term social change. The social change bit is just an excuse, the real reason why they float such ideas is more often then not politics and gaining popular support or getting their names out in the mainstream media.

Sometimes it’s enough to convince them personally, sometimes what is needed is the only argument a politician understands always – an appeal to the authority of the general public, that needs to be vocal against censorship. It is usually not wise to assume they have malicious intent (i.e. stifling opposition), this only complicates discussing with them.

Civil servants usually do not have strong feelings one way or the other, or at least they are not allowed to show them; they do what their superiors (the politicians) tell them to do. There is no gain in alienating them – if you get militant or hostile towards them, they might then start actively supporting the other side. They are very often not technical, they might not understand the intricacies of the technology involved; they also might not grasp or see the civil rights implications.

Law enforcement, uniformed and special services treat such ideas as a power grab or at least a chance to get a new tool for doing their jobs. They usually understand the technical issues, and usually don’t care about the civil rights issues involved. They see themselves as the defenders of law and order, and implicitly assume that the end justifies the means – at least in the context of Internet censorship and surveillance. They will not get swayed by any arguments, but do not usually use emotional rhetoric.

Pro-censorship activists feel very strongly about some particular social issue (child porn; gambling; porn in general; etc.) and believe very deeply that Internet censorship is a good solution. They have a very concrete agenda and it is very hard to sway them, but it is possible and worth a try. One should not assume malicious intent on their part, they genuinely feel that Internet censorship would bring capital-G Good to the world.

They usually do not understand the technical issues nor costs involved in implementing such ideas, although they might understand the civil rights issues. If they do not grasp them, explaining these to them might be a very good tactic. If they do, they might make a conscious choice of prioritising values (i.e. “one child that does not see porn on the Internet justifies a small infringement of freedom of speech”).

When made aware of the costs of implementation, they will claim that “no price is too big to pay”.

Business lobbyists tend to be present on both sides. The lobbyists for the ISPs will fight Internet censorship, as it means higher costs of doing business for them – however, as soon as there are cash incentives on the table (i.e. public money for implementing the solutions), many will withdraw their opposition.

There are usually not many pro-censorship lobbyists, at least not on public meetings. They are not possible to sway, and will support their position with a lot of “facts”, “fact sheets”, “reports”, etc., that after closer consideration will turn to be manipulative, to say the least. Taking a close look at their arguments and being prepared to strike them one by one tends to be an effective tactic, if resource-intensive. It might be possible, however, to dispel first few “facts” supplied by them and use that as a reason to dismiss the rest of their position.

General public is easily swayed by emotional arguments – like “think of the children”. However, due to the nature of these and the fact that the general public does not, en masse, understand technical issues involved, it is not easy to make a case against Internet censorship, especially if the public is not at least a bit opposed to censorship and surveillance in general.

It is, nevertheless, crucial to have the public on your side, and for that one needs strong emotional arguments, and very strong factual, technical arguments to weaken the emotional pro-censorship arguments.

In order to be able to communicate with the general public you need media. It is crucial to have high-quality press releases, with all the information needed provided within (so that it is as easy for the media as possible to run with the material).

It is also very important to remember that media will distort, cut, twist information and quotes, and take them out of context. This, also, should not usually be attributed to malice, but to the way modern media work, and to lack of technical expertise among journalists. Hence, the language has to be thought-through and as clear (and as easy and accessible for the casual reader) as possible. Or more.

Media communiques should be short, succint and to-the-point. This at the same time helps them being understood by the general public, makes it easier for the media to run the material and makes it harder to distort it.

When communicating with the media it is also helpful to try and keep political neutrality, by focusing on the issues and not on party membership nor programmes; and to provide actionable items from time to time, for example open letters with a specific and unambiguous questions to the pro-censorship actors regarding legality, costs, technical issues, civil rights doubts, etc., to which (if run by the media) the actors will be compelled to answer.


Each of these groups, and often each of the actors involved, needs to be considered separately.

Each may be possible to sway with different arguments and in different contexts – public meetings, with press and media, will put pro-censorship politicians in hot water if there is a visible public opposition; more private meetings are a better choice when the public is generally pro-censorship but there are politicians or civil servants that oppose it, or consider opposing it: sometimes all they need is a good argument they could use publicly to support their position.

The Excuses

The reasons – or excuses – for a pro-censorship stance are usually twofold:

  • social;
  • political.

Sometimes the social reasons given (i.e. child pornography or pornography in general, gambling, religion-related, public order, etc.) can be taken at face-value as the real, factual reasons behind an Internet censorship idea. This was the case several times in Poland, and probably is the case in most European censorship debates.

Sometimes, however, they are just an excuse to cover the more insidious, real political agenda (like censoring dissent speech and opposition, as in China, Iran, Korea).

The crucial issue here is that it is not easy to tell whether or not there is a political agenda underneath the social argumentation. And while it is counter-productive to assume malice and such political agenda in every case, it is also expedient to be aware of the real possibility it is there, especially when the number of different actors involved in such a debate is taken into account.

Social excuses

There is a number of (often important and pressing) social issues that are brought up as reasons for Internet censorship, including:

  • child pornography (this is by far the most potent argument used by censorship supporters, and it is bound to show up in a discussion sooner or later, even if it starts with a different topic – it is wise to be prepared for its appearance beforehand);
  • pornography in general;
  • gambling;
  • addictions (alcohol, drugs available on the internet, allegedly also to minors);
  • public order (this one is being used in China, among others);
  • religion-related;
  • libel laws;
  • intellectual monopolies,
  • local laws (like Nazi-related speech laws in Germany).

The crucial thing to remember when discussing them is that no technical solution ever directly solved a social problem, and there is no reason to believe that the technical solution of Internet censorship would solve any of the social issues above.

Censorship opponents also have to be prepared for the inevitable adding of new social excuses in the course of the debate. For example, in Poland with the Register of Illegal Sites and Services, the Internet censorship idea was floated due to anti-gambling laws and foreign gambling sites. During the course of the discussion there were other excuses used to justify it, namely child pornography and drug-related sites.

That’s why it is important not only to debate the merits of the excuse, but to show that Internet censorship and surveillance is never justified, regardless of the issue it is supposedly meant to tackle.

It is worth noting, however, that such adding of additional excuses for censorship can backfire for its proponents. If the anti-censorship activists make the pro-censorship actors (i.e. by using the “slippery slope” argument) state clearly at the beginning of the discussion that such censorship shall be used for the stated purpose only, adding additional excuses for it later can be countered by a simple pointing that out and claiming that they are already slipping down this metaphorical slope even before the measures are introduced.

Political reasons

These are fairly straightforward. Being able to surveil and censor all Internet communications (and with each passing day the importance of Internet as a communication medium rises) is a powerful tool in the hands of politicians. It enables them to make dissent and opposition disappear, make it hard or impossible for them to communicate, easily establish the identities of oppositionists.

As Internet censorship requires deep packet inspection, once such a system is deployed, there are no technical issues stopping those in control to modify the communications in transit. That opens the door to even broader set of possibilities for a willing politician, including false flag operations, sowing dissent among the ranks of opposition, and similar actions.

The Counter-arguments

There are three main groups of arguments that can be used to fight Internet censorship and surveillance ideas:

  • technical and technology-based;
  • economy- and cost-related;
  • philosophical (including those based in human rights, freedom of speech, etc.).

At the end of this section some useful analogies are also provided.

The good news is, all things considered there are very strong anti-censorship arguments to be made in all three areas. The bad news, however, is that all three kinds need to be translated to or used in emotional arguments to sway the general public at some point.

Again, as a rule neither the general public nor the politicians and civil servants that further the pro-censorship agenda have decent understanding of issues involved. Putting the issues in easily-grasped and emotionally loaded examples or metaphors is an extremely potent tactic.

Several counter-arguments (for instance, jeopardising e-economy, or pushing the blocked content into darknets, as discussed below) are related to the Law of Unintended Consequences: the fact that we cannot ever predict all possible consequences of any action, especially intrusive actions with regard to complex systems. Introducing censorship in the Internet is just such a case. Calling upon this fact and this law can itself be a good counter-argument.

