Life on the Forked Road
We are analog and digital. One is old, the other new. Civilizing the latter will take some work.
On a panel at the last LinuxCon, Linus was asked if the US government ever wanted a backdoor added to Linux. He nodded "yes" while saying "no".
While we're sure Linus meant what he said, his answer calls to mind the immortal words of Yogi Berra: "When you come to a fork in the road, take it."
We are at that fork now. We arrived when Edward Snowden began revealing to muggles what the wizards among us always knew, or at least suspected: that government spying on ordinary data communications among private individuals was not only possible, but happening.
I was talking the other day to a high-ranking US military officer who referred to our new collective condition as "post-Snowden". It is a permanent state. We aren't going back.
The central problem of post-Snowden life is that our lives are now both analog and digital. Snowden revealed the forked road we had already taken and made clear how hard it is to travel both at once.
The difference between the two sides of the fork is binary. The analog and the digital are as different and complementary as zero and one, which are also the only numbers we need for binary math. For better and worse, we now cohabitate a world that is both analog and base-2.
Today's use of base-2 mathematics traces back to Gottfried Leibniz, who wrote, "Now one can say that nothing in the world can better present and demonstrate this power than the origin of numbers, as it is presented here through the simple and unadorned presentation of one and zero or nothing." The thing "presented here" was the Chinese I Ching, which is wrapped around the more ancient notion of yin and yang, drawn by Taoists as the familiar symbol shown in Figure 1.
Figure 1. I Ching
Berra-ists might prefer another Eastern symbol, theendless knot shown in Figure 2.
Figure 2. Endless Knot
Both convey embrasure of irony: one in a state, the other in a path.
I'd love to see a symbol for this: embodied and disembodied. The symbol shown in Figure 3 will have to do for now.
Figure 3. Embodied and Disembodied
Our analog selves are embodied. Our digital ones aren't. Yet we manifest both ways to each other.
As fleshy creatures, being analog is our permanent fate. Being digital isn't, but it's what we also are now. We need to learn what that is and how to deal with it. And we have a long way to go before being digital comes as naturally as being analog. If it ever does.
In Philosophy in the Flesh, George Lakoff and Mark Johnson say, "The mind is inherently embodied." Because of this, they continue, our bodies supply the primary metaphors we use to make sense of the world. For example, we say good is up and bad is down because we walk upright. We say good is light and bad is dark because we are diurnal. If we were nocturnal, those might be reversed. We speak of life in terms of travel (birth is arrival, death is departure or passing on, careers are paths) because we are ambulatory animals. To live is to move.
It is also fairly easy to own things in the analog world, or at least to claim them as our own. "Possession is nine-tenths of the law" because it is nine-tenths of the three-year-old. She says "It's mine!", because she has mastery of her opposable thumbs. Possession is holding.
Our senses also extend outward beyond our bodies through a capacity called indwelling. When a carpenter speaks of "my hammer", and drivers speak of "my engine", it is because their senses dwell in those things as extensions of their bodies.
But how do we dwell in the disembodied place we call the Internet? It isn't a place, even though it has sites, locations and domains that we visit and browse. Our bodies, even in public places, tend to be clothed, with things we call "privates" concealed. On the Net—so far—we are exposed in ways that are foreign to our bodily experience. Even the muggles among us knew that, to some degree, in pre-Snowden time. Now just about all of us know our degrees of personal exposure could be...anything, to a degree that is incalculable in the limited terms of our analog experience.
This near-absolute range of possibility on the disembodied digital side of our forked road is encapsulated in this single line from Kevin Kelly: "The Internet is a copy machine". When you send me a digital document over the Net, you don't yield it, as you would in the analog way. Instead, you contribute to the proliferation of everything.
T.Rob says the difference ("is one of atoms versus bits". He goes on to explain:
When surveillance was physical Newtonian physics limited what could be done. We didn't need laws or policies stating that you couldn't surveil all of the people all of the time because to do so wasn't physically possible. Because we have never had that capability before, we do not have any experience with it from a policy-making standpoint.
Having always been constrained along that boundary by what was possible, it was difficult to overstep the line of what was ethical. Today we have the reverse. The line of possibility has withdrawn so far that it no longer constrains us from crossing the line of what is ethical. But we are so unused to having to exercise self-restraint along this boundary that many are not recognizing the ethical line when they cross it. Many are in fact treating it like a land rush, grabbing all the territory between the ethical line and the possible line before policy and legislation can step in to claim it.
I suspect in the end it will come down to manners. There will be things that we do not do, even though we can. I see hope in the word protocol, which is well understood in technical circles, as well as among diplomatic and other practices back in the analog world.
But I don't have faith. Not yet. Not while the land rush is still on for marketers and government agencies, trampling our analog sensibilities. Snowden's revelations may have marked Peak Surveillance, but they also marked the point at which we start to work seriously on civilizing our digital selves.
Doc Searls is Senior Editor of Linux Journal
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Humble Hacker?
- BitTorrent Inc.'s Sync
- The US Government and Open-Source Software
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide