[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/philosophy po/surveillance-vs-democracy.tra...
From: |
GNUN |
Subject: |
www/philosophy po/surveillance-vs-democracy.tra... |
Date: |
Sat, 21 Oct 2017 08:29:16 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 17/10/21 08:29:16
Modified files:
philosophy/po : surveillance-vs-democracy.translist
surveillance-vs-democracy.zh-cn.po
Added files:
philosophy : surveillance-vs-democracy.zh-cn.html
philosophy/po : surveillance-vs-democracy.zh-cn-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.zh-cn.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.translist?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.zh-cn.po?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.zh-cn-en.html?cvsroot=www&rev=1.1
Patches:
Index: po/surveillance-vs-democracy.translist
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.translist,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- po/surveillance-vs-democracy.translist 1 Aug 2016 17:58:10 -0000
1.13
+++ po/surveillance-vs-democracy.translist 21 Oct 2017 12:29:16 -0000
1.14
@@ -13,6 +13,7 @@
<span dir="ltr"><a lang="ru" hreflang="ru"
href="/philosophy/surveillance-vs-democracy.ru.html">ÑÑÑÑкий</a> [ru]</span>
<span dir="ltr"><a lang="sq" hreflang="sq"
href="/philosophy/surveillance-vs-democracy.sq.html">Shqip</a> [sq]</span>
<span dir="ltr"><a lang="uk" hreflang="uk"
href="/philosophy/surveillance-vs-democracy.uk.html">ÑкÑаÑнÑÑка</a> [uk]</span>
+<span dir="ltr"><a lang="zh-cn" hreflang="zh-cn"
href="/philosophy/surveillance-vs-democracy.zh-cn.html">ç®ä½ä¸æ</a> [zh-cn]</span>
</p>
</div>' -->
<link rel="alternate" type="text/html"
href="/philosophy/surveillance-vs-democracy.html" hreflang="x-default" />
@@ -27,4 +28,5 @@
<link rel="alternate" type="text/html" lang="ru" hreflang="ru"
href="/philosophy/surveillance-vs-democracy.ru.html" title="ÑÑÑÑкий" />
