Political Science V: Net Neutrality

“All traffic is equal but some is more equal than others”
The Pigs

Heuristically, there is no such thing as “net neutrality”…there hasn’t been since the 1988 Morris Worm. Without heuristic filtering by the tiered network providers, the public internet1 would be practically unusable. It would certainly be unreliable.

The Administrative State implementation of “net neutrality” presages the end of civilian control of the internet, the fossilization of corporate monopoly over the “last mile” and the formalization of a surveillance regime against “unauthorized traffic” (read: IP). The Administrative State enforcement of a “public network” will invite the same censorship that the government imposes over that other decreed thing: “the public airwaves,” even though that thing doesn’t even really exist anymore.

On the one hand, the cognitive dissonance being displayed by so-called civil libertarians is stupendously mind boggling, after all this is the same Administrative State engaged in unnumbered secret activities to undermine an open, free and secure internet in the name of the geopolitical status quo(what it calls “terrorism”). If this was a FCC composed of three republicans instead of two, and they had voted to “save the internet” on a pretense of “we have to implement before you know what is in it,” then the chants would be “bloody murder” instead of self-congratulated “salvation.” Of course every school boy knows the difference between tyranny and liberty is “two republicans instead of three, three democrats instead of two.”

On the other hand, it is not only unsurprising, but predictable. This is the de Jasay method in full effect. States persist because everyone thinks they can use the State for their own ends, but the only result is the persistence of the thing itself, the only demonstration being how state and society interact to disappoint and render each other miserable.

vive le moment libertaire!

1 The “public network,” that small network(small as in the number of hops between any two nodes) where the default condition is pass, is a emergent de facto phenomenon, not a de jure decreed thing.

Political Science IV: Hacked Knowledge Problem

If I was the NSA, I would target the same thing – all the crypto keys. I do the same on pentests, so why not? One target, huge ROI.

Kevin Mitnick

Again, as a reminder, The Hayek Knowledge Problem has been hacked. “The Use of Knowledge in Society” has different implications in 2015 compared to 1945. Economic science, like all sciences, is not written in the staid stone of theological scripture. But live on it will–in the classical liberal turf wars…

Goodbye dL on Twitter

Unfortunately, twitter.com has claimed my dL_1337 account engaged in automated behavior that violated the site’s terms and conditions. Apparently, “automated behavior” consists of two tweets critical of the US government surveillance within a 5 minute period. I will not participate in the necessary SMS authentication to unlock that account. Not for this identity…

Update
Apparently, twitter.com authentication has re-enabled that account. Rollout of overzealous automated moderation code? Phone phishing? Who knows…of course, they already have my number. You can’t be a dev today without participating in two-factor authentication for every major social platform provider…

Political Science II

The Tor Project has issued a warning that the United States government may soon start seizing core nodes of the Tor Network under the pretext of investigating the “Sony Hack.”1

Of course, Pravda, Inc disseminates the Sony breach as being the handiwork of the North Korean government. LOL. Even if we concede the claim for the sake of argument, there is the conspicuous omission of any argument why bad movies and George Clooney gossip fall under the purview of national security. Then again, the hallmark of a national security state is that “national security” is what the national security state says it is. This, of course, is classic doublethink.

It is worth pointing out that the FBI seizing Tor Direct Authority nodes seems suspiciously consistent with the FBI’s internal objective of an internet wiretap regime by whatever means necessary. Very convenient, but as discussed in the previous “political science” posts, quite predictable. Perhaps the illustrative point here is that political science reducible to “the conspiracy without the conspiracy”2 not only makes for bad church, it also makes for bad Hollywood.

1 Reading is more or less a useless skill if you can’t read between the lines

2 “Conspiracy without the conspiracy” means conspiracy is the rational/scientific pattern…hence no subversion