Back to Results

HOUSE_OVERSIGHT_018339.jpg

Source: HOUSE_OVERSIGHT  •  other  •  Size: 0.0 KB  •  OCR Confidence: 85.0%
Download Original Image

Extracted Text (OCR)

also that everything is monitored. Remebered. Studied. The Warez Dudes’ drive to get ever closer to the core, to perform even that atomic level hacking, tells us something about just how much power is locked up in those central cores where this information accumulates. The 2600 hz whistle was, it seems, only the first of an endless series of battles for control of the roots and trunklines of modern power. All around us today, huge power accumulates to certain irreplaceable cores. We know this is a problem of connected age design: Giant search engines, certain algorithms, database or communications protocols overmaster us because they can gather so much data, so fast, and process it with unique fidelity. What makes a city? urban scholars often ask. We might wonder: What makes a platform for network power? The answer to both questions is the same: Density.15? If the first cities of Aztecs or Mesopotamiaman civilization differed from early tribal clusters because of their density, the same is true for our first platforms of instant connection. Facebook is denser than AOL ever was. More people, more data, thicker connections. Future platforms will be denser still. And if cities and density were once sadly unanticipated accelerants to plague, poverty and revolution, we should be aware of the risks of our own tight-clustered centers of dense connection. The security of these cores that link us to each other and our essential data - when jacked by hackers, by companies, or even by fast algorithms we don’t understand - is important not merely because of the possibility of total control a breach might represent, but because they show us the very fact of such totalizing control exists. To infect, surprise, sicken - all this is alluringly possible and dreamable for anyone with a hunger for mastery. Imagine if you knew your government could be switched instantly and invisibly to malice. (Or, to effectiveness!) Or picture a nation of connected citizens wired for flash-started nationalism and hate. Such a possibility exists on linked systems. This potential for total, weird control of the cores - and thus total control of anyone connected to them - should force us to wonder a bit. Every evil thing beats in those central nodes: The power to manipulate, to master, to destroy even. With such access I can change what you know about the world, how you vote, where your money sits, what you remember, how soon we spot (or don’t) a slipped knot in your DNA. “Just like every drinking binge ends at vodka, so every hacking session ends at kernel.org” Thomas Dullien, the mathematician and good-guy hacker who won a Pwnie in 2015 for lifetime security achievement, observed once!54. So much power in a connected system lies at its root: Kernel.org, for instance, is the reference copy for LINUX computer code that powers most digital machines on earth, sort of like the original DNA of the net. To manipulate Kernel.org would be to reach into the very spine of the Internet. If the aim is control, if it is to find and exploit the most fundamental of cracks in the surface of the black boxes, to get even deeper inside, 153 What makes a city?: Colin McFarlane, “The geographies of urban density: topology, politics and the city.” Progress in Human Geography (2015) p. 2 154 “Just like every drinking binge”: Halvar Flake/Thomas Dullien, “Why Johnny Can’t Tell If He Is Compromised,” speech delievered at Area41 Conference, (Zurich, June 2014) 107 HOUSE_OVERSIGHT_018339

Document Preview

HOUSE_OVERSIGHT_018339.jpg

Click to view full size

Document Details

Filename HOUSE_OVERSIGHT_018339.jpg
File Size 0.0 KB
OCR Confidence 85.0%
Has Readable Text Yes
Text Length 3,495 characters
Indexed 2026-02-04T16:34:47.342889

Related Documents

Documents connected by shared names, same document type, or nearby in the archive.

Ask the Files