Hallo Du!
Bitte vergiss nicht deinen Fortschritt im Fortschrittsbalken auf der Seite des Talks einzutragen.
Vielen Dank für dein Engagement!
Hey you!
Please don't forget to mark your progress in the progress bar at the talk's website.
Thank you very much for your commitment!
======================================================================
With great pleasure, I announce to you, Nazan, who will be talking about exploiting theater and he will do the introduction of himself himself, give a round of applause to him. I guess I have to check the mike Mike works, OK? So audio for the audience. Oh, no audio. This would seem not to look good for Tom, so it's also still good hospital in this is a general what I mean, the one down at the Fulda in it on the tiny who, but on the high tech force for type one diabetes, high tech Gannascoli, he knows it somewhere over the fence. There is someone that actually wants to clear. All thumbs for the North Korean remains to go and stay there all the time. I think it's more than, you know, total. How do you see the start as Treadstone under his eyes for business to see what makes them feel? We've read that message as a vision that includes US dollar. Walk over to him and say hello. Jumbo, about Sasanian being here for so long and Jimmy and his. To Joe Nunc. Is that the. They are no matter how Otto or Monacan betrayer. What do we do about. The Professor Panichi to mock what he should show. We'll let you know if not for the Civil. Hmm. The hacker being a hacker means observing systems, figuring out their structure and using them for an alternate purpose. This observation also extends to humans themselves a system. Take, for example, this worker here at his locker just putting on his working clothes before entering the lab. It's up to me as a hacker to find the point of entry to influence his routine. Hackers are categorized by the color of their hat. Black hat hackers are those that hack for some malicious reason and white hat are those that do it to improve security. Overall, to me, such distinctions are meaningless and what matters is the natural curiosity of systems or environments. I want you to use this switch and I want you to switch it off and on again, three to one. What happens? What effect did it have? So where are we let's suppose we've entered the Iranian nuclear
lab, viruses or weapons can be installed using bugs in Windows software or something as simple as a USB stick pass between individuals like this Russian lab engineer working in the Iranian nuclear enrichment facility he'll find. OK. Your observation, he will use it. Do you think he trusts his environment, the tools he works with his computer? The nature of cyber weapons like Stuxnet, once they are used and from the moment they are used, they lose their usefulness over time. Once the weapon is discovered, it's easy to patch the operating system or software to be immune from future attack. Look at the mirror. What would a world be like in which all weapons would expire like Stuxnet? What would a world be like where a tank after two months would be useless, but also in this world you don't know when a simple tool you develop might get transformed into a weapon by somebody else and you have no say over where it gets used or against him. For example, deem this friend of mine developed a tool six years ago called Métis Point that is used to test security of systems. It is common for developers of such tools to release them open source. And this is what he did. Dean doesn't even work in the field of security anymore, and he went off to become a designer. But last year, emails were found between engineers at the Iranian enrichment plant claiming that his tool was being used to attack them. Apparently, this boy was used to gain access to the systems and the scientists reported the computers would start playing a song by AC DC at Max Volume in the middle of the night. The song was thunderstruck. Perhaps we should come to a point completing this operation of me, hacking you to do exactly as I said, take a right, go back through the hall and go back to the chair. And put the hat back on the chair exactly as you found. So this was a clip from Situation Rooms, this is a piece by criminy protocol that deals with the arms trade. It involves a cast, an astonishing cast of about 20
people whose lives are affected by the arms trade. I think my role as a hacker was perhaps the least significant. That includes people who were shot in protests in Syria, people who designed weapons and an arms manufacturer. I think there was an executive from an arms manufacturer, a member from the German parliament. And the list is quite astonishing. And I did play the role of a hacker, and that is what I am, a reverse engineer, hardware and software. But that is not what I'm here to talk about today. Instead, I'm going to talk about my work in theater and try to give you a sense of the questions that come up and that the motivations behind, uh, my involvement. In nineteen ninety seven, Eric Raymond wrote a little parable called The Cathedral in the Bazaar. In this parable, he distinguishes software development models into two categories. There is the centralized model where code is submitted to a central repository for arbitration, the cathedral. And there is the decentralized model where arbitration comes through the act of consumption, the bizarre. And he