<link rel="alternate" type="text/html" lang="sq" hreflang="sq"
href="/philosophy/surveillance-vs-democracy.sq.html" title="Shqip" />
<link rel="alternate" type="text/html" lang="uk" hreflang="uk"
href="/philosophy/surveillance-vs-democracy.uk.html"
title="ÑкÑаÑнÑÑка" />
+<link rel="alternate" type="text/html" lang="zh-cn" hreflang="zh-cn"
href="/philosophy/surveillance-vs-democracy.zh-cn.html" title="ç®ä½ä¸æ" />
<!-- end translist file -->
Index: po/surveillance-vs-democracy.zh-cn.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.zh-cn.po,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- po/surveillance-vs-democracy.zh-cn.po 21 Oct 2017 12:13:53 -0000
1.1
+++ po/surveillance-vs-democracy.zh-cn.po 21 Oct 2017 12:29:16 -0000
1.2
@@ -851,8 +851,8 @@
"a>”ï¼å 为è¿äºå¿ç»å¸¸åçï¼ç¹å«æ¯æå
³æè®®è
å<a
href=\"http://"
"photographyisnotacrime.com/\">æå½±è
</a>æ¶ãï¼å
å·çä¸ä¸ªåå¸è¦æ±è¦å¯å
¨ç¨ç©¿æ´"
"å½åæºï¼ç»ææ¯<a href=\"http://www.motherjones.com/kevin-drum/2013/08/"
-"ubiquitous-surveillance-police-edition\">è¦å¯ä½¿ç¨æ¦åçç°è±¡åå°60%</a>ã"
-"ACLUï¼ç¾å½å
¬æ°èªç±èçï¼å¾æ¯æè¿ä¸ªåæ³ã"
+"ubiquitous-surveillance-police-edition\">è¦å¯ä½¿ç¨æ¦åçç°è±¡åå°60%</a>ãACLU"
+"ï¼ç¾å½å
¬æ°èªç±èçï¼å¾æ¯æè¿ä¸ªåæ³ã"
#. type: Content of: <div><div><p>
msgid ""
Index: surveillance-vs-democracy.zh-cn.html
===================================================================
RCS file: surveillance-vs-democracy.zh-cn.html
diff -N surveillance-vs-democracy.zh-cn.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ surveillance-vs-democracy.zh-cn.html 21 Oct 2017 12:29:16 -0000
1.1
@@ -0,0 +1,342 @@
+<!--#set var="ENGLISH_PAGE"
value="/philosophy/surveillance-vs-democracy.en.html" -->
+
+<!--#include virtual="/server/header.zh-cn.html" -->
+<!-- Parent-Version: 1.79 -->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>æ°ä¸»è½å¤æ¿åå¤å°çæ§ï¼ - GNUå·¥ç¨ -
èªç±è½¯ä»¶åºéä¼</title>
