2 Matching Annotations
  1. Oct 2017
    1. Cohenreferstoblockingas‘architecturesofcontrol’and‘regimesofauthorization’thatareauthoritarianinthegenericsensethattheyfavourcompliantobediencetoauthority.[11]Ratherthanexperiencingrules—whichneednotbeexplainedordisclosed—shearguesthatusersexperiencetheireffects,whichconsistofpossibilitiesforactionthatnetworkscreate.Sowhileconcernsaboutthesurveillanceandcollectionofdigitaltracesaremostcontroversial(discussedbelow),thetransparencyofnetworkprocessesandhowaccesstoknowledgeisbeingfilteredarelessvisibleandcontrollable.Filteringalsooccursthroughtheauthorizationsattachedtocontentanddevices

      [...] So while sharing is a calling, it is increasingly only within certain regimes of authorization that sharing operates, and in this regard it can be understood as a form of submission.

    2. Thatthesedemandshaveemergedinthespanofonlyafewyearsatteststowhatwecallthe‘closings’ofcyberspace.ThesedemandsandtheirclosingsareeffectsofthewayinwhichactingthroughtheInternethasresignifiedquestionsofvelocity,extensity,anonymity,andtraceability.Velocitycallsforregularandongoingvigilanceaboutrapidlychangingtechnologies,protocols,practices,platforms,andrulesaboutbeingdigital;extensitycallsforawarenessofwhereandtowhomdigitalactionsreach;anonymitycallsforlimitingandprotectingexposureandbeingcautiousaboutthepresumedidentitiesofothers;andtraceabilitycallsformanaginghowactionsaretracked,analysed,manipulated,andsortedbyunknownothersandforunknowablepurposes.Allofthesedemandsspringnotfromparticipating,connecting,andsharingalonebuttherelationsbetweenandamongbodiesactingthroughtheInternet,whichismadeupofconventionsconfiguredbytheactionsofdispersedanddistributedauthorities.Itistotheseconfiguringactions,whichwecalltheclosingsofcyberspace,thatweturntointhenextchapter,withafocusonfiltering,tracking,andnormalizing.