meant this as sort of to argue for the efficiency of the model of the bazaar. But we can see now that this model has a much greater impact on our society than just technology and code alone. If you were to, for example, look at its application in other hierarchies in society, you might see that journalism and finance are good places where we're seeing the impact of the bizarre model. Um, sorry. And this this is kind of what drive drives me to to to look at what the impact of this is on our behavior in particular. My fix is I'm kind of fixated on the consumption is arbitration elements. For example, if we apply this model to democracy, does that what does that do to a vote when the vote is not a vote, but just your consumption of an idea? And I think that some of the works do touch on this or rub up against it in some way. But I would like to present a sort of warning and how to perceive this talk. So I appear
to have doubled lines in 1840 for the first year of the Commercial Telegraph, Kirkegaard published a book called The Concept of Three. He was quite aware that a new environment had formed around the old mechanical one. And whenever a new environment goes around and there's always new terror and we live in a time when we have a manmade satellite environment around the planet, the planet is no longer in nature. It's no longer the external world. It's now the content of an artwork. This is a clip that was shown in a piece I'm going to show called Anonymous P, and I show it to say to you over the next hour, you feel like I'm pushing terror. That's not my intent. My interest really is human behavior. And I feel that technology and its intersection with it gives us an opportunity to from which to look at human behavior. And theater is not a space for literal discussion and debate. It's a space for experience. And it's quite possible that when you take questions that we have and put them into poetic form, that they could come out feeling like fear. But that's not my intent. The first collaboration I would like to. Discuss is Herman's battle with Romine protocol. Yeah, so OK, it's been sweet Muslimah out there, but I need to let it be so I can go online and that's been the thing that we've been not been able to open data. So that's the opening. This was a piece by Romine protocol. They make documentary theater instead of actors. They have what are called experts, which are people discussing things from their life and experiences. In this case, the cast was Barbara, talking about the Arab Spring and her sort of perception of it through social media. As an Egyptian, there is room Zia who survived a massacre, a genocide in Bosnia. There was I think I actually know there was a retired colonel who in NATO who was active in NATO around the same time as that conflict. There was myself discussing growing up as a non-issue in the Israeli territories during the second intifada. And t
here was Peter Glaser, who is a veteran who many here probably know, talking about his history and hacking and sort of his philosophy that he could bring to this discussion. I'm sorry, I have to switch my slides, can you guys just realized? OK, where are we here? There we go. OK. Still, I'm a in Silicon Valley, in his son has cancer for 10 years, yet he can ask me. So I told him, Dave said he gets a shot blocker. Then Asmaa Mahfouz in the video and our full seriousness to reach out to men a little bit, to talk a little bit about what might have done, if you remember me. What do you like about the idea? Is it happened in a. And Pachachi, well, he's a blogger, and time is his physical undergone gun since he was sick and now I'm from Sun just nasty often to let's call them beautiful little English. Fleisig, gratuitous, bad signing of this college system of the died online this month. These are MOUT stigma that things cannot be solved with. This is can also bend, Indiana monarchial figure that Althoff the interior potkin and find Basileus them on your video Watergates. That tells them that of course on Dimson soccer from Santo's mentioned for fans just to answer is less Mazzuca. This is incredible. God I wish I was there already. Three more days. Three more days to go down. And what of and Chechen is coming fast. And recently Putin was about up to snuff the. The office must go to these protests in Cairo happened even though they were strictly forbidden for today. Today's police detail, people are chanting things like Egypt is too much for you. Come in, come in. And our people are way away. And we're not in the. I just attacked us on the twenty sixth of January, the Egyptian regime shuts Twitter off, suspended in November and posted videos to tighten the country. In fact, these Mubarak placards often invent the war on terror, isn't it? That's my stupid idea. This is unbelievable. My God, I just can't wait to get down to more than one day's. That's why this site and the e