+<style type="text/css" media="print,screen"><!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+ #intro { max-width: 55em; }
+ .pict.wide { margin-bottom: 0; }
+}
+-->
+</style>
+
+<!-- GNUN: localize URL /graphics/dog.small.jpg -->
+<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
+<!--#include virtual="/server/banner.zh-cn.html" -->
+<h2 class="center">æ°ä¸»è½å¤æ¿åå¤å°çæ§ï¼</h2>
+
+<p class="byline center"><a href="http://www.stallman.org/">Richard
Stallman</a> è</p>
+
+<!-- rms: I deleted the link because of Wired's announced
+ anti-ad-block system -->
+<blockquote
class="center"><p>æ¬æçåçå¨2013å¹´10æå表äºè¿çº¿ï¼Wiredï¼ã</p></blockquote>
+
+<div class="article">
+
+<div id="intro">
+<div class="pict wide">
+<a href="/graphics/dog.html">
+<img src="/graphics/dog.small.jpg"
alt="ä¸åªççå¡éç»ï¼å®æ£çæå°çççµèå±å¹ä¸å¼¹åºç3个广å......"
/></a>
+<p>“ä»ä»¬æ¯æä¹ç¥éææ¯ççï¼”</p>
+</div>
+
+<p>æè°¢Edward
+Snowdençæé²ï¼æ们ç¥éäºç®å社ä¼ç常è§çæ§å·²ç»è¿èäºäººæãå¨ç¾å½åä¸çåå°ä¸æéå¤åçç对æä¸åæ¿è§è
ãæ¶æ¯æ¥æºä»¥åæ°é»å·¥ä½è
çéªæ°å迫害ä¹å°è¯äºè¿ä¸ªäºå®ãæ们éè¦éä½å¸¸è§çæ§çæ°´å¹³ï¼ä½æ¯éä½å°ä»ä¹æ°´å¹³å¢ï¼åªä¸ªæ°´å¹³æ£å¥½æ¯<em>æ大å¯å®¹å¿ççæ§</em>ï¼æ¯æ们è¦ç¡®ä¿ä¸è½è¶
è¶çæ°´å¹³å¢ï¼è¿ä¸ªæ°´å¹³æ¯ä¸æ¦è¢«è¶
è¶ï¼çæ§å°±å¼å§å¹²æ°æ£å¸¸çæ°ä¸»å¶åº¦ï¼è¡¨ç°ä¸ºæ¥è¦è
ï¼è±¡Snowdenï¼å¯è½ä¼è¢«æã</p>
+</div>
+<div class="columns" style="clear:both">
+<p>é¢å¯¹æ¿åºç§å¯ï¼æ们æ®éæ°ä¼æèµæ¥è¦è
æ¥<a
+href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama">åè¯æ们æ¿åºå¨åä»ä¹</a>ãç¶èï¼ç®åççæ§å¨èå°äºæ½å¨çæ¥è¦è
ï¼è¿å°±æ¯è¯´æç¹è¿äºãè¦éæ¯æ°ä¸»å¯¹æ¿åºçæ§å¶ï¼æ们å¿
é¡»æçæ§çæ°´å¹³éä½å°æ¥è¦è
æå°å®å
¨çæ°´å¹³ã</p>
+
+<p>使ç¨èªç±ï¼free/libreï¼è½¯ä»¶ï¼<a
+href="/philosophy/free-software-even-more-important.html">æ£å¦æå·²ç»æå¡äº30å¹´</a>ï¼æ¯æ们æ§å¶æ°åçæ´»ç第ä¸æ¥ï¼å
¶ä¸å°±å
æ¬é²æ¢çæ§ãæ们ä¸è½ç¸ä¿¡éèªç±è½¯ä»¶ï¼NSA<sup><a
+href="#TransNote1">1</a></sup><a
+href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">å©ç¨</a>çè³<a
+href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">å¶é
</a>éèªç±è½¯ä»¶çå®å
¨å¼±ç¹æ¥å
¥ä¾µæ们ççµèåè·¯ç±å¨ãèªç±è½¯ä»¶è®©æ们è½å¤æ§å¶èªå·±ççµèï¼ä½æ¯<a
+href="http://www.wired.com/opinion/2013/10/149481/">è¿å¹¶ä¸è½å¨æ们ä¸ç½æ¶ä¿æ¤æ们çéç§ã</a>ã</p>
+
+<p><a
+href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">å¨ç¾å½ï¼ä¸¤å
ç«æ³æ¥“éå¶å½å
çæ§æå”</a>æ£å¨è®¡åä¸ï¼ä½æ¯å®ä¾èµäºéå¶æ¿åºä½¿ç¨æ们çèææ¡£æ¡<sup><a
+href="#TransNote2">2</a></sup>ãå¦æ“æææ¥è¦è
”çåææ¯è·åæ认她/ä»ç足å¤èµæï¼é£ä¹è¿æ
·çç«æ³ä¸è¶³ä»¥ä¿æ¤æ¥è¦è
ãæ们éè¦æ´è¿ä¸æ¥ã</p>
+</div>
+
+<h3 class="subheader" style="clear: both">æ°ä¸»ç¤¾ä¼ä¸çæ§çä¸é</h3>
+
+<div class="columns">
+<p>å¦ææ¥è¦è
ä¸æ¢æ«é²ç½ªæ¶åè°è¨ï¼æ们就失å»äºå¯¹æ¿åºåå¶åº¦çæåä¸ä¸æ§å¶ãè¿å°±æ¯ä¸ºä»ä¹å
许æ¿åºåç°è°æ¯æ¥åè
ççæ§æ¯è¿åº¦çç槗æ¯æ°ä¸»æ
æ³æ¿åçè¿åº¦çæ§ã</p>
+
+<p>å¨2011å¹´ï¼æç¾å½æ¿åºå®å幸ç¾ä¹ç¥¸å°åè¯è®°è
<a
+href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river">ç¾å½æ¿åºä¸ä¼ä¼
å¤æ¥åè
ï¼å 为“æ们ç¥éä½
åè°è°è¿ã”</a>ææ¶ï¼<a
+href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">è®°è
çéè¯è®°å½ä¼è¢«è°å</a>以æ¥æéè¯äººï¼ä½æ¯Snowdenåæ们å±ç¤ºäºå
¶å®ç¾å½ææ人çéè¯è®°å½é½è¢«è°åï¼éæ¶è°åï¼<a
+href="https://web.archive.org/web/20131226044537/http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order">ä»Verizon</a>å<a
+href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">å
¶ä»å
¬å¸</a>ã</p>
+
+<p>å对派åæä¸åè¯ä»¶è
éè¦æå
å½å±çç§å¯ï¼ä»¥é²æ¢æ¿åºå©ç¨ç§å¯å¹²åäºãACLU<sup><a
+href="#TransNote3">3</a></sup>å±ç¤ºäºç¾å½æ¿åº<a
+href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf">ç³»ç»æ§å
¥ä¾µåå¹³çæä¸åè¯ä»¶è
ç»ç»çæ´»å¨</a>ï¼å
¶åå£å°±æ¯è¿äºç»ç»ä¸å¯è½æææååãçæ§è¿åº¦ç水平就æ¯æ¿åºè½å¤éè¿çæ§åç°è°åè®°è
ææä¸åè¯ä»¶è
è°è¿è¯çæ°´å¹³ã</p>
+</div>
+
+<h3 class="subheader">ä¿¡æ¯ï¼ä¸æ¦è¢«æéï¼å°±ä¼è¢«æ»¥ç¨</h3>
+
+<div class="columns">
+<p
id="willbemisused">å½äººä»¬è®¤è¯å°çæ§çæ°´å¹³è¿é«æ¶ï¼ä»ä»¬ç第ä¸ååºæ¯æè®®éå¶è·åæ°æ®ãè¿å¬èµ·æ¥ä¸éï¼ä½ä¸è§£å³é®é¢ï¼ä¸ç¹å¿ä¹ä¸è§£å³é®é¢ï¼å³ä½¿å设æ¿åºä¼éµå®è¿äºæ¡æ¬¾ä¹æ¯ä¸æ
·ãï¼NSA误导äºFISA<sup><a