It is also well worth keeping in mind to make sure (if at all possible in a given local political situation) that the anti-censorship action cannot be manoeuvred into any particular political corner (i.e. so that it’s not called “leftist issue”). Censorship and freedom of speech are issues that are of interest to people from any side of the political spectrum and being able to reach out even to groups that would not be willing to agree with you on other issues is crucial.

Technical arguments

Due to the technical make-up of the Internet there are several strong technical arguments to be made against Internet censorship. The main categories these fall into are:

  • it requires far-reaching infrastructural and topological changes to the network;
  • it requires high-end filtering equipment that will likely not be able to handle the load anyway;
  • it does not work: it is easy to circumvent, it does not block everything it is supposed to, and it blocks things that are not supposed to be blocked.

There are several ways content might be blocked/filtered on the Internet, and several levels that censorship can operate at. Each has its strong and weak points, none can guarantee 100% effectiveness, all have problems with over-blocking and under-blocking, all are costly and all require Internet surveillance.

Effectiveness of Internet censorship measures is never complete, as there are multiple ways of circumventing them (depending on the given measure).

Over-blocking occurs when a legal content that should not be blocked is accidentally blocked by a given censorship measure. Depending on the particular scheme chosen this might be a problem pronounced more or less, but it is always present and inevitable. It does not relate to situations where the block list intentionally contains certain content that should not officially be blocked.

Similarly, under-blocking is content that officially should be blocked, but accidentally isn’t. It is not content accessible by circumvention, but simply content that is accessible without using any special techniques that “slipped through the fingers” of the particular censorship scheme.

Both the resources required (equipment, processing power, bandwidth) and the cost of handling the list of blocked content also vary between censorship schemes and depend on method used.

Whether or not a method employs deep packet inspection (DPI) is indicative of both how intrusive and how resource-intensive it is.

Below a short summary of possible blocking methods is provided, with information on the above factors. Possible circumvention methods are summarized at the end of this sub-section.


DNS-based blocking:
over-blocking probability: high
under-blocking probability: medium
required resources: small
list handling cost: medium
circumvention: very easy
employs DPI: no

DNS-based blocking requires ISPs (who usually run their own DNS servers, being default for their clients) to de-list certain domains (so that they are not resolvable when using these DNS servers). This means that the costs of implementing it are small.

However, as users can easily use other DNS servers simply by configuring their network connection to do so (not a difficult task), this method is extremely easy to circumvent.

This method has a huge potential for over-blocking, as due to certain content whole domains would be blocked. This means that it has a potential to bring down a website or a forum due to a single entry published on them.

Due to websites purposefully publishing content that is supposed to be blocked changing their domain names often (sometimes in the course of hours!), list handling costs and risk of under-blocking are medium.

IP address-based blocking:
over-blocking probability: high
under-blocking probability: medium
required resources: small
list handling cost: medium
circumvention: medium
employs DPI: no

IP-based blocking requires the ISPs to either block certain IP addresses internally or route all the outgoing connections via a central, government-mandated censoring entity. It is only superficially harder to circumvent, while retaining most if not all problems of DNS-based blocking.

Both IP address-based blocking and DNS-based blocking do not employ deep packet inspection.

Websites that purposefully publish content that is supposed to be blocked can circumvent IP-based blocks by changing the IP (which is just a bit more hassle than changing the domain-name); users wanting to access blocked websites can use several methods, admittedly a bit more complex than with DNS-based blocking.

It is possible to improve the effectiveness of an IP-based block (and making it harder to circumvent) by blockiong whole IP ranges or blocks; this, however, dramatically rises the probability of over-blocking.

URL-based blocking:
over-blocking probability: low
under-blocking probability: high
required resources: medium
list handling cost: high
circumvention: medium
employs DPI: yes

This method employs deep packet inspection.

Because this method blocks only certain, URL-identified content, not whole websites or servers (as do DNS-based and IP-based methods), it has much lower potential for accidental over-blocking. This also entails it has a higher potential for under-blocking, as the content can be available on the same server under many different URLs, and changing just a small part of the name defeats the filter.

Users wanting to access blocked content have also a wealth of methods (including proxies, VPNs, TOR, darknets, all discussed below).

Dynamic blocking (keywords, image recognition, etc.):
over-blocking probability: high
under-blocking probability: high
required resources: very high
list handling cost: low
circumvention: medium
employs DPI: yes

This method uses deep packet inspection to read the contents of data being transmitted, and compares it with a list of keywords, or with image samples or video (depending on the content type).

It has a very serious potential for over-blocking (consider blocking all references to “Essex” based on the keyword “sex”; consider blocking Wikipedia articles or biology texts related to human reproduction), and of under-blocking (website operators can simply avoid using known keywords, or use strange spelling, for instance: “s3x”).

Combating under-blocking with extending keyword lists only exacerbates the over-blocking problem. Combating over-blocking with complicated keyword rule-sets (i.e. “sex, but only if there are white-space characters around it”) only makes it easier to circumvent it for website operators (i.e. “sexuality” instead of “sexual”).

List handling costs are low, but this method requires huge computing and bandwidth resources, as each and every data-stream on the network needs to be inspected, scanned and compared to keywords and samples. It is especially costly for images, videos and other non-text media.

Users still can circumvent the block in several ways.

Hash-based blocking:
over-blocking probability: low
under-blocking probability: high
required resources: very high
list handling cost: high
circumvention: medium
employs DPI: yes

Hash-based blocking uses deep packet inspection to inspect the contents of data-streams, hashes them with cryptographic hash functions and compares to a known database of hashes to be blocked. It has a low potential for over-blocking (depending on the quality of hash functions used), but a very high potential for under-blocking, as a single small change to the content entails a change of the hash, and hence content not being blocked.

Resource needs here are very high, as not only all the data-streams need to be inspected in real-time, they also need to be hashed (hash functions are computationally costly) and the hashes compared against a database. Costs of handling the hash-lists are also considerable.

Users can circumvent the block in several ways.

Hybrid solutions (i.e. IP-based + hash-based):
over-blocking probability: low
under-blocking probability: high
required resources: medium
list handling cost: high
circumvention: medium
employs DPI: yes

In order to compromise between high-resource, low-over-blocking hash-based blocking and low-resource, high-over-blocking IP- or DNS-based solutions, a hybrid solution might be proposed. Usually it means that there is a list of IP addresses or domain names for which the hash-based blocking is enabled, hence only operating for a small part of content. This method does employ deep packet inspection.

Required resources and list handling costs are still considerable, and under-blocking probability is high, while circumvention by users is not any harder than for hash-based block.


There are several circumvention methods possible to be employed by users willing to access blocked content.

Custom DNS server settings can be used to easily circumvent DNS-based blocking. It does not require almost any technical prowess and can be used by anybody. There is a number of publicly available DNS servers, possible to use for this purpose. There is no way to easily block the use of this method without deploying censorship methods other than pure DNS-blocking.

Proxy servers, especially anonymous ones, located outside the area where a censorship solution is deployed can be used quite easily to circumvent any blocking method; users can modify their operating system or browser settings, or install browser additions that make using this circumvention method trivial. It is possible to block the proxy servers themselves (via IP-blocking, keyword blocking, etc.), however it is infeasible to block them all, as they are easy to set-up.

Virtual Private Networks (including “poor man’s VPNs” like SSH tunnels) require more technical prowess and usually a (usually commercial) VPN service (or SSH server) outside the area with blocking deployed. Blocking all VPN/SSH traffic is possible, but requires deep packet inspection and is a serious problem for many legitimate businesses using VPNs (and SSH) as their daily tools of trade, to allow their employees access to corporate networks from outside physical premises, via a secured link on the Internet.

TOR, or The Onion Router, is a very effective (if a bit slow) circumvention method. It is quite easy to set-up – users can simply download the TOR Browser Bundle and use it to access the Internet. Due to the way it works it is nigh-impossible to block TOR traffic (as it looks just like vanilla HTTPS traffic), to the point that it is known to allow access to the uncensored Internet to those living in areas with most aggressive Internet censorship policies – namely China, North Korea and Iran.