vidence of Constanten Fewster produced a bonanza for Facebook, Google is this massive. At Tahrir Square, clashes become more violent as well. Police are arresting people left and right, especially journalists, and more teargas. Twitter is still down. Holy shit. That means I can Google. I'm I'm texting. This must must be a lot of. First Twitter, now Facebook. Just like Syria and Iran and Iran, but the fact that one touched video this alleged was special and politicized and the inside is once again, holy shit, did something on a Mission Impossible in Tunisia and someone said to stay, somebody should street vendors something. And I'm asking if you don't have any vinegar soaked or water soaked bandannas with you or you're around someone who doesn't carry with you an onion, it's just break it in half and put it close to your eyes and nasal cavity. It greatly reduces the irritation. I learned this from a photojournalist in Gaza. That's what I'm trying to get done by talking to be at superspeed and Wolf, by my close up as Achmea spy. Spanish speaking Spanish The six others hurt about common debate on the twenty seventh of January. The communication networks are interrupted Facebook, Twitter and YouTube, fictional nationalistic emails and so on. Twenty eighth of January, the regime brings about a complete halt of the Internet and Killswitch yesterday to tie up Chakram. And it's not an Internet connection because she did this, people helped. At least nine Middle Eastern and North African states, sensors use Western build technologies to impede access to online content. The list of sites blocked or maintained by these same Western companies, for example, McAfee Smart Feltri maintains an online database with over twenty five million websites that can be blocked in over 90 categories, including anonymizing technology, government and military information, hacking information history. But in Killswitch, in a cookie capacity to build a mysterious online group and a forgotten my hu
sband. And he has said Sonsini is a small school, a. Fleeing. Seizure of Traugott million CDs are forbidden for Crown reasons. He didn't act it Howman in Denmark, due to a leaked communication on the Internet, is all about trust. If I want to communicate with Barbara, for example, with absolute secrecy, I have no way of knowing if her Internet provider or mine or her government or mine are not watching our wires and monitoring our communications. So to communicate with her securely, I use encryption. First, I have to obtain her key. This, for example, is my key. Once I have her key, I can encrypt a message by putting it in this box and now only she is able to see the contents of this box. Now I can send it to her and neither her government nor mine nor her ISP nor mine can see the contents of that message. However, they can still see that it was Barbara and I who are communicating with each other, and this also carries a risk. So to protect against this, using an anonymous network called Tor the onion router, TOR is basically like a series of encrypted boxes everyone is participating on. The network has a box that they can share with someone else to use with these boxes. Only the person that gave me the box is able to see whatever is put inside. So using them I can create a sort of secure routing protocol on top of the Internet. I take my message and put it in a series of boxes creating various layers, much like an onion. And then I send this package to the kernel back over the Internet. When he gets it, he sees a box for him that he can open. But inside he finds another box address is not at the moment is injured and not able to go upstairs. So Brummels North would normally open his box and see a box from Amasia who would eventually open the box and see a box addressed to Bartlett. In this way, for example, the colonel is unable to tell where the message is going. He can only see that he got something from me, but he has no idea that it was meant for Barbara. And R
osea can only see that she said something to Barbara, but she has no idea what it was and where it came from. So in this way, I can communicate with Barbara both securely and anonymously, without governments being able to correlate the who, what or why of our communication. This service is used by dissidents in Iran and Syria to communicate freely online about crimes against humanity or corruption. And for this reason, its development is sponsored in part by the US government. But it can also be used by such organizations as WikiLeaks to protect whistleblowers and expose corruption in the West. And for this reason, some of its developers are at this very moment being prosecuted by the US government. So we also do this this piece, by the way, was around 2010, we also dealt with the issue of bitcoin and assassination markets. But this actually this part inspired a piece which we worked on recently. So I will detail that. Right. A Might is a piece we just recently performed in Giessen for the discourse office where we tested it there. I should say we used a lecture performance format to test it. The name is taken from the papers exchange between Freud and Einstein in nineteen thirty two, where they kind of discuss this concept of right of MIT, which were also quoted in Gimbals as an assassination politics paper, which he sent to the cypherpunk mailing list in the 90s. In this piece I play a neo liberal character. I play a character who is sort of this libertarian decentralization will solve all our world's problems, which I actually think is quite pervasive and whom I disagree with in many ways. And question, um, what you see here is the opening where I create paper Bitcoin wallets and put one euro worth on each wallet and then I hand them out to the audience. This character has this ideology that he wants to profess, which is that the problems of the world, specifically ecological problems, have to do with economic models that require constant growth for which inflati