+href="#TransNote4">4</a></sup>æ³åºï¼è¯¥æ³åºè¯´å®<a
+href="http://www.wired.com/threatlevel/2013/09/nsa-violations/">ä¸è½ææå°è®©NSAè´è´£</a>ãï¼å
为æçæ罪就è½å¤æ为è·åæ°æ®ççç±ï¼æ以ä¸æ¦æ¥è¦è
被æ槓ä»äºè°æ¥æ´»å¨ï¼”é£ä¹æç´¢“é´è°”å°±ä¼æ为è·åæ°æ®çåå£ã</p>
+
+<p>å¦å¤ï¼æ¿åºççæ§äººåè¿ä¼å
ç§æ»¥ç¨è¿äºæ°æ®ãæäºNSA人å<a
+href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">使ç¨æ¿åºççæ§ç³»ç»æ¥è¿½è¸ªå
¶æ
人</a>—çè¿å»ãç°å¨æ计å—è¿å¨å®è·µä¸ç§°ä¸º“LOVEINTã”NSA声称å®æ¾æè·åæ©ç½äºå
èµ·æ¤ç±»äºä»¶ï¼æ们并ä¸ç¥éè¿æå¤å°èµ·å¹¶æªæå°ãä½è¿å¹¶ä¸æå¤ï¼å
为ä¸ç´ä»¥æ¥è¦å¯å°±<a
+href="https://web.archive.org/web/20160401102120/http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I">使ç¨è®¿é®é©¾ç
§è®°å½çæåæ¥è¿½è¸ªè¿·äººç人</a>ï¼è¿å¨å®è·µä¸å«å“æ¥é©¾ç
§çº¦ä¼ã”该è¡ä¸ºè¿éç<a
+href="https://theyarewatching.org/issues/risks-increase-once-data-shared">æ°çæ°åç³»ç»</a>æ©å¼
ãå¨2016å¹´ï¼æå
¬è¯äººè¢«ææ§ä¼ªé æ³å®ç¾å以è·å<a
+href="http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933">æ线çªå¬ä¸ä¸ªå
¶è¿·æç对象</a>ãAP<sup><a
+href="#TransNote5">5</a></sup>äºè§£<a
+href="http://bigstory.ap.org/article/699236946e3140659fff8a2362e16f43/ap-across-us-police-officers-abuse-confidential-databases">æ´å¤ç¾å½çå
¶ä»æ¡ä¾</a>ã
+</p>
+
+<p>å³ä½¿ç¦æ¢ï¼çæ§æ°æ®æ»æ¯ä¼ç¨äºå
¶ä»ç®çãä¸æ¦æ°æ®å·²æ¶é并ä¸æ¿åºå¯ä»¥è®¿é®ï¼é£ä¹æ¿åºæå¾å¤æ¶å£çæ¹æ³ä½¿ç¨è¯¥æ°æ®ï¼æ¯å¦<a
+href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/">欧洲</a>å<a
+href="https://en.wikipedia.org/wiki/Japanese_American_internment">ç¾å½</a>çä¾åã</p>
+
+<p>ç±æ¿åºæ¶éç个人æ°æ®ä¹æå¯è½è¢«éªå®¢éè¿å
¥ä¾µå®å
¨æå¡å¨è·å¾ï¼çè³è¢«<a
+href="https://www.techdirt.com/articles/20150612/16334231330/second-opm-hack-revealed-even-worse-than-first.shtml">为æ对å½å®¶å·¥ä½çéªå®¢è·å¾</a>ã</p>
+
+<p>æ¿åºå¯ä»¥è½»æ使ç¨å
¶å¼ºå¤§ççæ§è½å<a
+href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html">ç´æ¥æ¯çæ°ä¸»</a>ã</p>
+
+<p>对çæ§çå
¨é¢ææ§ä½¿å¾æ¿åºå¯ä»¥å¯¹ä»»ä½äººå¼å±å¤§è§æ¨¡çéé±¼è°æ¥ãè¦ä½¿è¨è®ºåæ°ä¸»å®å
¨ï¼æ们å¿
é¡»éå¶æ¿åºå¯¹çæ§æ°æ®ç访é®ã</p>