None of the censorship solutions is able to block content on darknets – virtual networks accessible anonymously only via specialised software (for instance TOR, I2P, FreeNet), and guaranteeing high resilience to censorship through technical composition of the networks themselves. Because darknets are both practically impossible to block entirely and not allowing for any content blocking within them, they are effectively the ultimate circumvention methods.

The only downside to using darknets is their lower bandwidth.

Indeed, deploying Internet censorship pushes the to-be-blocked content into darknets, making it ever-harder for law enforcement gather evidence and researchers gather data on the popularity of a given type of censored content. This is further discussed in the philosophical arguments sub-section.


While not necessarily a circumvention tool, TLS/SSL defeats any censorship method that relies on deep packet inspection, as the contents of data-streams are encrypted and readable only to the client machine and the host it is communicating with – and hence unavailable to the filtering equipment.

TLS/SSL provides end-to-end encrypted, secure communication; initially used mainly by banking and e-commerce sites, now being employed by ever-rising number of websites, including social networks. Accessing websites with https:// instead of http:// is making use of TLS/SSL; it is however used to provide secure layer of communication also for many other tools and protocols (for instance, e-mail clients or some VoIP solutions).

Once a DPI-based censorship solution is deployed, affected users and services will gradually and naturally gravitate to this simple yet very effective solution. This means that any DPI-based censorship scheme must handle TLS/SSL communication. This can only be done in two ways:

  • block it altogether;
  • perform a man-in-the-middle (or MITM) attack on encrypted data-streams.

Blocking is not hard (TLS/SSL communication streams are quite easy to filter out). However, as TLS/SSL is a valid, legal and oft-used way of providing security for users by legitimate businesses, especially banks, this is not a viable solution, as it will cause outrage of users, security researchers and financial companies (or, indeed, all companies relying on TLS/SSL for their security needs).

Performing a man-in-the-middle attack means getting in a way of an encrypting data-stream, decrypting it, checking the contents, re-encrypting them and sending them to their destination, preferably in a way that neither the client, nor the server notice the intrusion. With properly created and signed certificates this is only viable if the censorship equipment has a special digital certificate allowing for that.

There have been instances where such certificates leaked from compromised Certificate Authorities (or CAs) and were used by oppressive regimes for MITM attacks on TLS/SSL; also, some filtering equipment takes advantage of such certificates – albeit provided wilfully and legally by one of the CAs that is co-operating with a given filtering equipment vendor – to perform clandestine MITM attacks in the surveiled network.

Performing MITM on TLS/SSL is a very resource-intensive operation and only adds costs to the already high-cost DPI-based censorship schemes – filtering devices equipped with digital certificates allowing for performing clandestine MITM are considerably more costly.

A different argument carries more weight here, however. Performing a man-in-the-middle attack is even more intrusive and violating than deep packet inspection. It is a conscious act of breaking encrypted communication in order to get to its contents and then covering one’s tracks in order to make the communicating parties feel safe and unsurveiled. There are not many more hostile digital acts a government can perform on its citizenry.

Moreover, using MITM on all connections in a given network lowers trust level dramatically. This results in citizens not trusting their banking, financial and e-commerce websites, and all other websites that employ TLS/SSL, hence has a huge potential to hurt the whole e-economy.

It also defeats the purpose of using TLS/SSL-encrypted communication to provide security. By doing so, and by lowering users’ trust towards TLS/SSL in general, it makes them more vulnerable and insecure on the Internet.

Finally, clandestine MITM can be discovered by simply removing the Certificate Authority that issued the certificate used by filtering equipment from the certificate store used by client software – and can be performed by the users themselves. This will have a side-effect of making all connections to all websites that also employ certificates from this given CA, and all connections that a MITM attack is performed on, marked with “invalid certificate” error by client software (e.g. browsers).

Economical arguments

The economical arguments to a large extent stem from the technical issues involved. Infrastructural changes needed would be costly, the cost of the required amounts of high-end filtering equipment would be astronomical, and there are labour costs involved, too (hiring people to select content to be blocked, and to oversee the equipment). The costs, of course, differ from scheme to scheme and from country to country, but are always considerable.

It is also very important to underline the hidden costs that ISPs (and hence – their clients) will have to cover in many such schemes. If the ISPs will be required to implement content filtering in their networks, they will have to foot the bill. Once this is made abundantly clear, the ISPs might become strong supporters for the anti-censorship cause.

If the scheme would entail the government paying the ISPs for the implementation of the measures, it will be hard to get them on-board, but then simply estimating the real costs of such measures and getting the word out that this will be paid by the taxpayer is a very strong instrument in and of itself.

Either way, requiring transparency, asking the right questions about the costs and who gets to pay them, making cost estimates and publishing them and the answers is very worthwhile.

It is easy to overlook the broad chilling effects on the whole Internet-related economy due to Internet censorship schemes being rolled out, and general economy costs related. Uncertainty of law, of blocking roles (which cannot be clear and unambiguous, for reasons discussed below), of a website – after all being an investment in many cases – being available at all to the intended public, and of ways of appealing an unjust content blocking will disincentivize businesses to invest in web presence.

Hence, a whole industry will take a blow, and with it the whole economy.

Philosophical arguments

This topic is ripe with philosophical issues. These for the most part boil down to the question whether or not the end (i.e. blocking child pornography, or any other excuse) justifies the means (infrastructure overhaul, huge costs, infringement of freedom to communicate and the right to privacy)?

Of course the main axis of anti-censorship philosophical arguments are civil rights. Right to privacy, freedom of speech, secrecy of correspondence are mostly codified in international treaties and are a very strong basis here.

However, to make censorship proponents (and the general public!) understand the civil rights implications of their ideas, it is crucial to fight the distinction between “real world” and “virtual world”.

For every technically literate person this distinction does not exist and it is clear these are just figures of speech. However, for most Internet censorship proponents, this distinction feels real. Indeed, such an impression is the enabler. It implies that current laws, regulations, civil rights statutes, etc., do not work in the “virtual world”. It is perceived as a tabula rasa, a completely new domain, where rules are only to be created, and hence it is okay to introduce solutions that in the “real world” would be considered unacceptable.

Physical world examples are very helpful here – the classic one being the postal service opening, reading and censoring our paper-mail as a metaphor of Internet censorship and surveillance.

There is also the question of the “real-ness” of the “virtual world” for Internet censorship proponents. The fact that for them the Internet is a “virtual” space means that censorship and surveillance there do not “really” harm anybody, do not “really” infringe upon “real” people’s civil rights. Curiously, pro-censorship actors are incoherent here – as when they start speaking about the harm done by the issue they propose censorship as a solution to (i.e. pornography), they see it as “real” harm done to “real” people.

It is well worth to point out in such a debate that either the harm in the “virtual world” is “real”, and hence Internet censorship is unacceptable; or it is not “real” – in which case it is unneeded.

A question of legality of acts that the content to be blocked is related to is also a valid one. There are two possibilities here:

  • the acts are legal themselves, while the content is not;
  • the acts and the content are both illegal.

The former case is hard to argue for even for the proponents of Internet censorship scheme. Why should certain content be blocked if acts it depicts or relates to are not illegal? The arguments used here will orbit around the idea of making the content censored as the first step to making the acts illegal, and they should be vehemently opposed.

In the latter case (that is, for example, the case of child pornography) one could argue that it is of crucial importance to stop the acts from happening (in this case, sexual abuse of children), and blocking the content is in no way conducive to that aim.

It does not directly help stopping the acts; it does not help find the culprits; it even makes it harder for them to get caught – often information contained in the content (GPS location encoded in the pictures; ambient sound in videos) or related to the means of distribution (owner of server domain name; IP logs on the hosting server) are crucial to establishing the identity of the culprit, and blocking the content removes the possibility to use such data.

Blocking such content is swiping the problem under the rug – also in the sense that the problem becomes less visible but in no way less real. Policy makers and general public can get convinced that the problem is “solved” even though it still exists under the radar (i.e. children are still sexually abused even though it’s harder to find content related to that on the Internet, due to blocking). This results in less drive for finding solutions to the real problem, and less data for researchers and law enforcement.

