16.21.1. Consider the "law" based approach
- a discussion group that wants no men involved ("a protected
space for womyn")
- so they demand the civil law system enforce their rules
- practical example: sysadmins yank accounts when
"inappropriate posts" are made
- the C&S case of spamming is an example
- Note: The Net as currently constituted is fraught with
confusion about who owns what, about what are public and
what are private resources, and about what things are
allowed. If Joe Blow sends Suzy Creamcheese an "unwanted"
letter, is this "abuse" or "harassement"? Is it stealing
Suzy's resources? (In my opinion, of course not, but I
agree that things are confusing.)
16.21.2. The technological approach:
- spaces created by crypto...unbreachable walls
+ example: a mailing list with controls on membership
- could require nomination and vouching for by others
- presentation of some credential (signed by someone), e.g.
of femaleness
- pay as you go stops spamming
16.21.3. This is a concrete example of how crypto acts as a kind of
building material
- and why government limitations on crypto hurt those who
wish to protect their own spaces
- a private mailing list is a private space, inaccessible to
those outside
- "There are good engineering approaches which can force data
to behave itself. Many of them involve cryptography. Our
government's restrictions on crypto limit our ability to
build reliable computer systems. We need strong crypto for
basic engineering reasons." [Kent Borg, "Arguing Crypto:
The Engineering Approach," 1994-06-29]
16.21.4. Virtual Communities-the Use of Virtual Networks to Avoid
Government
- that is, alternatives to creating new countries (like the
Minerva project)
- the Assassin cult/sect in the mountains of Syria, Iraq,
Afghanistan, etc. had a network of couriers in the mountain
fastnessess
- pirate communities, networks of trading posts and watering
holes, exempt-if only for a few years-from the laws of the
imperial powers
16.21.5. These private spaces will, as technology makes them more
"livable" (I don't mean in a full sense, so don't send me
notes about how "you can't eat cyberspace"), become full-
functioned "spaces" that are outside the reach of
governments. A new frontier, untouchable by outside, coercive
governments.
- Vinge's "True Names" made real
16.21.6. "Can things really develop in this "cyberspace" that so many
of us talk about?"
- "You can't eat cyberspace!' is the usual point made. I
argue, however, that abstract worlds have always been with
us, in the forms of commerce, reputations, friends, etc.
And this will continue.
- Some people have objected to the sometimes over-
enthusiastic claims that economies and socities will
flourish in computer-mediated cyberspaces. The short form
of the objection is: "You can't eat cyberspace." Meaning,
that profits and gains made in cyberspace must be converted
to real world profits and gains.
- In "Snow Crash," this was made out to be difficult...Hiro
Protagonist was vastly wealthy in the Multiverse, but lived
in a cargo container at LAX in the "real world." A fine
novel, but this idea is screwy.
+ There are many ways to transfer wealth into the "real"
world:
+ all the various money-laundering schemes
- money in offshore accounts, accessible for vacations,
visits, etc.
- phony purchase orders
- my favorite: Cyberspace, Inc. hires one as a
"consultant" (IRS cannot and does not demand proof of
work being done, the nature of the work, one's
qualifications to perform the work, etc....In fact,
many consultants are hired "on retainer," merely to be
available should a need arise.)
- information-selling
- investments
-
16.21.7. Protocols for this are far from complete
- money, identity, walls, structures
- a lot of basic work is needed (though people will pursue it
locally, not after the work is done...so solutions will
likely be emergent)
Next Page: 16.22 Data Havens
Previous Page: 16.20 Libertaria in Cyberspace
By Tim May, see README
HTML by Jonathan Rochkind