on is part of that. But he gets a little twisted and he blames this problem on the inability for us to not compete, and in particular, a psychological bias of males on competition. So he blames it on males. And then he looks at Bitcoin as being a sexual this is theater, by the way, as asexual and as a solution to this. And I cannot quite show you all of the elements, but I'll give you a small taste. Inflation, the increase in prices and decrease in the purchasing value of money. So this is 10 kg of rice, which I purchased yesterday in Giesen for the price of twenty five year. With it slowly falling to the ground, it is gradually losing its value so much in the same way that the euro loses its value over time. The guiding principle of the European Central Bank is that the inflation of the euro should hold around two percent per year. That means that the same twenty five euro that today will buy you 10 kg of rice tomorrow, sorry, by thousand and twenty it would purchase you around eight and by 20, 30, less than six. This devaluing of money is inevitable. We know this. But why is it necessary if the European Central Bank didn't make certain that our money slowly loses its value over time, we would hold onto it too much. Inflation creates a sort of pressure, forcing us to constantly move our money and put it into things of actual value. But why can't we instead just keep the money that we've earned? What's what's wrong with us? Paradoxically, our society can only retain its stability when our economy is growing. The main principle of our economic system is growth. I think that's the issue of this constant cycle of growth and competition has to do with male dominance and a neurological dependance of males on competition as an indicator for self worth. There was this interesting study in Finland called Gender Differences and Emotional Responses to Cooperative and Competitive Gameplay. Now, previous research in the field of psychology has already shown definitively that me
n prefer competition. But what this study wanted to examine whether was whether men have a higher emotional response to competition than women do. And the way in which they measured this was by looking at the heart rate and facial muscle activity as an indicator of emotional response. And indeed, the results show that men have a higher emotional response to it during competitive rather than cooperative gameplay. This man has a neurological dependance on competition. But more interestingly, what this study also shows is that women have no psychological hindrance or psychological preference towards competition. In fact, it shows that they treat both competition and cooperation with the same level of importance. So this woman has no bias. Yes, so, uh, we we get to the moment where we sort of I don't know if I. Yes, I have another one. Sorry. To do this with Bitcoin exclusively, we take away the tool that those in power have to force economic growth. The central bank, the central bank is the group that determines when to print money and when not, and ultimately determines what the value of your wealth is or will be in the future. And this control over a currency is power, political power, which is why. And Margaret Thatcher argued so strongly against the creation of a unified European currency in Parliament in nineteen ninety four. The Prime Minister, would you tell us whether she intends to continue the fight against the single currency and an independent central bank when she leaves office? She's going to be on the job. For the prime minister, what a good idea. I hadn't thought of it, but if I were there, no European Central Bank accountable to no one, least of all national parliaments have that kind of European Central Bank is no democracy taking powers away from every single parliament and being able to have a single currency and monetary policy interest rates, which takes all political power away from what she said, is that a European Central Bank would be a subver
sion of democracy, that this would take power away from the people. But I think we should go further. And I think that using virtual currencies takes power not only away from national central banks, but takes power away from all central banks. So with the audience primed with their interest in having this Bitcoin in the pocket, they're pocket this paper, what we come to the end scene, which is you. This is Assassination Markets, a crowdfunding website that lets users anonymously donate Bitcoin in order to have basically leaders murdered and some of the bounties have already raised tens of thousands of dollars. The author of this concept, Assassination Market, was an electrical engineer at Intel named Jimbo after publishing his paper. He spent nearly 10 years in the US prison. In his paper, he quoted Freud's concept of the rights of MIT in one corner of the Dark Web. So it's an interesting rendition of this assassination market concept. In this market. In this market, the winnings go to the assassin that kills the target. The currently has the highest price on their head. So what you see happening right now is that users that support Julian Assange, that means users that want to see him continue living are earnestly trying to get people to put Bitcoins into the pool for Assad, because if they don't do that, if they don't get Assad's price up, then any would be assassins out there would be more inclined to kill Assange rather than Assad. Now you hold in your hand one Bitcoin, it's yours and I want you to use it however you choose, but until you import it to your phone or your computer or use it, I still have access to them because I have copies. And if you don't do this and use it within two weeks, then a bet will be randomly placed for you in this assassination. And with that, I open the floor to questions. So sorry. I would like to clarify first that that assassination race website and the Assad versus Assad competition and race exist only on localhost. It was creat