+</div>
+
+<h3 class="subheader">对éç§çæåä¿æ¤å¿
é¡»æ¯ææ¯æ§ç</h3>
+
+<div class="columns">
+<p>çµåå线åºéä¼ï¼Electronic Frontier Foundationï¼åå
¶ä»ä¸äºç»ç»æè®®äºä¸ç»æ³å¾ååæ¥<a
+href="https://en.necessaryandproportionate.org/text">ç¦æ¢å¤§è§æ¨¡çæ§ç滥ç¨</a>ãè¿äºååå
æ¬ï¼å¯¹æ¥è¦è
严æ
¼ãæç¡®çæ³å¾ä¿æ¤ï¼ä½ä¸ºç»æï¼è¿äºåå足å¤æ¥ä¿æ¤æ°ä¸»èªç±—å¦æå®å
¨é纳并永æ ä¾å¤å°æ§è¡ã</p>
+
+<p>ç¶èï¼è¿ç§æ³å¾ä¿æ¤æ¯ä¸ç¡®å®çï¼æ£å¦å½ä»£åå²å±ç¤ºçï¼æ³å¾ä¼è¢«åºé¤ï¼è±¡FISAä¿®æ£æ¡ï¼ãç»æ¢æ<a
+href="http://www.nytimes.com/2009/04/16/us/16nsa.html">忽ç¥</a>ã</p>
+
+<p>åæ¶ï¼æ¶ææ¿å®¢ä¼å¼ç¨æéè¯æ®çæ¡æ¬¾æ¥ä½ä¸ºå
¨é¢çæ§çæ³å¾æ¯æï¼ææè¢å»ï¼å³ä½¿åªæ¯ææ»æå°æ°äººï¼ä¹è½ä½ä¸ºä»ä»¬åæ¥ççç±ã</p>
+
+<p>å¦æè·åæ°æ®çéå¶è¢«æç½®ä¸è¾¹ï¼é£ä¹æ
åµå°±åå¾åéå¶ä¸åå¨ä¸æ
·ï¼åå¹´çæ¡£æ¡çªç¶å°±åå¾å¯è½ä¼è¢«æ¿åºåå
¶ä»£ç人滥ç¨ï¼å¦æç±å
¬å¸æ¶éï¼å
¬å¸ä¹ä¼ç§èªæ»¥ç¨ãä½æ¯ï¼å¦æç»æ¢æ¶éè¿äºæ¡£æ¡ï¼é£ä¹å°±æ²¡ææ¡£æ¡ï¼å½ç¶ä¹å°±æ²¡æå¯è½åå溯ç
究ãä¸ä¸ªæ°çéèªç±æ¿æåªè½éæ°æé
çæ§ï¼èä¸åªè½æ¶éä»é£ä»¥åçæ°æ®ãå¦æå¯ä»¥ç»æ¢æææ¶å¿½ç¥è¯¥æ³å¾ï¼é£ä¹è¿ä¸ªæ³æ³å°±å
ä¹æ¯«æ æä¹ã</p>
+</div>
+
+<h3 class="subheader">é¦å
ï¼ä¸è¦è¢«æå¼</h3>
+
+<div class="columns">
+<p>è¦æ¥æéç§ï¼ä½ å°±ä¸è½æå¼å®ï¼ä½
æ¯ç¬¬ä¸ä¸ªè¦ä¿æ¤èªå·±éç§ç人ãé¿å
å¨ç½ç«æ´é²èº«ä»½ã使ç¨Tor<sup><a
+href="#TransNote6">6</a></sup>ä¸ç½ã使ç¨å¸¦æé»æ¢è·è¸ªåè½çæµè§å¨ã使ç¨GNU
Privacy
+Guardï¼éç§æ¤å«ï¼æ¥å å¯çµåé®ä»¶ãç¨ç°éä»æ¬¾ã</p>
+
+<p>ä¿æ¤ä½ çæ°æ®ï¼ä¸è¦å°èªå·±çæ°æ®ä¿åå¨å
¶ä»å
¬å¸“便å©ç”æå¡å¨ä¸ãç¶èï¼åç¨çæ°æ®å¤ä»½æå¡æ¯å®å
¨çï¼å¦æä½ å¨ä¸ä¼
ä¹åï¼ä½¿ç¨èªç±è½¯ä»¶å¨èªå·±ççµèä¸ææ件å½æ¡£å¹¶å å¯ï¼å
æ¬å å¯æ件åã</p>
+
+<p>为éç§èèï¼ä½ è¦é¿å
使ç¨éèªç±è½¯ä»¶ï¼å 为é£æ ·ä½
å°±æ计ç®çæ§å¶äº¤ç»äºä»äººï¼ä»ä»¬<a
+href="/philosophy/proprietary-surveillance.html">å¯è½ä¼åæ¤çª¥æ¢ä½
</a>ãé¿å
<a
+href="/philosophy/who-does-that-server-really-serve.html">ç¨è½¯ä»¶ä»£æ¿æå¡</a>ï¼è¿ä¹æ¯æ计ç®æ§å¶äº¤ç»äºå«äººï¼å
为è¿è¦æ±ä½ æå
¨é¨ç¸å
³æ°æ®äº¤ç»æå¡å¨ã</p>
+
+<p>è¯·ä½ ä¹ä¿æ¤æååç人çéç§ã<a
+href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/">ä¸è¦æ´é²ä»ä»¬ç个人信æ¯</a>é¤äºå¦ä½èç³»ä»ä»¬ï¼ä¸è¦æé®ä»¶è系人åçµè¯è系人交ç»ä»»ä½ç½ç«ãä¸è¦åè¯è¯¸å¦Facebookè¿æ
·çç½ç«ä½ æå们ä¸æ¿å¨æ¥çº¸ä¸å
¬å¼çäºãæ好就æ¯æ
¹æ¬ä¸è¦ä½¿ç¨Facebookã请æç»ä½¿ç¨è¦æ±å®åçç³»ç»ï¼å³ä½¿ä½
æ¿æå®åï¼ä¹ä¸è¦å æ¤èç»ä»äººçéç§å¸¦æ¥ååã</p>
+
+<p>èªæä¿æ¤å¾éè¦ï¼ä½æ¯å³ä½¿æ严谨çèªæä¿æ¤ä¹æ
æ³å¨å«äººç设å¤ä¸ä¿æ¤ä½ çéç§ãå½æ们åå
¶ä»äººäº¤æµæè
æµè¿äºåå¸ä¹ä¸æ¶ï¼æ们çéç§ä¾èµäºç¤¾ä¼çå®è·µãæ们å¯ä»¥é¿å
ä¸äºçæ§æ们交æµåæ´»å¨çç³»ç»ï¼ä½æ¯æ æ³é¿å
ææççæ§ç³»ç»ãå¾ææ¾ï¼æ好就æ¯ç»æ¢ææççæ§ï¼é¤äºé对æ³å¾å
许çå«çç¯ã</p>
+</div>
+
+<h3 class="subheader">æ们设计æ¯ä¸ªç³»ç»æ¶é½å¿
é¡»èèéç§</h3>
+
+<div class="columns">
+<p>å¦ææ们ä¸è¦å®å
¨çæ§ç社ä¼ï¼æ们å¿
é¡»è§çæ§ä¸ºç¤¾ä¼æ±¡æï¼æ们è¦è±¡éå¶å»ºçå·¥ç¨å¯¹ç¯å¢çå½±åä¸æ
·éå¶çæ§å¯¹æ¯ä¸ªæ°æ°åç³»ç»çå½±åã</p>
+
+<p>æ¯å¦ï¼“æºè½”çµè¡¨è®¾è®¡ä¸ºææ¶åçµåå
¬å¸åéæ¯ä¸ªç¨æ·çç¨çµæ°æ®ï¼å
æ¬ç¨çµéåå¹³åæ°´å¹³çæ¯è¾ã该设计æ¯ä¸ç§æ®éæ§çæ§ï¼èæ们ä¸åºè¯¥å¯¹æ¤è¿è¡çæ§ãçµåå
¬å¸å¾å®¹ææ
¹æ®å°åºçæ»ç¨çµéé¤ä»¥ç»è®°ç¨æ·æ°è®¡ç®åºå¹³åç¨çµéï¼å¹¶å°æ¤æ°æ®åéå°çµè¡¨ãæ¯ä¸ªçµè¡¨ç¨æ·å¯ä»¥ä½¿ç¨è·å¾çæ°æ®ï¼èªå·±æ¯è¾æ个æ¶æ®µçç¨çµéæ
åµãåæ ·çç»æï¼ä½æ¯æ²¡æçæ§ï¼</p>
+
+<p>æ们éè¦ä¸ºæ¯ä¸ªæ°å设å¤è®¾è®¡æ¤ç±»éç§ä¿æ¤ã</p>
+</div>
+
+<h3 class="subheader">é对æ°æ®æ¶éç解è¯ï¼åæ£æ°æ®</h3>
+
+<div class="columns">
+<p>让éç§å¨çæ§ä¸å®å
¨çä¸ä¸ªæ¹æ³æ¯<a
name="dispersal">åæ£æ°æ®å¹¶ä½¿ä¹ä¸å®¹æè·å</a>ãèå¼çå®å
¨æå头对éç§ä¸ææå¨èï¼<a
+href="#privatespace">*</a>ï¼ãå®çè®°å½é½ä¿åå¨æ¬å°ï¼æå¤ä¿çæ°å¨ãå
为è·åè¿äºè®°å½å¹¶ä¸æ¹ä¾¿ï¼æ以ä»æ¥æ²¡æ大è§æ¨¡å°æ¶éæ¤ç±»æ°æ®ï¼åªææ人æ¥åç¯ç½ªæ´»å¨æ¶ï¼æ°æ®æ被ä»æ¬å°è°åãæ¯å¤©æ¶éä¸ç¾ä¸çç£å¸¦å¹¶æ¥çæå¤å¶å®é
ä¸æ¯ä¸å¯è½å®æçä»»å¡ã</p>
+
+<p>ä»å¤©ï¼å®å
¨æå头åæäºçæ§æå头ï¼ä»ä»¬è¿æ¥å°äºèç½ï¼æ以记å½è½å¤ç±æ°æ®ä¸å¿æ¶é并永ä¹
ä¿åãè¿æ¬èº«å·²ç»å¾å±é©ï¼ä½æ
åµæ£åå¾æ´ç³ã人è¸è¯å«ææ¯çè¿å±æä¸å¤©ä¼å
¨ç¨è¿½è¸ªè¢«æççè®°è
ï¼ä»èæ¥çä»ä»¬å¨åè°è¯´è¯ã</p>
+
+<p>ç½ç»æå头æ¬èº«çæ°åå®å
¨æ§é常å¾å·®å²ï¼<a
+href="http://www.networkworld.com/community/blog/cia-wants-spy-you-through-your-appliances">ä»»ä½äººé½å¯ä»¥æ¥çè¿äºæå头å¨è§å¯ä»ä¹</a>ãè¿ä½¿ç½ç»æå头æ为å®å
¨åéç§ç主è¦å¨èã为äºä¿æ¤éç§ï¼æ们åºè¯¥ç¦æ¢é对å
¬ä¼è¡è¸ªçç½ç»æå头ï¼é¤äºé£äºäººä»¬é身æºå¸¦çæå设å¤ã人们å¿
