/* Background */

This commit is contained in:
Demos 2015-03-16 05:50:15 +00:00
parent 4ea81a07fb
commit 13cfea2ce3

View File

@ -29,10 +29,10 @@ Today's communication infrastructure is predominantly centralized.
However, this makes surveillance and manipulation of arbitrary digital communications easier.
These means can be abused - and were abused - not only by dictatorships but also by democratic countries and international companies.Moreover, this infrastructure does not protect its users from such abuse and breach of privilege.
These means can be abused - and were abused - not only by dictatorships but also by democratic countries and international companies. Moreover, this infrastructure does not protect its users from such abuse and breach of privilege.
: There are indeed solutions like Tor or PGP which can partially patch the shortcomings of the infrastructure, but each user has to take care of that it for herself. Anonymisation and encryption are not in the standard configuration.
A penal action against these secret processes is nearly impossibly, starting with the problem that they are not even detected by the affected parties.
A penal action against these secret processes is nearly impossible, starting with the problem that they are not even detected by the affected parties.
This status quo endangers our democracy.
However, it can be countered in different ways.
The following is a technical approach: