25,427 research outputs found

    Privacy in Public and the contextual conditions of agency

    Get PDF
    Current technology and surveillance practices make behaviors traceable to persons in unprecedented ways. This causes a loss of anonymity and of many privacy measures relied on in the past. These de facto privacy losses are by many seen as problematic for individual psychology, intimate relations and democratic practices such as free speech and free assembly. I share most of these concerns but propose that an even more fundamental problem might be that our very ability to act as autonomous and purposive agents relies on some degree of privacy, perhaps particularly as we act in public and semi-public spaces. I suggest that basic issues concerning action choices have been left largely unexplored, due to a series of problematic theoretical assumptions at the heart of privacy debates. One such assumption has to do with the influential conceptualization of privacy as pertaining to personal intimate facts belonging to a private sphere as opposed to a public sphere of public facts. As Helen Nissenbaum has pointed out, the notion of privacy in public sounds almost like an oxymoron given this traditional private-public dichotomy. I discuss her important attempt to defend privacy in public through her concept of ‘contextual integrity.’ Context is crucial, but Nissenbaum’s descriptive notion of existing norms seems to fall short of a solution. I here agree with Joel Reidenberg’s recent worries regarding any approach that relies on ‘reasonable expectations’ . The problem is that in many current contexts we have no such expectations. Our contexts have already lost their integrity, so to speak. By way of a functional and more biologically inspired account, I analyze the relational and contextual dynamics of both privacy needs and harms. Through an understanding of action choice as situated and options and capabilities as relational, a more consequence-oriented notion of privacy begins to appear. I suggest that privacy needs, harms and protections are relational. Privacy might have less to do with seclusion and absolute transactional control than hitherto thought. It might instead hinge on capacities to limit the social consequences of our actions through knowing and shaping our perceptible agency and social contexts of action. To act with intent we generally need the ability to conceal during exposure. If this analysis is correct then relational privacy is an important condition for autonomic purposive and responsible agency—particularly in public space. Overall, this chapter offers a first stab at a reconceptualization of our privacy needs as relational to contexts of action. In terms of ‘rights to privacy’ this means that we should expand our view from the regulation and protection of the information of individuals to questions of the kind of contexts we are creating. I am here particularly interested in what I call ‘unbounded contexts’, i.e. cases of context collapses, hidden audiences and even unknowable future agents

    RAPTOR: Routing Attacks on Privacy in Tor

    Full text link
    The Tor network is a widely used system for anonymous communication. However, Tor is known to be vulnerable to attackers who can observe traffic at both ends of the communication path. In this paper, we show that prior attacks are just the tip of the iceberg. We present a suite of new attacks, called Raptor, that can be launched by Autonomous Systems (ASes) to compromise user anonymity. First, AS-level adversaries can exploit the asymmetric nature of Internet routing to increase the chance of observing at least one direction of user traffic at both ends of the communication. Second, AS-level adversaries can exploit natural churn in Internet routing to lie on the BGP paths for more users over time. Third, strategic adversaries can manipulate Internet routing via BGP hijacks (to discover the users using specific Tor guard nodes) and interceptions (to perform traffic analysis). We demonstrate the feasibility of Raptor attacks by analyzing historical BGP data and Traceroute data as well as performing real-world attacks on the live Tor network, while ensuring that we do not harm real users. In addition, we outline the design of two monitoring frameworks to counter these attacks: BGP monitoring to detect control-plane attacks, and Traceroute monitoring to detect data-plane anomalies. Overall, our work motivates the design of anonymity systems that are aware of the dynamics of Internet routing

    Bakelite and other Shibboleths: eBay listings and the 'policing' of 'amateur' collecting knowledges within the space of an online old radio forum

    Get PDF
    eBay, the online auction site, is composed of thousands of item descriptions constructed by sellers themselves. Sellers may be collectors or antiques experts, but often they are amateurs selling off unwanted items. As such, eBay becomes an unprecedented public space for the performance of amateur collecting and consumption knowledges where experts are being disintermediated by non-expert knowledges. These knowledges have become a major source of discussion on an online old radio discussion forum and the case study presented here contends that amateur knowledges are strongly contested, often in separate online spaces, and as part of identity performance. While a ‘cult of the amateur’ may be occurring online, it is not happening without a fight over knowledge and its performance. eBay is shown as a relational space to the forum, allowing radio experts to perform their own group identity and related practices - distinguished from those seen on eBay. This paper examines these distinctions in detail - the identifying traits or 'Shibboleths' of eBay amateurs - such as the incorrect spelling of 'Bakelite'.

    The perks and downsides of being a digital prosumer: optimistic and pessimistic approaches to digital prosumption

    Get PDF
    The recent evolution of users’ position and agency in digital environments absorbs the attention of several scholars in different fields of study. Users’ new ontological status as prosumers, simultaneously producers and consumers, and their role regarding productive paradigms has raised a lot of contrasting opinions. Different discursive techniques are employed to investigate production practices in digital worlds and are often crafted with the conventions of utopian and anti-utopian approaches. Nevertheless, the adoption of optimistic or pessimistic analytical and rhetorical strategies appears to be prejudiced towards the study of emerging online practices. In reality, the analysis of positive and negative approaches to productive paradigms in digital environments results in the detection of their limitations in reaching a comprehensive understanding of the investigated phenomena. Therefore, the adoption of a more neutral perspective is suggested, one that could potentially foster a holistic approach and therefore a broader and deeper comprehension of the analyzed phenomena
    • …
    corecore