Another argument is related to the lists of content to be blocked. There are three issues here:

  • how secure are the lists?
  • what are the rules of blocking the content?
  • who creates, revises and controls them?

If the lists contain addresses, URLs or identifying information on “evil” content, and as there are no blocking means that are thoroughly effective (there are ways around every method), obviously these lists themselves will be in high demand among those interested in such content. Simply put, they will be complete wish-lists for them. And as such they are bound to leak.

There is a good argument to be made that the very creation of such lists (which are necessary for censorship schemes) is in and of itself a reason not to introduce such measures.

Because the lists themselves cannot be made public (due to all reasons mentioned above), there is no public oversight of lists’ contents – and hence there is serious concern of over-blocking or blocking content that in no way fits the intended description of content to be blocked. This is a slippery slope: once such a system is introduced, more and more types of content will get blocked.

As far as rules are concerned, often it is also hard to precisely define the content that is supposed to be blocked. In the context of child pornography, for example, establishing the age of the person on the picture is often a challenge, even for experts; should pictures of young-looking adults also be blocked? And is it pornography if it is not sexually explicit – should any picture of a young naked person be blocked? What about sexually explicit graphics/drawings depicting apparently under-age persons, should they get blocked, too? If so, what about stories? Then we land in a situation where genuine works of art (for example, Vladimir Nabokov’s Lolita) should apparently be blocked.

And if even viewing of the blocked content is illegal, under what legal framework should the list creators be able to review it? They would have to view it, to review it, so they would be breaking the law. If the law would permit them to do it, why and on what grounds? If it’s bad for everybody, it is certainly also bad for them…

Final list-related issue here can be shortened to a well-known quip “who watches the watchers”. People that control the blocking lists have immense power and immense responsibility. As there is no oversight, there is a large possibility for mischief and manipulation. Especially when most vocal proponents of some of the Internet censorship schemes are not exactly the most consistent themselves.

Lists’ secrecy gives birth to yet another issue – that of lack of due process. If rules of blocking are not clear and unambiguous (they can’t be), and hence there is a serious concern for content being blocked that should not have been blocked (there is), how exactly can such incorrectly-blocked content operator appeal their content being blocked if the lists are secret? How do they even get information about the blocking, to distinguish it from a technical error on the network?

This can cause serious financial losses and there should be a way for content operators to get informed that their content is being blocked, why is it blocked and what are their possibilities of challenging such blocking. However, due to the secrecy of the process and the lists, this information cannot be provided, not to mention the additional costs of informing every single entity who’s content is blocked.

Also, surprisingly large number of pro-censorship actors that do not have ulterior motives treat any civil rights based criticism of their position personally, as if the opponents were suggesting that they do indeed have ulterior motives and are going to use the censorship and surveillance infrastructure for their own political gains.

This is something that eluded me for a long time. Only after a meeting on which I used “the next guy” argument certain pro-censorship actor (high-level representative of the Ministry of Justice) understood that we are not attacking him personally, and that there are indeed valid civil rights issues at hand.

“The next guy” argument is a very nifty way of disarming an emotionally loaded situation like that, and basically states that nobody assumes that the person (politician, civil servant, etc.) we are currently discussing Internet censorship with has ulterior motives and will abuse the system when introduced – however, nobody knows who “the next guy”, the next person to hold that office or position, will be. And it is against their potential abuse we are protesting today.

A special case of government-mandated opt-out Internet censorship is also worth considering. Such schemes have been proposed around the world (most notably in the UK), and are construed in order to answer some of the civil rights issues involved with blocking content that is legal but unsavoury (porn, for instance).

While the proponents of such measures claim that it completely solves these issues, this is not the case, as opt-out means that individuals willing to access the unsavoury content would have to divulge their data to their ISPs or content blocking operators, and hence be formally associated with the unsavoury content. This is not something many would be willing to do, even though they would indeed want to access the content.

A successful line of arguing against opt-out is to propose a similar, but opt-in solution. This would give a block on unsavoury content to those who want it, but would not create the situation described above. However, instituting such a block on a central level could be a stepping stone for mandating a central censorship solution (as the costs and technical difficulties would be similar if not the same), and hence opt-out blocking should be opposed entirely, with opt-in as a last-resort proposition.

Emotional arguments

The basic strategy is to call things by their real names – removal or blocking of content without a court order is censorship, and due to technical make-up of the Internet it is only possible with complete surveillance. There is no way around these terms, and censorship opponents can and should use them widely when speaking about such ideas. Again, using paper-mail censorship surveillance metaphors (private mail opening, reading, censoring on post offices) is very important to convey the seriousness of the issue.

Based on the cost of such solutions an emotional argument can be made that such money could be much better spent, for example on hospitals, road safety programmes, orphanages. There is no shortage of problems that need solving and the money should go there, instead of financing morally and legally questionable, technologically unfeasible censorship ideas.

It can also be argued that Internet censorship introduces collective punishment – all Internet users and Internet businesses are being punished for actions of a small group of criminals. The money and resources used for Internet censorship should be instead used to punish the guilty, not the general public.

Attempting to find organisations that try to solve the problem that the Internet censorship scheme is officially trying to solve (i.e. sexual abuse of children, creation of child pornography), but are against the censorship as a method, is also viable and advised. It is quite possible that such an organisation exists (for instance, in Poland the KidProtect.pl fundation, fighting sexual child abuse, was very vocally opposed to Internet censorship, for many reasons stated in this text), and having them as an ally is extremely effective.

If everything else fails, and as a last resort, an ad personam argument can be made that a given proponent of Internet censorship measures has a hidden agenda and wants to introduce the measures for their own personal aims. Using this argument is not advisable, however, especially early in the debate, as it ensures that such a person (and their community) will most certainly become hostile and even stronger a proponent of censorship measures than before. Using this argument is not recommended at all.

Useful analogies

These analogies are very useful in conveying the technical set-up of the Internet and the technical issues around censoring it.

IP address:
a physical street address, it can lead to several different businesses and individuals (i.e. domains).

Domain name:
a name (either business or personal) that identifies a particular business or person under a given physical street address (i.e. IP address).

Domain name resolution:
a process of “resolving” a personal or business name to a physical street address (i.e. IP address), so that a package (i.e. data) can be delivered to them.

Deep packet inspection:
opening physical mail, breaking the envelope and reading the contents in order to be able to decide whether or not to censor it (as opposed to just reading the addressee and the sender data available on the envelope).

Proxy:
asking somebody else to send the package (i.e. data) for you and forward you the answer of the addressee.

HTTPS:
Sending encrypted snail-mail.

Man-in-the-Middle:
Opening encrypted snail-mail, decrypting, reading, re-encrypting it and re-sending it to the addressee. Usually an attempt is made to do it in a clandestine way, so that neither sender nor addressee are aware of it.

Useful quotes

A very good collection of quotes useful in the context of anti-censorship debates is available on WikiQuote; it is also worth looking through civil rights and free speech related quotes. Some of the highlights below.

They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety.
Benjamin Franklin

I disapprove of what you say, but I will defend to the death your right to say it.
Evelyn Beatrice Hall

If we don’t believe in freedom of expression for people we despise, we don’t believe in it at all.
Noam Chomsky

The Net interprets censorship as damage and routes around it.
John Gilmore

Border conditions for preserving subjectivity in the digital era

This is an ancient post, published more than 4 years ago.

As such, it might not anymore reflect the views of the author or the state of the world. It is provided as historical record.

Please note: in this text I use the term “subjectivity” in the meaning of the right to be recognised as an acting subject, as opposed to beaing treated as a mere object of actions of others.

Thanks to the hospitality of this year’s Citizen Congress I had the pleasure of co-hosting (with Katarzyna Szymielewicz of Panoptykon Foundation and Jarosław Lipszyc of Modern Poland Foundation) within its framework a workshop “How to be a subject in the cyberworld”.

An broad group of practitioners, technicians, lawyers, new media experts, pedagogues and philosophers pondered for almost 3 hours how one can defend oneself from being reduced to an object, product or data point in the Net (and outside of it).

Subjectivity - whatever that is?

