|
Economic structure; transparent customers Following the dynamics of informatised economies, the consumption habits and lifestyles if customers are of great interest. New technologies make it possible to store and combine collected data of an enormous amount of people. User profiling helps companies understand what potential customers might want. Often enough, such data collecting takes place without the customer's knowledge and amounts to spying. "Much of the information collection that occurs on the Internet is invisible to the consumer, which raises serious questions of fairness and informed consent." (David Sobel, Electronic Privacy Information Center) |
|
|
|
A Tool for Privacy The algorithm being the code leads to encryption. When Alan Turing worked on his Turing Machine, he planned a machine where the instruction-code was part of its working, where the binary code was a fixed logic in dispute, in other words the machine turning into its own algorithm, which means nothing else than dialectic. And exactly here the theoretical work on cryptography touches - as a consequence of the actor always having been part of the technical arrangements - an issue of modern democracy, the question about the private and the public: the terms are changing, do not fit to their original meanings anymore. One might say the Internet is something private. One might state the contrary. Both sentences are wrong. It is neither of them. Maybe we do not all feel it yet, but humans are going through a stage of blurred words, where classic definitions get lost, just like the codes/algorithms of behavior. The meta-narratives break down, not leaving anything but puzzle pieces. We can never be private on the Internet. Nor could we be in public if we were "out there" in virtual reality. Cryptography, the study pretending to work for privacy, cannot provide us with absolute privacy either, as the danger of losing it through a decryption attack hinders its prospering. At the latest with the quantum computers coming into existence the patterns of the encoded picture will not be visible anymore. At the same time the social relations, its exact and excluding meanings must blur. Democracy needs something to rely on, something to refer to, just like the private and the public. Still, our need for privacy on the one hand and curiosity on the other hand create the longing for cryptography of information as well as its decoding. "Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn't want the whole world to know, but a secret matter is something one doesn't want anybody to know. Privacy is the power to selectively reveal oneself to the world." (Cypherpunk's Manifesto) |
|
|
|
Copyright Management and Control Systems: Post-Infringement Steganography Applied to electronic files, steganography refers to the process of hiding information in files that can not be easily detected by users. Steganography can be used by intellectual property owners in a variety of ways. One is to insert into the file a "digital watermark" which can be used to prove that an infringing file was the creation of the copyright holder and not the pirate. Other possibilities are to encode a unique serial number into each authorized copy or file, enabling the owner to trace infringing copies to a particular source, or to store Agents Agents are programs that can implement specified commands automatically. Copyright owners can use agents to search the public spaces of the Internet to find infringing copies. Although the technology is not yet very well developed full-text search engines allow similar uses. Copyright Litigation While not every infringement will be the subject of litigation, the threat of litigation helps keep large pirate operations in check. It helps copyright owners obtain relief for specific acts of infringement and publicly warns others of the dangers of infringement. |
|
|
|
Sergei Eisenstein Though Sergei Eisenstein (1898-1948) made only seven films in his entire career, he was the USSR's most important movie-conductor in the 1920s and 1930s. His typical style, putting mountains of metaphors and symbols into his films, is called the "intellectual montage" and was not always understood or even liked by the audience. Still, he succeeded in mixing ideological and abstract ideas with real stories. His most famous work was The Battleship Potemkin (1923). |
|
|
|
Mass production The term mass production refers to the application of the principles of specialization, |
|
|
|
to decipher/decode to put the ciphers/codes back into the plaintext |
|
|