Artifice and Agency

Wednesday, February 28, 2007

Hopefully, fixed:

Fiddling around, I think this link will take you to 9:

http://www.oreilly.com/catalog/wemedia/book/ch09.pdf

Friday, February 16, 2007

Cypher Junk

There was a technical question in class Tuesday (when we were discussing the Cypherpunks) about encryption -- which I didn't really get into for fear that we would lose track of our thread -- but here's an excerpt from my dissertation covering some basics. Hope it helps.
A whispered voice, a closed door, a sealed envelope –- these are all familiar, everyday techniques and technologies by means of which people routinely seek to maintain their secrets and preserve a measure of personal privacy.

Cryptography, the art of making ciphers and codes, provides an additional array of powerful techniques to accomplish the same purposes under different circumstances. Cryptographic techniques attempt to protect information from unwanted scrutiny by transforming or encrypting it into an otherwise unintelligible form called a cipher-text. This cipher-text ideally cannot be deciphered back into an intelligible plain-text without the use of a key to which only those who are the intended recipients of the information have access. The use of ever more powerful computers to facilitate the construction and application of encryption algorithms and keys has made the effort to discern the original plain-text from an encrypted cipher-text without recourse to its proper key incomparably more difficult than has been the case historically. This kind of code-breaking is called cryptanalysis. Cryptology is a more general term encompassing both cryptography and cryptanalysis.

There are two basic kinds of encryption scheme in contemporary cryptography, symmetric and asymmetric systems. In classic symmetric encryption or secret key cryptology, messages are enciphered and deciphered by recourse to a secret key available to all (but only) the relevant parties to a transaction. Such systems are called symmetrical simply because both the processes of scrambling text into cipher-text and descrambling cipher-text back to plain-text require access to exactly the same information. The obvious difficulty with such symmetric systems is their reliance on a secret key that cannot always itself be distributed with ease or comparable security. This dilemma constituted in fact one of the definitive quandaries of cryptography for centuries, but it was overcome in a series of breakthroughs in relatively recent history. The result is called asymmetric or public key cryptology.

Public key encryption, as we know it, was devised by 1976 by Whitfield Diffie (of whom Simon Singh writes: “In hindsight, he was the first cypherpunk” ), Martin Hellman, and Ralph Merkle. Asymmetric encryption schemes require not one but two keys, a public or published key available to everyone as well as a secret key known, as usual, only by deliberately chosen individuals, and often known only by a single person and never revealed to anyone else at all. These two coded keys stand in the unique mathematical relation to one another that once a text has been scrambled into cipher-text by means of the public key, it can be subsequently descrambled from cipher-text back into intelligible plan-text only by means of the private or secret key associated with it. With this breakthrough the dilemma of insecure key distribution was solved, and it became possible even for parties whose identities are secrets kept from one another to communicate and conduct transactions with one another in a way that was likewise perfectly secret to anyone but themselves.

Tuesday, February 13, 2007

Still More Tinkering

Just so everybody knows, the latest version of the syllabus is up, just click on the "Current Syllabus" link at the top of the sidebar. I'm going to send round a physical copy of this version in class tonight, to give everybody a chance to confirm exactly when they mean to co-facilitate discussion of texts in-class or when they mean to give reports on p2p/media issues and what they want to report on (if they know). I have an older version of this sign-up sheet, and people who want to hold on to their timeslots or topics definitely should do so, so I'll send the new sheet around twice to ensure that result.

Looking forward to our discussions this week, see you later.

Wednesday, February 07, 2007

Next Few Weeks Assignments in Shiny New Syllabus

Tuesday, February 13

Paul Hughes, A Cypherpunk's Manifesto

Clay Shirky, The RIAA Succeeds Where the Cypherpunks Failed

Thursday, February 15

Short Story, Maneki Neko by Sterling

Tuesday, February 20

James Boyle, Second Enclosure Movement and the Construction of the Public Domain

Thrusday, February 22

James Boyle, Enclosing the Genome: What Squabble Over Genetic Patents Could Teach Us

Annalee Newitz, Genome Liberation

Tuesday, February 27

The Making of a Movement, Robert W. McChesney & John Nichols

Our Media, Not Theirs: Building the U.S. media reform movement by Robert W. McChesney and John Nichols

The Problem of the Media: David Barsamian interviews Robert McChesney, Z magazine, February, 2006

Thursday, March 1

Dan Gillmore, We the Media, Chapters 1 and 9.

The following week we will turn to material available in your readers, Jurgen Habermas, Paul Starr, and Cintra Wilson.