9,589 research outputs found

    Brazil’s Deferred Highway: Mobility, Development, and Anticipating the State in Amazonia

    Get PDF
    Four decades ago, Brazilian officials plotted designs for colonization and resource extraction in Amazonia; subsequently the region has become a test-lab for successive development regimes. Along the Santarém-Cuiabá Highway (Br-163) in the state of Pará, residents have engaged in a range of licit and illicit activities as official development policy has shifted throughout the years. Despite assertions that living along the unpaved road is tantamount to “being stuck” in place and time, residents move widely throughout the region, using the road, trails, streams, and rivers as thoroughfares. I argue that “being stuck” functions as a discursive label for illegible mobilities and the speculative economies they support as agrarian reform clients, ranchers, and others compete for position in anticipation of the road’s paving. Novel forms of resource speculation result from the labor of moving and maintaining anticipatory structures along the road, a process that remains obscure from state development projects

    Beyond contested elections: the processes of bill creation and the fulfillment of democracy's promises

    Get PDF
    Long before 1996, earlier promises of 'development' had splintered into a million shards. Development -- defined as the use of state power to bring about social, political, and economic change in favor of the mass of the population almost everywhere had seemingly imploded. 5 Babies in the poorer countries could expect to live from ten to thirty years fewer than those born in industrialized countries. [TRUNCATED

    Obscurity by Design

    Get PDF
    Design-based solutions to confront technological privacy threats are becoming popular with regulators. However, these promising solutions have left the full potential of design untapped. With respect to online communication technologies, design-based solutions for privacy remain incomplete because they have yet to successfully address the trickiest aspect of the Internet—social interaction. This Article posits that privacy-protection strategies such as “Privacy by Design” face unique challenges with regard to social software and social technology due to their interactional nature. This Article proposes that design-based solutions for social technologies benefit from increased attention to user interaction, with a focus on the principles of “obscurity” rather than the expansive and vague concept of “privacy.” The main thesis of this Article is that obscurity is the optimal protection for most online social interactions and, as such, is a natural locus for design-based privacy solutions for social technologies. To that end, this Article develops a model of “obscurity by design” as a means to address the privacy problems inherent in social technologies and the Internet

    Theory and Practice of Program Obfuscation

    Get PDF

    Secure execution environments through reconfigurable lightweight cryptographic components

    Get PDF
    Software protection is one of the most important problems in the area of computing as it affects a multitude of players like software vendors, digital content providers, users, and government agencies. There are multiple dimensions to this broad problem of software protection. The most important ones are: (1) protecting software from reverse engineering. (2) protecting software from tamper (or modification). (3) preventing software piracy. (4) verification of integrity of the software;In this thesis we focus on these areas of software protection. The basic requirement to achieve these goals is to provide a secure execution environment, which ensures that the programs behave in the same way as it was designed, and the execution platforms respect certain types of wishes specified by the program;We take the approach of providing secure execution environment through architecture support. We exploit the power of reconfigurable components in achieving this. The first problem we consider is to provide architecture support for obfuscation. This also achieves the goals of tamper resistance, copy protection, and IP protection indirectly. Our approach is based on the intuition that the software is a sequence of instructions (and data) and if the sequence as well the contents are obfuscated then all the required goals can be achieved;The second problem we solve is integrity verification of the software particularly in embedded devices. Our solution is based on the intuition that an obfuscated (permuted) binary image without any dynamic traces reveals very little information about the IP of the program. Moreover, if this obfuscation function becomes a shared secret between the verifier and the embedded device then verification can be performed in a trustworthy manner;Cryptographic components form the underlying building blocks/primitives of any secure execution environment. Our use of reconfigurable components to provide software protection in both Arc 3 D and TIVA led us to an interesting observation about the power of reconfigurable components. Reconfigurable components provide the ability to use the secret (or key) in a much stronger way than the conventional cryptographic designs. This opened up an opportunity for us to explore the use of reconfigurable gates to build cryptographic functions

    Algorithmic Transparency for the Smart City

    Get PDF
    As artificial intelligence and big data analytics increasingly replace human decision making, questions about algorithmic ethics become more pressing. Many are concerned that an algorithmic society is too opaque to be accountable for its behavior. An individual can be denied parole or credit, fired, or not hired for reasons that she will never know and which cannot be articulated. In the public sector, the opacity of algorithmic decision making is particularly problematic, both because governmental decisions may be especially weighty and because democratically elected governments have special duties of accountability
    • …
    corecore