In order to get us on the right track, prof. Paweł Łuków summarized what subjectivity is. For our needs we can assume that it means recognizing that each human being is an independent actor, decision making subject, who has their own aims and wants, and acts in a particular way.

In other words we’re talking about subject-object comparison. Our history has no shortage of instances of treating subjects as objects and we can all agree that subjectivity is a value well worth defending.

Subjectivity in the digital era

The digital era and new means and possibilities of communicating bear with them a wealth of consequences for subjectivity. First of all, we can purposefully evade the recognition of our subjectivity, and with it the responsibility for our actions: we can consciously rescind our subjectivity.

This alone allows for unsurpassed freedom of speech. Never in history could we so easily hide and voice our opinions anonymously. Paradoxically, giving subjectivity up, hiding our identity makes it easier to express oneself fully and freely. One does not have to fear repercussions and repression for an opinion when nobody knows that they are its author.

On the other hand, this creates an air of impunity. The fine line between freedom and waywardness is being crossed – trolling and hate speach are good examples here.

Regardless, however, of our conscious decision to keep or hide our subjectivity, we might become an unwilling object of actions of other actors. Actors that might not be interested in recognizing and respecting our subjectivity. That is where dangers to privacy arise; we are being treated as data points or assets that are to be monetised.

We expect to be protected from dangers from both of these directions – that of persons exploiting impunity behind the wall of anonimity; and that of actors purposefully not respectful of our subjectivity – by public administration. Yet another paradox arises here: even though the democratic system is built upon the respect for subjectivity of each and every citizen, systemic solutions very often ignore it (for example, in the name of being more effective). In other words, attempting to defend subjectivity by public administration might create dangers of its own to it.

Mode of work

The workshop has been divided into four parts. In the first we tried to identify problems that have to be faced when defending subjectivity in the digital era, and threats to it; in the next free we made an attempt to find solutions to these problems in areas of: education, infrastructure and law.

Each of these parts took much longer than we had predicted. This topic is much more complicated and vast that one would expect.

Please note: the term “media” is being used here broadly and means also social networks and social media, internet forums, blogs and other methods of electronic communication.

Problems and threats

Problems and threats to subjectivity, which we have identified together during the workshop, are:

  • dangers to privacy;
  • obsoleteness of law with regard to technology (i.e. copyright law);
  • lack of citizen control over communication and information channels;
  • centralisation (of infrastructure, of communication, of information);
  • lack of effective guarantees of basic human rights;
  • information assymetry (i.e. between clients and software companies, or users and social network operators);
  • lacking education and lack of competence of citizens;
  • lack of understanding of new media (by citizens, policymakers, courts… – i.e. fetishization of the Internet, the “virtual reality”);
  • obstacles for empathy (due to rising proxyification of communication, impossibility of sending and receiving non-verbal signals; trolling is an effect of that);
  • tempo of changes effectively surpassing our ability to learn and accomodate them;
  • public infrastructure shortcomings (including lack of innovation within the infrastructure);
  • censorship and self-censorship (including censorship that is completely unregulated – like terms of service in privately-owned social networks);
  • marketization of education and information;
  • language barriers.

While this eluded us on the workshop, I believe one more problem should be also indicated here:

  • bundling, which is complicating or making it outright impossible to correctly compare services (e.g. of mobile plans, Internet access, etc).

Below are solution ideas and border conditions for protecting subjectivity, divided into three areas.

Potential solutions and border conditions

Education:

  • media education (in kindergardens, schools, for adults, for teachers);
  • open educational resources (used in education and actively developed);
  • open educational tools (as above);
  • teaching methods, instead of tools (change of the paradigm);
  • getting education programmes up to speed;
  • teaching critical thinking;
  • fostering the sense of self-worth;
  • teaching how to control the media;
  • language competence development (with regard to both mothertongue and foreign languages);
  • “open source” education, abandoning the XIX-century educational model (fostering student participation in the education process, instead of current model of “student-master relationship”);
  • breaking down the barriers;
  • educating on law, esp. on basic human rights.

Infrastructure:

  • decentralisation of infrastructure (on several levels);
  • broadly-adopted open standards (including within social networks, allowing for interoperability of different providers);
  • privacy by default;
  • privacy by design;
  • public, freely available access to broadband Internet (including public WiFi in public libraries);
  • open repositories (of data, open access, resources, publicly-financed source code, etc);
  • transparency of information about services;
  • civil involvement in infrastructure (designing, building, upkeep – including support for hackerspaces/fablabs).

Law:

  • transparent and functional public consultation system;
  • evidence-based policy and thorough regulatory impact analysis;
  • copyright reform;
  • easy-to-understand law interpretation and commentary available (created within the legislation creation process);
  • government-mandated, unequivocal, binding law interpretation;
  • law and regulation system analysis and review in order to remove inconsistencies;
  • laws guaranteeing network neutrality;
  • guarantees against disconnection of citizens (e.g. making n-strikes laws illegal);
  • right to analogue interaction with public administration;
  • right to move private data (e.g. between social networks);
  • right to be forgotten (removing/deleting data);
  • right to use any and all services and applications as long as they are not actively harming the network.

Above problem and potential solution catalogues should not be treated as final – rather, as a start of a discussion. A discussion that is sorely needed, and of which they can be a good base for.

Social blogosphere

This is an ancient post, published more than 4 years ago.

As such, it might not anymore reflect the views of the author or the state of the world. It is provided as historical record.

I already wrote about a Diaspora-based comment system, but here’s a question that I have been pondering for some time now: why not ramp it up a notch?..

Why not make a whole blog on Diaspora or Friendica (or any other federated, decentralized social network)?

The functionality is all there - you have your:

  • user accounts;
  • comments;
  • profile section;
  • permalinks;
  • media (videos/images) embeding.

Just change the theme to more bloggy and – hey, presto! – you have a full-featured blog. With a vengaence!

Added (social) value

Thing is, it’s not only a blog.

It works like one, it looks like one, it feels like one, but… it’s so much more! Other people, from other compatible services (i.e. other Diaspora pods and Friendica servers) can seamlessly connect to your blog, engage with it, comment on it and (if you allow it) re-share your posts.

Even more, you have the power of aspects at your disposal – you can publish some content only to certain, selected people you trust. Have you ever wanted to create a “private blog” that only a handful of friends can access? Well, now you can.

Suddenly, the whole libre, decentralized, federated social network is your audience. Everybody with an account on any of several pods or servers can be a first-class citizen on your blog or website. This, of course, works both ways: all of those that create accounts on your website to comment on the entries there are automagically first-class citizens on the whole distributed, federated social network.

Did you say: websites?

Yes. Indeed I have. Because in fact if you need any kind of website that is supposed to have comments, obviously you can take advantage of this idea, too! Instead of using WordPress or Drupal, why not use Friendica with a nice custom bloggy theme and have your content already present on the libre side of social networking?..

Just imagine the whole Internet of websites that can connect and engage with each other, a decentralized and federated web where discussion and cooperation strives and no single actor can cenzor, surveil nor shut it down!..

Embrace fragmentation

This is an ancient post, published more than 4 years ago.

As such, it might not anymore reflect the views of the author or the state of the world. It is provided as historical record.

When you’re in the IT business, fragmentation is bad. Whether it’s your platform that gets fragmented (hullo there, Android), or you’re tha admin that has to support all different versions of popular browsers (hullo, Firefox and Chromium o’ver. 9000), fragmentation is bad news and more work.

Also for social and political movements or organisations (formal and informal, regardless) fragmentation is bad. Organisation loses people, hence also clout and political power to make the changes they want to make. The movement splinters into small, irrelevant groups that cannot take on the Big League…

Only, it’s not true anymore.

Packaging

Have you ever tried choosing a mobile plan? I have. It’s daunting – and I used to work in a mobile tech R&D lab!

It’s daunting not because of technology, though, and not because it’s hard to make it easier to make choices there. It’s daunting because telecom companies are working hard to package features and pricing in plans in a way that effectively makes it impossible to really compare and contrast plans between different operators.

