What’s up today? (Part 1)

Great article.

There is a rich but incomplete field of emergent work to draw from: New frameworks such as Socio-technical Security , and Decentralization off the shelf , exist to assist protocol designers understand and model interfaces and threats more completely and realistically.

Here is the Decentralisation off the shelf reference but have yet to find a decent Socio-technical Security one.

From concluding paragraph:

We can no longer marvel at the novel interactions afforded by peer-to-peer technologies, nor perform political theatrics within these networks. We need to lay aside our delusions that decentralisation grants us immunity – any ground ceded to the commons will be met with amplified resistance from those who already own these spaces. When this happens, every single arrogant tradeoff, every decision made in ignorance that assumes a stable march towards progress without regression will be called to account. Without cohesive organisation, mobilisation to harden security and privacy and without a sincere commitment from protocol designers to revise their collective assumptions, the push back from incumbent power will leverage each and every socio-technical flaw in each and every network. The fallout and trauma for increasingly digitalised communities will unquestionably dwarf the 2000s Copyright War. If there is no collective worldview reset, the peer-to-peer movement will remain a historical novelty, a technological bauble and thought experiment for detached technologists unable to understand the political gravity of their tools, and whose life work will never withstand the attacks against it.

These concluding remarks remind me of the protocol obfuscation discussions such as this one held on this forum over the years. When Safe Network succeeds authoritarian-lite countries and ISPs will degrade the undesired protocol, full blown ones are going to block it outright… if they can. The Safe Network will require the ability to effectively disguise communication as https traffic. With luck the QUIC Protocol will allow this without much extra work there is certainly a lot of related discussion in the QUIC community.

11 Likes