ed just for this theater piece, and it's not real, but the audience doesn't know that initially. And so it would have this kind of impact. And this is kind of what I meant. Perhaps for some maybe this is a moment of terror to some degree, as Marshall McLuhan would say, where the algorithmic world wraps around the physical. But I don't I don't mean for it to be that way. I mean, the the era in which Freud and Einstein discussed the concept of right of might, meaning the power of a collective over the violence of individuals. That's basically the summarization of the concept. It was an era of unionization, unions and an increasing importance of the collective. And, uh, but what happens, I wonder and with this example, I wonder what happens when we live in a world where we have only the collective. Hopes from it seems that we're always trying to progress in the direction that power is distributed more to the people's hands that we give the people, the more potential to participate. Technology will make this happen. But if you go to the absolute limit of this idea, that is absolute democracy. It's not something I'm sure that I want. That's the closing scene from Hermans battle from 2010, just after we kind of introduced the concept of of this type of market there. And to me, assassination markets sits at an extreme end of the scale of things that utilize collective consensus. It's an end which I hope we never get to, and I hope we never have to depend on them. But it brings me back to the broader question of what happens when you reduce the weight of a stakeholder to that of a consumer. We have one scene. We have one scene in Herman's battle where Barbara is looking at a website called A Vizag, which is a site which tries to utilize the potential of the like button for political action. And they are they are effective in the in some of the the issues that they do tackle. But I was trying to look in the reverse direction at the people constantly hitting like and there's
this scene with Barbara sort of reading them off. This person likes that free Snowden, whatever this person likes, that was worth waiting for. And so to me, what's what's interesting is what happens when the like button becomes our voice. That's what I find interesting. Or to put it another way, what happens when, how or how does the pervasiveness of the things on the left affect things in the category on the right or how we perceive it? Um, so that's the question. Sorry, this is the next project. Last night. I was being chased. Serge. In a district divided into the semester by. Instead of attorneys, this this is going to get worse with the next generation of next generation who extend the capabilities of this sort of to. You realize that you may be willing to accept your. And the beauty of the punishment was this. You know, like be himself there forever as an example. Trust me, there's an off button. Learn how to use it. It's not me or my team do I think we need is it Jupiter, Jupiter, and we have a little problem here. Could you please go up to the phone, find him, Jupiter, and there is somebody who's actually not in the game, but a Voca kind of golf ball. You know, it the character Randall, you're talking about the glove. Is there someone with a real name for a little sort of look, you guys a bunch of email addresses, one to in fact, h you're in the room. We want to help you. So don't be scared. Actually, this is quite important. I say, what's going on? So what happened is, is that you you weren't playing in the game. Your phone was leaking passwords and showing us all of your e-mail is what you would call my impression. Maybe this wasn't your original phone, but you're not in the game and your phone is the password. You also have an email, your email. It's also a feedback and your assistant stuff. And that was the situation with Jupiter, that Jupiter, your passwords are leaking richer in the game. We could also read your emails like this one tonight is the capab
ility of password kids can have. As I am getting it, you just don't know how to delete it. There should be at least let's look at the system anyway. You it works better because she's going to go with them. Oh no. Oh no. Sorry. So she's going to get help right now. You might think this is a special circumstance, that this is a special network, but it's not. Everything we have here is what exists in an Internet cafe. Anyone sitting close to you in an Internet cafe could also give your passwords. And maybe a lot of you decided not to use your phone because you were worried this would happen. And that's a real pity, especially especially for Rudolph, because he won't ever be in. But at least she's cute. You know, she comes out. But she said, I don't know about the rest of it. So this is a small segment. Sorry for the audio from the show. Anonymous P. This is a piece by Chris and Cristiana. They would have loved to have been here presenting, but they're away on another project at the moment. What you see here, the scene is users coming into the theater and registering for a random persona that's assigned to them. The actual only reason for it is that we can secretly take a picture picture of them. When they register, they're registering, uh, they're registering to play a data trading game, which plays an important role in the show. The show is a show between you, your device, the actors and the hackers in the space. And we use a lot of different methods to turn your device into a tool of discrimination against you. Um. So it's kind of an installation, so you see the space here and it's an installation. It's a large group of people that worked on all the code and some of them are here, at least at the Congress or are here in this space today. And one of the first things that happens to you when you come into the when you register is you have to play a game. Some people may recognize this. It's a it's it's the history hack where any website, if they can convince you to int
eract with it in some determinate manner, can sort of get you to reveal the history, your browser history. So you're you're revealing your browser history when you click on the Red Square in this case. And each red square is a link to a website, but you don't go to it, but you tell us you have it normally in the real example. That way, then you didn't get a view of your psychological profile based on the categorization. But we don't show you that in the game. We just add this data, your browser history, to a whole pool of data that we use dramatically in other scenes during the the entrance. You may notice some people there's a packet monitor here. There's a scene at the beginning where Cristiana reads out packets in a very literal manner. It has this effect of sort of giving you this ghost or remembering this ghost kind of of the technology that this seems so opaque and we don't understand. And this comes back every once in a while. And we wanted our actors or they needed to be able to easily read this and know that we're monitor, we really found would make it easy. So we wrote one which you can find at this link. It's released under the non white heterosexual male software license. And have fun. When you come into the space, you scan someone and then you are asked a question or you get three random questions. Questions such as does this person have a tendency to cheat on their partner? And you see there is a monetary value placed on each question to gather. This sort of is the value of all of the data. Should we sell it after the show? And while you're running around scanning people and having fun, we are the hackers and the actors are monitoring profiles looking at them. There you see the picture we secretly took trying to find we're looking for data in the profiles that we can use on these people in these scenes. So here you can see how we know that Buddy has an Apple device. And for most Apple devices, the network name reveals their real name. I won't go over i
t all. We have the we can sometimes tell who you came to the show with just based on your behavior. We can see the total value that you've given us with all the data that you've compiled on other people or that it's been compiled on you here. We would see your browser history and then an overview of the, uh, of the questions. I wonder if I can just skip forward, um, which is what the audience sort of determines from you. We can also see your movement in the space, a whole bunch of different pieces of data, and it gets used in various ways, such as this scene from film about somebody. Somebody. Yeah. Did this person we know him as Jimmy Jimmy Buffett. Do you remain steadfast? And then there's somebody very keen to contact you who is not here this evening and they know that you're worried because we know that you missing the info. So you're worried about the money because we think might be a fair customer. And let me play with the. But I just want to let you know that there's somebody here who cares about you just trying to seek a personal message to help you. It's just a feeling of getting, you know, another image, getting a little bit to the old lady standing in a kitchen that's still useful. I know you're out of it, but I think you're still a student. And and I know that your name is your nose and your nose, you know, somebody who lives in another country. And this person is trying to save you a photographic image on the very personal nature thing. You should look at that deceiving. But look at it. The to or the data may be used when you go to the bar to order a drink. Here we see Venus has tried to order a beer and because she makes over five thousand Swiss francs or the audience determine that and because she has an Apple device, she's charged two euro extra. Um, so. Before the show, actually, we get a list of names in some cases of people that are coming to the show and we do research and we find ways to, uh, get information on them. We, for instance, get pictur
