Home
Categories
EXPLORE
True Crime
Comedy
Business
History
Society & Culture
Sports
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/99/f2/c2/99f2c2e4-54fc-05f5-88d2-b77e893ec4b2/mza_8554259338166064335.jpeg/600x600bb.jpg
CogWar
Raymond Andrè Hagen
9 episodes
3 hours ago

Dive into the mind-bending world of Cognitive Warfare, where manipulation, disinformation, and the clash of signals and noise shape our reality. This podcast unravels the intricate web of how it all connects, blending academic insights with the pulse of today’s headlines. Join us as we decode the hidden forces at play in our world.



Hosted on Acast. See acast.com/privacy for more information.

Show more...
Education
Technology,
Science
RSS
All content for CogWar is the property of Raymond Andrè Hagen and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.

Dive into the mind-bending world of Cognitive Warfare, where manipulation, disinformation, and the clash of signals and noise shape our reality. This podcast unravels the intricate web of how it all connects, blending academic insights with the pulse of today’s headlines. Join us as we decode the hidden forces at play in our world.



Hosted on Acast. See acast.com/privacy for more information.

Show more...
Education
Technology,
Science
https://assets.pippa.io/shows/cover/1751449963034-b700ce66-42d0-4a80-8778-a5e51a06a956.jpeg
Client-Side Scanning, the Moral Character of Cryptographic Work – Part 2
CogWar
50 minutes 8 seconds
3 months ago
Client-Side Scanning, the Moral Character of Cryptographic Work – Part 2

In this episode, hosts Raymond and James continue their deep dive from Part 1, exploring the nuanced political and economic implications of cryptography, client-side scanning (CSS), and its broader societal impacts. They emphasize that the technical arguments from Part 1 (regarding challenges and the tension between privacy and government access) still stand, but warn against a simplistic black-and-white view that could lead to alternative dystopias.


Key Points:


Reference to Philip Rogaway's Paper (2015): The discussion draws on Rogaway's "The Moral Character of Cryptographic Work," where he reflects on how cryptography, intended to prevent totalitarianism (inspired by cypherpunk ideals), has instead entrenched surveillance post-Snowden leaks. Cryptographers excel in technical analysis but fall short in political scrutiny.


Limitations of Cryptography: Cryptography prevents unauthorized centralization of communications (e.g., governments reading messages) but ignores authorized centralization. Tech giants like Facebook collect metadata (who you communicate with, not the content), enabling pattern detection and power through inferences. This creates an imbalance where cryptography bolsters big tech's dominance over states.


Crypto Wars as a Power Struggle: The conflict isn't just activists versus governments but a battle between states and tech corporations over evidence standards. Metadata alone makes it harder for states to prove intent (mens rea), while companies use it for predictions. End-to-end encryption weakens state power but strengthens corporate influence.


Atomizing Effect and Libertarian Dystopias: Cryptography individualizes communication, making collective action harder and favoring those with the most resources (compute, energy, bandwidth). They reference historian Quinn Slobodian and critique visions from libertarians like Peter Thiel or Murray Rothbard, where decentralization could lead to "might makes right" societies. Examples include Bitcoin, where those with the most power win (51% attacks), and DAOs (Decentralized Autonomous Organizations) that render systems fragile in crises (e.g., the 2008 financial crash).


Code as Law and Financialization: Cryptocurrencies emerged as a response to 2008, aiming to replace law with immutable code. However, legal analyses reveal they lack underlying value (no "potato in the field"), relying on the "greater fool" theory, new investors must inject money for old ones to profit. This makes systems unstable, and cryptography hinders rapid changes during crises.


Comparison to Firearms (Second Amendment): Arguments for cryptography mirror those for gun rights,it protects freedom against tyrannical states. But this invites regulations, like the Danish justice minister's proposal to limit access. Cryptography can cause harm (e.g., cybercrime, terrorism, CSAM), but cryptographers distrust unverifiable government data on these issues. They also discuss biopolitics: Cryptography may invite suspicion toward marginalized groups (e.g., queer or people of color).


Conclusion: Cryptography resists authoritarian dystopias but may enable fragmented, libertarian ones (e.g., "The Network State"). It's a balancing act; the technology doesn't solve everything and requires interdisciplinary analysis (math + social sciences). The episode stresses that issues like CSAM are real, not just rhetorical, and calls for nuanced debate.




Hosted on Acast. See acast.com/privacy for more information.

CogWar

Dive into the mind-bending world of Cognitive Warfare, where manipulation, disinformation, and the clash of signals and noise shape our reality. This podcast unravels the intricate web of how it all connects, blending academic insights with the pulse of today’s headlines. Join us as we decode the hidden forces at play in our world.



Hosted on Acast. See acast.com/privacy for more information.