You want Feature X? Okay, you’ll get it within the plan at A and B, but at C you will have to pay additionally for that; but, C has lower rates overall and Feature Y, offered only by C and A (for an additional price)! Ah, but B has Feature Z, very similar to Y (but just-not-the-same)… and so it goes.

This is also how mainstream political parties work. I agree with Policy X of Party A, and Policy Y of Party B; but A has Anti-Y-policy and B has Anti-X-policy even though X and Y can be compatible. The effect? I cannot in clear conscience choose a party that actually fits me.

Why? Because it’s all pre-packaged. You cannot get your pick of the issues, features, policies. You have to pick from packages containing some you agree with, some you don’t.

Social movements often work this way, too. You want to support the Movement X because of Policy A? Well, that will mean you also support Movement X’s other policies that you might not be too fond of. And while with mobile plans and (less, but still) political parties you are bound to choose something, with social movements the effect is that most people choose not to choose. Packaging kills involvement.

Enter fragmentation.

Less is more

Suppose for a moment that we could choose to engage in furthering Policy A without having to support Policies B and C; and that Movement X that engages or coordinates efforts around Policy A does so inclusively, inviting any and all to join-in and help out, regardless of their support for other policies Movement X stands for.

Suddenly, John Doe (a stern opponent of Movement X’s other policies, yet a supporter of Policy A) can feel invited to just help with this particular policy or issue. Net effect – one more supporter of Policy A!

This is exactly how Anti-ACTA worked in Poland. There were NGOs that might not see eye-to-eye on most of things and people of all walks of life and political affiliations working towards a common goal. We embraced fragmentation and were able to bring in support of many times more people than we could have dreamt had we decided to exclude those we do not agree with on other issues.

Anarchists and right-wing activists protested hand in hand, just months after fighting each other on the streets of Warsaw.

The narrower the issue, the better defined the goal – the more people can feel invited and welcome to help out.

Smart fragmenting

This does not mean that organisations or movements should suddenly narrow their scope down, start focusing on single issues only. They should still be as comprehensive as they see fit. Some issues are not possible to fight for separated from the bigger picture.

But there certainly are issues that can be well-defined in a way that makes them at least partially self-contained. And then action can be organized around such an issue in an inclusive and welcoming way. This not only helps further the given issue, but also stimulates discussion between different people and different organisations.

Discussion that can lead to better mutual understanding, and better dialogue on the more general level.

SERVICES.TXT

This is an ancient post, published more than 4 years ago.

As such, it might not anymore reflect the views of the author or the state of the world. It is provided as historical record.

Hosting multiple different services on the same server and under the same domain name used to be simple. Set-up the services, optionally add MX or SRV records to the DNS zone if they are being run under a different IP, and you’re done. Hosting XMPP, SMTP, POP, IMAP, SSH, HTTP on the same domain was trivial, because they all by default use different ports.

Thanks to web-2.0-isation of the Internet, however, everything now seems to be hell-bent on using HTTP/HTTPS as the transport layer. This means, basically, that you cannot (for example) have StatusNet and Diaspora on the same server – simply because they both use port 80 (or with SSL/TLS, port 443) and have similar API paths. In other words, there is no way do distinguish between an API request to one or the other if they are both set up under the same domain name.

Thus, in this glorious 21st century we have made a huge step backwards – we now can’t really host multiple services under the same domain anymore.

Let’s fix it!

Introducing services.txt. Just like robots.txt and humans.txt, this human-readable file sits in the root directory of the webserver under a given domain, and informs any and all interested parties (including other instances of a given service, and that’s the crux!), that when they are looking for service X under this domain, they should use a given path.

Proposed syntax (but hey, let’s talk about it!):

servicename/apiname:version:path

  • servicename/apiname: a name of the service or api a given entry describes; in our example it would be ostatus (StatusNet implements the OStatus protocol) or diaspora,
  • version: either a version number (i.e. 1.0), or an asterisk to denote that any version will do,
  • path: this can either be a local path (i.e. /servicename), or a full URL if the service resides on a different server and/or port.

All lines starting with a hash (#) are considered comments and ignored.

So, if I had a StatusNet (ver.1.0) instance and a Diaspora instance running under this domain name, with the former running under /statusnet and the latter actually running under a subdomain dias.rys.io and accessible only via HTTPS on non-standard port 9443, my status.txt file would look thus:

# example services.txt file
# for rys.io
ostatus:1.0:/statusnet
diaspora:*:https://diasp.rys.io:9443

Of course having a service entry in services.txt would be optional – that is, if another instance of a given service wants to try to contact my instance and can’t find the entry for it (or, indeed, there is no services.txt file available), it just proceeds in a default manner for a given service.

Apple finally jumped the shark

This is an ancient post, published more than 4 years ago.

As such, it might not anymore reflect the views of the author or the state of the world. It is provided as historical record.

UPDATE: thanks to Carlos Solís we now have a Spanish translation! Thank you!

The following is a rant. You have been warned.

Everyone that knows me is familiar with my hate-hate relationship with Apple. I have been an anti-Apple evangelist for a while now, but – to be honest – it used to be a challenge. I mean, one has to admit their products had a look and feel that was on par with what (too) many clients expected for the money.

While I was opposed to them on philosophical grounds (for some reason or other, I loathe walled gardens), making a case against buying Apple to a non-freesoftie was not an easy endaevour (try explaining what a walled garden is to a random person on the street, see how that goes).

So what could I do? If somebody likes to be closed in an overpriced corporate-controlled bubble, and only being able to do with their (the corporation’s, not the user’s – the user is not the owner, as it would turn out) device what the corporation expressly allows for, it’s their own sovereign choice. A bad one, but hey, what do I care.

Heck, even technical people had some arguments to go Apple that were hard to argue against on pure technical grounds.

Well, that’s a thing of the past.

Quality

Ah yes, officially the main Apple selling point (“officially”, as the real main Apple selling point is and for a long time has been, well, fashion). Apple’s failure in this regard is the more funny, the harder Apple afficionados argue that there’s no problem and that there’s absolutely no change in the quality of Apple products.

Well, dang. At this point I can argue both ways, and actually win either way!

On one side of the table, I don’t remember Apple releasing a product that has both annoying hardware and crippling software issues. I mean, never have I seen or heard about an iPhone that automagically adds a violet flare to pictures; has ugly problems with bodypainting; and at the same time offers an “upgrade” of an important app that is so bad, even an Apple-hater like myself has to admit it’s not even funny anymore.

Of course, out of those three, the body painting problem is the biggie for Apple: can you imagine how hard it is to impress fellow hipsters in a Starbucks with a device that is shedding enamel? It’s like trying to impress downtown girls with a rusty VW Golf. It’s not gonna work, regardless of how overpriced it was.

On the other hand, I must admit that Apple’s real (vs. perceived) quality didn’t really deteriorate that much. Remember the AntennaGate? Or the Hot Macs problem? Or the MacBook WiFi fail? Yeah, see, at this point talking about quality problems in Apple offerings is a bit like flogging a dead horse.

Just a bit. The horse, you see, would have never been as condescending as Apple.

Complete contempt for clients

Ah yes, the stellar Apple customer care. Or, as Steve Jobs himself (currently violently spinning in his grave after hearing all the good news about iPhone5) put it, “You’re Holding It Wrong.”

Is there a problem with the antenna? Oh, and did Apple get clear warnings from their own engineer that such a problem will arise with such a design? Yeah, well, “you’re holding it wrong” (why yes, it is being held “wrong” also in Apple ads, but hush, peasant!).

Or maybe there is a response expected from Apple with regard to the nice violet flare added automagically (BTW, Instagram folks are surely not amused) to pictures taken with the newest iPhone? Guess what! “You’re pointing it wrong”.

Ah, but when the bodypaint problem came about, Apple surely must have admitted a mistake, right? Nope. “That’s normal.” Well, obviously “everybody knows” that coated aluminum shows these symptoms. Maybe this is why nobody else uses it in their design?.. Especially in gadgets that are supposedly “made with a level of precision you’d expect from a finely crafted watch”

And what about The Amazing iOS6 Maps? Hey, at least Tim Cook had the guts to apologise. Kinda. “You get unusable maps because we want to give you the best experience”. Erm. Yeah, makes sense! Thanks, Tim! This is really appreciated especially in the light of the fact that this mess is a result of a purely political decision (“we will now stop using Google Maps”) that completely ignored users’ needs and only focused on Apple’s hate towards Android and Google.

