From here: https:/
Spyware 2.0 is not cloak and dagger. It’s not hiding in the shadows; it’s hiding out in plain sight like some saccharine Ronald McDonald statue. Spyware 2.0 is all cute doodles and loveable dinosaurs. It’s all the colours of the rainbow. Spyware 2.0 is so damn adorable that you just want to hug it as tightly as you can and never let it go. Spyware 2.0 loves you like a kitten.
The only difference between Spyware 1.0 and Spyware 2.0 is that the purveyors of spyware in the Internet era are not doing it entirely in secret.
I say entirely because they are not completely transparent either. Privacy policies spell out general usage but omit granular, comprehensive use cases. What analysis and experiments do they perform on you and your behaviour? How is the data you provide combined with other third-party data and what additional insights about you does this provide? Given the myriad of applications for your personal information, some of which haven’t been dreamed up yet, I would argue that is it impossible for spyware vendors to be entirely transparent and comprehensive in their disclosures even if they wanted to be.
Spyware: the dominant business on the Internet
Whereas Spyware 1.0 was an anomaly — easily-identified as malware — Spyware 2.0 is the hegemonic norm of the Internet era; rendered invisible by its very ubiquity.
The purveyors of Spyware 2.0 tell us that we have the choice to not use their services; that we volunteer our data willingly. But do we really have a choice when the business model of spyware itself is a monopoly on the Internet today?
Say I choose not to use Google and use Yahoo instead. What is Yahoo’s business model? Oh, it’s the same: to spy on me. If I drop Flickr for Instagram, what is Instagram’s business model? Yep, you guessed it! As the business of spyware is a monopoly on the Internet today, the choice we’re actually being presented with is this: either accept being spied on or go disconnect yourself from modern life.
Spyware is the perfect term to call the services, devices, and connectivity offered by companies whose business model it is to observe and study us in order to manipulate our behaviour for profit. It is the term that I will be using from now on and I invite you to do the same.
- not free software
- runs in a browser
- runs on a smartphone,
- the user doesn’t generate, or exclusively own the private encryption keys,
- there is no threat model,
- uses terminology like “cyber”, “military-grade”, or other marketing mantra,
Photography has become a networked process. It no longer ends with pasting prints into an album. Instead, making them public through services like Flickr is rapidly becoming one of the main ways how we treat our visual memories. The photographic process extends from preserving a moment to an act of telecommunication, with numerous implications on how we perceive reality, how we make our memories and how we create a narrative from it.
Signal provides end-to-end encryption for your calls, securing your conversations so that nobody can listen in.- Signal uses your normal phone number to make and receive calls, so you don’t need yet another identifier.- Signal calls are encrypted end-to-end, but function just like you’re used to.- Free and Open Source, enabling anyone to verify its security by auditing the code.- Uses wifi or data, not your plan’s voice minutes.
Private Conversations for Everyone.
Cryptocat is an instant messaging platform that lets you easily have private conversations with friends. Messages are encrypted before leaving your screen and are protected from being viewed by any third party, even from us.
Cryptocat is free software built on open standards. Our development process is under continuous examination by a community of volunteers and enthusiasts. Learn more about the Cryptocat Project.