es of them or their friends and use them in a couple of scenes. And here is one scene. It starts in Germany, sometimes as its dominant system, doing all this analysis in Switzerland. I think it's because of that person than. For me, for those who don't talk about Facebook's facial recognition algorithms, this place is not something that is something that, you know, something be able to do. So that's for our country has done. Have looked at. So is any of this, in my opinion, one of the. And then finally, just a little bit later, I would also like to take you to the Situation Room for businessmen and are younger and the ones that have come in. It is. What does that do to the facilities in the Twin Towers, you don't see text message readings and links that can last for life in the hospitals, you know, hospitals and stuff. And I just want to point out this. The the leads to the exact detail about what happened. And they actually said that this is these are Mansbach seven. So it's quite effective, I think, to see a picture of yours sort of ripped through with nails and have a discussion about Facebook's facial recognition algorithms at the same time. Here's another scene. It is now 1984. It appears IBM wants it more. Apple is perceived to be the only hope for IBM to run for its money. Dealers initially welcoming IBM with open arms. Now fear and IBM dominated and controlled future. They and desperately turning back to Apple as the only force that can ensure the future freedom. IBM wants it all and is aiming its guns on its last obstacle to industry control. Apple will blue dominate the entire computer industry. The entire information age was George Orwell, right about 1984. You know, last night I had a terrible dream that this really bad dream, I was on the set and I was running and this thing was chasing me and basically what it was, I was chased by a giant search engine, giant search engine in the sky. Following needs to be down at the of the. And then I would run a lit
tle bit more down and talk back on one of those dreams and go on forever, ever. You don't get anywhere with the search engine kept coming. Why why is this happening? And then in the dream, I realized maybe somebody just trying to write, which maybe turned out to be the case. I don't know, because basically at that point, the search engine came to me and said, Chris. Plus, we don't want to hurt you. We were just trying to set up a profile of you, and then I realized the search engine wasn't chasing me, picking up all those little pieces of data that's behind it. And, you know, the tweets and the messages and the cell phone logs and the G.P.S. traces, this thing was coming and picking up all those things. Right. And I have to say this just to be right. I immediately went over to the tax office. I have. So we still in the dream? No, I woke up. I woke up in a cold sweat. I went to the top and I went to the building to talk to the journalists all the way to the website. I mean, I went to the website. I put my name in it, returned to see somebody to bring in something about. There was something I did and anybody about. You know, you bring up anything. Oh, yes. Next time you do a sit in the mind to my boys, this is a suggestion that was actually the point of the story. And what it tells me later, the time that I realized that I was being followed by a lot of stuff like Berkeley. There was also Google Analytics was on a website there a thousand times around a thousand cookies, and they were all there. And then actions were taken to decide who Time on the Science is created an app just for me that was just following me around. So this is no time to precrisis. The show is was very research driven. Chris and Cristiana put a lot of research in it, and one of the topics that came up was forgiveness in a world that doesn't forget not to say that differently. What is the importance of being able to forget, to forgive ourselves? And this kind of inspired an installation for theater
s that let us do this. We sort of hijacked their website a week before and every user presented this at least once or twice. The sequence, which starts to open links into your browser, to subversive sites, to different sexual orientation sites, queries, different languages. It's very real. It does this in a very real way, and it actually does so half the time using the Google I feel lucky feature. So any state agency that might be monitoring your your nation's networks will now see you're interested in al-Qaida, but also it will be in your Google profile. So you'll get different advertisements, which is a good thing. So this this show I'm sorry, the conclusion, kind of the inspiration was that forgiveness in a world that doesn't forget is noise. And the so kind of forgiveness is entropy. And it kind of gives you this whole mantra, mantra throughout the whole thing, kind of this propaganda. Right. So, uh, so that's that's the show. But let me bring this back to where I started. And I'm almost finished with the examination of what affects a collective consensus in the bazaar has on our behavior. In one of the shows that we had, we had a person whose password was leaking and we pulled this person out and we put them in the hut. And I asked her, did you know this was going to happen? She said, I don't care. And I was like, but we can read all of your emails and see all of your Instagram. And she's like, I don't care. And this character, perhaps for many of us, is someone that we feel we need to educate on the importance of privacy and civil liberties. But it's also, I think, actually much more common and becoming more common, this type of mentality, because our identity or the way we perceive self is changing. We're slowly changing from identity itself into society, with network being a very central role, a part a part of identity. So in it to illustrate it better, um, a month ago or two at the Academy of Sociality, a philosopher, Alice Le, gave a talk about the works o