Oh, and guess what – “shiny” new iPhone introduces a completely new connector, so unless you buy the adapter (for a mere $29.99), all your accessories will now be useless. Normally it would be called “extortion”, but for Apple that’s just business as usual – their several different, incompatible video adaptors are a constant cause for lulz anywhere a Mac owner tries to connect to a beamer…

I am sure, though, that it’s all worth it – after all, in Apple’s own words, iPhone5 is the biggest thing to happen to iPhone. Or maybe the tallest. As in tall tales.

Imaginary Property Wars

Apparently, though, Apple seems to be painfully aware of its own decline, and instead of fighting their competition via regular market mechanisms – oh, you know, being cheaper or better (or both) – they decided to try to stiffle competition with court orders.

How deluded and hipocritical must a company be to shout “Free Market! Globalization!” when somebody tries to hold them responsible for what the FoxConn workers have to go through, but cry “no fair” when this free market and globalization comes back and bites them in the arse in their own playground? Oh, right, it’s a corporation. Carry on.

Of course Apple claims that competition “stole” some imaginary property from them – but I have a very hard time understanding what’s so increadibly inventive in rounded corners, rubber-band scrolling, slide to unlock or any of the other things Apple “borrowed” from other companies.

Surprisingly, also the US Patent Office has its doubts lately. That, however, does not stop the jurors from diving into the reality distortion field (along with many Apple users themselves).

Of course all sides can play this game and Motorola decided to call Apple on it. While I do not support the idea of software patents, with this I prepare myself some pop-corn; this is going to be entertaining!

But that’s where it gets really funny – turns out Apple (to use their language) “stole intellectual property” of Swiss Railways. That’s right. They most definitely copied the design, and while “rounded corners”, one might argue, is a very general idea and maybe, just maybe, should not be patentable, the whole design of a clock is something more complex and license-worthy (maybe not of a patent, but that’s another story).

Just to add some more spice to the whole charade, a Chinese phone brand apparently patented the iPhone5 design in China. I am waiting impatiently for Apple’s response! Will they decry design patents? Will they just agree to pay the royalties? Or maybe Tim will find some even more lulz-worthy solutions? Only time will tell!

However, all laughing aside, this causes real problems for the rest of us. And I am not talking only about Apple’s frivolous attacks on any logo built on apple (the fruit) image, although this alone is a growing problem (although here also Apple’s karma is a bitch).

Stiffling innovation

It causes problems, as it stiffles innovation. Even if somebody finds a new great way of designing a smartphone they have to design around Apple’s absurd patents on obvious things.

The bottom line? We get fewer new smartphone designs, because big companies prefer to stick to what has already been tested in courts to hold against Apples litigation. Litigation that will also start happening as soon as third party companies start innovating around the new connector, as it is considered by Apple their own imaginary property, and guarded heavily so that Apple alone can reap the benefits off of their gullible yet apparently quite wealthy userbase.

I, for one, am not amused.

But wait, there’s more! Apple managed to stiffle innovation also on the software front! With their opaque and secret app-vetting process that lets in countless fart apps (this is not that surprising, providing that the man running the App Store sells several fart apps of his own) yet doesn’t allow for a web browser app (that would be immensely more useful than all the fart apps combined), with them rejecting an app that informs of real-life drone attacks yet having no problem whatsoever with brutal games – they only allow for a very limited sort of apps to reach the users. And the developers can only guess if their idea is to liking of the App Store overlords.

Oh, and those overlords really hate Free Software. Which comes as no surprise, of course.

Enablers

Up to a point I really couldn’t care less about what Apple customers let Apple do to themselves. It’s their money, their data, their lives. If somebody wants to act dumb, I can’t really stop them, can I?

At some point in time, though, Apple decided it’s a good idea to bully everybody everywhere, directly and indirectly, and try to coerce, extort, stiffle and litigate in all directions possible. This directly threatens my freedom to choose hardware and software that I use. And I shall not sit back and let them do that.

Apple would not be able to do all this if people stopped buying their crap. So you, my dear Apple customer, are the enabler. You personally enable them to not only rob you of your own money, but to rob others of their choices.

And hence I shall from now on consider you, dear Apple customer, to be personally partially responsible for all evil Apple does. No buts. No ifs. You own an Apple device – you enable and support all of the above.

If you don’t, stop buying Apple. The sooner, the better – for you and for the rest of us.

Breaking the garden walls

This is an ancient post, published more than 4 years ago.

As such, it might not anymore reflect the views of the author or the state of the world. It is provided as historical record.

UPDATED with Step 0 and FreedomBox reference; UPDATE 2: heartfelt thanks to Laura Arjona for the Spanish translation, now also featured here.

For some time now I have been pondering the best way to break people free from walled-gardens (like Facebook, Google+, Twitter, etc).

For all those services there are viable, free-as-in-freedom alternatives (Diaspora/Friendica, StatusNet, and many more). All those proprietary services are being heavily criticised (among others, for privacy violations, tricking or pushing their users, heavy-handed policies, censorship, nymwars).

And yet, people still overwhelmingly use them, instead of the libre, decentralised, federated alternatives. And yet, people still write software for them and base their business on them – and even when those closed services change their API policies and draw ire of developers, the developers themselves write petitions instead of simply diversifying.

There is a reason for that, and the reason is called Network Effect. In short – the more people use a given communication too, the more new people will use it.

Seems that there is no way out… However, I believe there is. But we have to subvert the network effect to do our bidding!

Step 0. Agreed protocols

We do have a problem with fragmentation. Fragmentation is not choice – it is a situation where you don’t know which of the incompatible service types to choose – in fact, it’s almost a kind of a walled-garden in and of itself.

Choice is what we have with e-mail: you can choose from a plethora of clients, servers, webmail providers, etc; however, regardless of whichever you choose, you are still able to seamlessly communicate with any other e-mail user, using any other combination.

Currently we have quite a few open, free, decentralised social media protocols that have similar functionality but not much interoperability. Before we can move on, we need to change that – and the only way to change that is to agree on one of those protocols and move from there.

I believe we should start a discussion on that and make the decision as soon as possible; and I call upon GNU Project, FSF, FSFE, and all other notable organisations promoting free/libre/open source software to partake in this discussion and throw their weight behind the protocols that would emerge as the agreed-upon solution.

Step 1. Awesome service

We need to build a service (and methods of creating new instances of it quickly and easily!) that integrates as many different service types as possible uder a single user@example.org identity. I’m thinking at the very least:

Maybe a distro/remix, ready with everything one needs to just install it, enter some basic data and run? We need as many instances of that as possible, as fast as possible.

Of course, there already are valuable projects going in this direction, and we should support them. For example, FreedomBox, as pointed out by forteller; or SocialSwarm, as pointed out by march.

The problem with FreedomBox and SocialSwarm I see is that they are trying to make two hard transitions at once: from centralised to de-centralised, and from third-party-hosted to self-hosted. I believe this is a tad too an ambitious plan and it should be split into two separate steps. However, if we did Step 0 and Step 1 right, they both would have at least a part of their work done for them.

Step 2. Prison break

When we have where to send potential interested users, it’s time to start the campaing proper. For this we need a website, endorsed by as many privacy-advocating and FLOSS-evangelizing organisations and people as possible.

It would designate a single day each month, or each quarter, to be (e.g.) “Prison Break Day Q4 2012”. Users of walled-gardens could log-in on the website with their walled-garden accounts and pledge to (either, or both):

  • create an account on an analogous libre, decentralised service (i.e. StatusNet for Twitter users; Friendica for Facebook users);
  • close their walled-garden accounts;

…before or at the next “Prison Break Day”.

Info that they did pledge that would get automagically published on their walled-garden feeds for all their friends to see. As the “Prison Break Day” draws closer, at least one reminder would be sent to them – and to their feeds. Users then would be able to log-in with their libre OpenID to “claim” a given pledge and prove they made good on it. This would also get published on their walled-garden feeds.

To sweeten the deal, the libre services should be able to connect with walled-garden accounts and publish to them.

This would have the effect that people would see how many of their friends in walled-gardens are actually willing to make the switch. For some the amount of those would be enough to make good on their pledges and create the accounts; for some it would even give the incentive to close their walled-garden accounts.

Anyway, we would have the network effect working for us.

Yes, there is a Diaspora thread and Identica one for your commenting pleasure!

Melbourne CryptoParty video message

This is an ancient post, published more than 4 years ago.

As such, it might not anymore reflect the views of the author or the state of the world. It is provided as historical record.

For some reason Asher Wolf asked me to record a short video message for Melbourne CryptoParty.

You can watch the message on YouTube (sorry for the quality, this was my first self-recorded video message). I would strongly suggest to listen and watch messages from other great people. How I landed in such a cool bunch is a mystery to be solved…

Anyway, the text of what I was trying to say is below, for your enjoyment as you compare and contrast it with what I actually did say.


Hi there,

My name is Mike (also known as rysiek) from Warsaw Hackerspace in Poland. You might remember me from such hacktivist initiatives as Anti-ACTA campaign in Europe and the Telecomix jellyfish collective.

I was asked to share with you my view why crypto is important.

It’s important, because privacy is important.

It’s important, because being certain you know who can (and who cannot) read the message you sent is important.

For some reason we do put snail-mail letters in envelopes, hiding them from the eyes of good people working at post offices. And yet, we keep on sending our most private, most intimate, most important information in unencrypted e-mails and via unencrypted internet messaging services, putting them right in front of preying eyes of data-mining corporations, our beloved government officials and security agencies.

Had any government in the developed world announced that they are opening, reading and censoring snail-mail on post offices, people would riot.

And yet when Internet filtering schemes are pushed – in the name of fighting the dreaded paedonazis or saving our dear entertainment industry from themselves – general public often doesn’t seem to notice nor care, doesn’t seem to make the connect between the phrase “Internet filtering” and words “censorship” and “surveilance”.

One of the reasons ACTA was so explosive in Poland was because we remember. Most of Poles alive today had a taste of a totalitarian regime. Some faught hard against it. “Censorship” and “surveilance” are not just abstract terms for us. They are often part of family history.

So, here’s something from a Polish guy, 22 years after a totalitarian state was abolished here: if you want to know why crypto is important, just consider for a moment why you put your last snail-mail in an envelope.

Thanks and have a great CryptoParty!

On sailor's sensitivity, or "the starry heavens above me"

This is an ancient post, published more than 4 years ago.

As such, it might not anymore reflect the views of the author or the state of the world. It is provided as historical record.

Thee who never had the chance to marvel at night skies somewhere far from civilised world – and due to light pollution this is getting ever harder these days – will probably never undarstand Kant’s quote:

Two things fill the mind with ever new and increasing admiration and awe, the more often and steadily we reflect upon them: The starry heavens above me and the moral law within me.

I have yet again spent a few days sailing the sea; nowhere can one find such a breathtaking sight of starry sky, as in the middle of the sea at night. Could anyone be impervious to it?..

Sea sailing is neither easy nor effortless pastime; and working as a sailor on a sailing ship of old was incomparably harder, severe and demanding. C. S. Forrester in his Horatio Hornblower series doesn’t leave much to the imagination: inhumane conditions; unrelenting weather; heartless commanders with indisputable power over life and death; never-ending missions lasting months or years… Sailors had to be hardened and tough – or their days at sea ended fast (often at the bottom, with a cannoball or two at their feet).

Still, hadn’t the the night sky at sea (as awe-inspiring then as now, no doubt) moved the sailors’ of times past sea-hardened hearts as it moves and inspires seagoers today? Wasn’t there often, under the hard outer shell, a (very peculiar, but nonetheless) sensitivity?

Listen to sea shanties and you will find both the hardiness and the sensitivity. Just like the Königsberg philosopher’s quote, however, these will be hard to find and grasp, and appreciate, if you’ve never been to sea at night.

Black PR around Polish e-Textbooks

This is an ancient post, published more than 4 years ago.

As such, it might not anymore reflect the views of the author or the state of the world. It is provided as historical record.

Black PR campaign against e-textbooks in Poland that trundles through polish media is a premeditated attack against our right to education. For years now open education resources proponents have been fighting for resources available on permissive, or “libre”, licenses, allowing for copying, remixing and spreading them around – so that teachers are not afraid to make a copy of an application used in class or a textbook needed for their homework. This freedom is jeopardized by particular interests of a couple of publishing companies.*

Much has been said lately in Poland about (or rather, mainly against) the plan to bring electronic textbooks and open education resources to Polish public schools. What is worth noting: while the critique was usually aimed at financial, technical or procedural issues, the real source of ire for those behind this campaign are, in fact, the libre licenses themselves.

What are libre licenses

In almost every textbook on one of the first or last pages you will find the text “all rights reserved”. It’s a reminder that they are also covered by copyright laws, and that rightsowners’ (publishers’, authors’) express consent is required to copy, redistribute or modify it.

Libre licenses invert this situation, by expressly and unequivocally giving such consent to anybody interested in doing so, as long as they retain proper attribution of authorship. No need to ponder if it is legal to share libre licensed music (e.g. downloaded from Jamendo) nor if we can re-use a Wikipedia article – libre licenses these sites sport for the content are a loud and clear “sure thing, go ahead!”

This, for reasons that should be pretty obvious, has a lot of sense in education. Open education resources allow teachers and students to use, re-use, modify, improve, supplement and share – or even publish their own versions of them! – without the fear of running afoul of complicated copyright laws. It is the proven model behind, for example, free software and Wikipedia – however, when used in in education, apart from providing for better, more complete and upt-to-date learning materials, it also helps foster deeper student and teacher involvement in the process.

And of course, parents (especially of more than one child) could also feel the purely financial advantage such model offers them, as instead of buying, year by year, new textbooks, they could just download the updated version. All this is possible with libre licensing of education resources.

Almost everybody engaged in education – students, parents, teachers – libre licenses are a huge step forward. They allow creativity to thrive, save money, enable updating of the resources by third parties (instead of writing them anew from scratch each time) and fight the digital exclusion (anybody can prepare a braille version without even having to ask for permission), while at the same time giving students practical idea on how copyright law works.

However, such culture of sharing is (at least seemingly) incompatible with business models of large publishing companies, hence the current black PR campaign against e-textbooks. The question remains: should such a purely business issue be a problem of students, parents and teachers?

Libre business

Regardless of what the publishers would like you to think, there are several examples of business models perfectly compatible with libre licensing and open education resources.

It is because they are libre-licensed, open education resources can (and should!) be used and improved upon by the publishers, regardless of who was the original author. There is not a single reason why the publishers cannot prepare professional printed versions, after all many parents will prefer them to printing at home! Textbooks will need appropriate exercise books, tests, other materials – and thanks to the libre license of the textbook any publisher will have the ability of preparing those.

Publishers could even prepare specially adapted versions for certain class profiles – removing unneeded material and extending upon certain relevant sections. Not only can they do that – this possibility is in and of itself one of the reasons for creating open education resources.

Conjuration of reality

Publishing business does not want to acknowledge all that, because it spells changes. Instead of trying to find new business models, new ways of operating, compatible with libre licenses (and the future of education in Poland) – publishers prefer to treat open education resources as a “problem” that needs “solving”, using lawyers and PR agencies.

Changes will inevitably come, regardless of how those opposed to them try to conjure the reality. Respected education centres around the world also see that: Harvard University asked its staff to publish their work on libre licenses, instead of in science periodicals sporting proprietary licensing schemes. This will supposedly allow it to save 3.5 million dollars each year, at the same time rising availability of scientific research within the scientific community and well beyond it.

Polish education has a chance to not only follow this example, but go further. Polish libre-licensed e-textbooks is already commented broadly in education communities around the world. As far as open education goes, Poland can become a true leader.

Should, then, profits of a few publishing businesses stand in the way of better, more affordable and modern education?