f Derrida and George simul in relation to the importance of secrecy in relation to written relation ship to our identity. And she summarized their work with this nice saying, which is you are an individual only to the extent that you are not transparent. And this sounds very nice. We are not just fighting for privacy or civil liberties. We're fighting for the meaning of identity or individuality. And that's that's true. But there's still, uh, there's still a change that's definitely happening to self and how we perceive it. And this is kind of why I argue that we should be talking about post existentialism, not post privacy, and to kind of, uh, to kind of summarize things. I think that the tools really have an impact on this and are important, but I think something we don't really perceive is the importance of the protocols, the ethics in the protocols and what impact that has on our collective behavior. And to kind of illustrate this, I will use a song. And second. OK, that one maybe. Oh, I don't know why it's not working. Why don't know. OK, so I'm sorry, I don't know why it's not working. Uh, we can try another song anyway. I think you get the point. What you're seeing happening here is is actually a political philosophy. It's it's a political philosophy that's embedded into one of the deepest parts of the protocols that we use every day. It's GOP. Um, and, uh. It's GOP and GOP is a broad name that describes a part of the Internet that, for example, prevents YouTube and GIMA to to restrict access to certain content to visitors from Germany and the rest of the world, it may show up in different forms, but that's how we see it in Germany. And this is possible because every computer online is given an Internet address that can be used to determine the nation of origin. And any sort of attempt to recode the Internet protocols so that this is not possible would come into a huge wall of resistance because there are a lot of business models that are increasingly depende
nt on it. But this same technology and the same political philosophy in the protocol is also what permits to some degree censorship and surveillance. This is one of the key score rules with which Jacob Appelbaum released last year. Here you see the NSA is using the location. You don't see the IP address, but this technology is using the location of IP addresses to determine whether or not you are a citizen that is allowed to not be monitored when you visit the Tor Project website. And this depends on this floor or this political philosophy in the protocol. But this same feature, I would argue, can actually, I would argue, kills people because to fix it, sorry, because to fix it would potentially make it difficult to follow people or track people that are in more desperate regimes, meaning if we were to fix if we were to throw them out the door and we don't care about government anymore, we might be able to actually solve some very life threatening problems for other people in other parts of the world. And I think any engineer should be completely ashamed that it took the NSA scandal for us to potentially be aware of this. And actually, the truth is we still aren't, because there was a professor from France that sent to the Internet engineering task force at their official appeals board, a sort of request to consider societies and ethics when we build protocols and that sorry, the the Internet engineering task force was not our problem. And this whole argument about the ethics and the protocols, I think is really important and missing. And I actually ripped this from a from someone who wrote about this on the cypherpunk mailing list earlier this year. And this person who wrote an email titled GWP is a Threat to Democracy, ended it with this one saying, which I will also end with, which is those who would trade liberated networks for efficient, efficient networks deserve neither. That's a thank you. All right, we already a little over time, but since there's nothing i
mmediately afterwards, I will allow a single question from the Internet, so I'll signal Angel, please give us a question. There are no questions on the Internet. All right, anyone here? Well, we can do a single question, but otherwise I think we can also let the stand for for itself, so. Oh, the the question was, where's the next show, OK? Situation Room. You have to check their site. They're all over the place with the first thing I showed. Herman's battle hasn't been played for a while. Anonymous P will be in Vienna in March. What else did I miss in Glasgow in May? Probably in India now. We've kind of gotten a confirmation. There's some discussion about Los Angeles. There's some discussion about potentially Israel, but we don't really know about that. My peace of mind is an ongoing project may show somewhere, but I can't really say I feel really ashamed to say this, but follow me on Twitter if you want to know. But I feel horrible asking for that, so I don't know. Thanks. OK. Thank you again, Nathan.