é¡»æèªç±é´æåå¸ä¸äºç
§çåè§é¢ï¼ä½æ¯å¨ç½ç»ä¸ç³»ç»æ¶éæ¤ç±»æ°æ®çè¡ä¸ºå¿
é¡»åå°éå¶ã</p>
+
+<p><a
+name="privatespace"><b>*</b></a>æ¤å¤ï¼æå设å®å
¨æå头æåååºå
é¨æè
æåè¡éãæåä»äººç§æ空é´çæå头侵ç¯äºéç§æï¼ä½é£æ¯å¦ä¸ä¸ªé®é¢ã</p>
+</div>
+
+<h3 id="digitalcash" class="subheader">é对åä¸ç½ç»çæ§ç解è¯</h3>
+
+<div class="columns">
+<p>大å¤æ°æ°æ®æ¥èªäººä»¬èªå·±çæ°åæ´»å¨ãé常è¿äºæ°æ®é¦å
被å
¬å¸æ¶éãä½æ¯å½æ°æ®å¨èçæ¯éç§åæ°ä¸»æ¶ï¼çæ§æ¥èªæ¿åºè¿æ¯æ¥èªåä¸å
¬å¸å¹¶æ åå«ï¼å 为æ¿åºæ¯å¯ä»¥ç³»ç»æ§å°è·åç±å
¬å¸æ¶éçæ°æ®çã</p>
+
+<p>NSAï¼éè¿PRISM<sup><a href="#TransNote7">7</a></sup>ï¼å¯ä»¥<a
+href="https://www.commondreams.org/headline/2013/08/23-2">è¿å
¥è®¸å¤å¤§åç½ç»éå¢çæ°æ®åº</a>ãAT&Tä¿åçèª1987年以æ¥ççµè¯è®°å½å¹¶<a
+href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">让DEA<sup><a
+href="#TransNote8">8</a></sup>ææ</a>æéæ¥è¯¢ã严æ
¼æ¥è¯´ï¼ç¾å½æ¿åºä¸æ¥æè¿äºæ°æ®ï¼ä½å®é
ä¸å®å°±ç®æ¥æè¿äºæ°æ®ãæäºå
¬å¸ç±äº<a
+href="https://www.eff.org/who-has-your-back-government-data-requests-2015">å°½éé»æ¡æ¿åºè°åæ°æ®ç请æ±</a>èåå°èµæ¬ï¼ä½æ¯è¿åªè½é¨åè¡¥å¿å
¶é¦å
æ¶éæ°æ®å¸¦æ¥ç伤害ãå¦å¤ï¼å¾å¤æ¤ç±»å
¬å¸èªå·±ä¹ç´æ¥æ»¥ç¨è¿äºæ°æ®æè
åç»æ°æ®æ®å®¢ã</p>
+
+<p>è¦è¾¾æä¿æ¤è¨è®ºèªç±åæ°ä¸»çç®çå°±éè¦æ们åå°ä¸æ¢æ¯æ¿åºå¯¹äººä»¬çæ°æ®æ¶éï¼è¿è¦åå°ç»ç»åå
¬å¸çæ°æ®æ¶éãæ们å¿
é¡»éæ°è®¾è®¡æ°åç³»ç»ä»¥ç¡®ä¿å®ä»¬ä¸ä¼æ¶éç¨æ·æ°æ®ãå¦æç³»ç»çç¡®éè¦æ们ç交ææ°æ®ï¼å®ä»¬ä¹ä¸è½ä¿çæ°æ®è¶
è¿ä¸å¡æ¬èº«éè¦ççæ¶é´ã</p>
+
+<p>ç½ç»çæ§å°è¾¾ç®åæ°´å¹³çä¸ä¸ªå¨æºæ¯å¾å¤ç½ç«æ
¹æ®ç¨æ·çæ´»å¨åå¾åå广åï¼å¹¶å
æ¤è·å¾ç»æµåæ¥ãè¿ä½¿å¾åæ¬åªæ¯ä»¤äººè®¨åç—å¯ä»¥å¿½ç¥ç广å—åæäºæ
论æ们æ¯å¦ç¥æé½ä¼é
æ伤害ççæ§ç³»ç»ãç½ç»è´ä¹°ä¹ä¼è·è¸ªç¨æ·ãæ们é½å¾æ¸
楓éç§æ¿ç”åªæ¯è¿åéç§çåå£èéä¿æ¤éç§çæ¿è¯ºã</p>
+
+<p>æ们å¯ä»¥éåå¿åä»æ¬¾çç³»ç»åæ¶æ¹æ£ä»¥ä¸ä¸¤ä¸ªé®é¢—å°±æ¯ä»æ¬¾è
å¿åãï¼æ们并ä¸æ³å¸®å©æ¶æ¬¾äººé¿ç¨ãï¼<a
+href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">æ¯ç¹å¸å¹¶ä¸å¿å</a>ï¼è½ç¶æ人å¼åäºç¨æ¯ç¹å¸å¿åä»æ¬¾çæ¹æ³ãç¶èï¼ææ¯ä¸ï¼<a
+href="http://www.wired.com/wired/archive/2.12/emoney_pr.html">æ°åç°éææ©äº1980年代é¦æ¬¡è¢«å¼å</a>ï¼ææ©å®ç°è¯¥åè½çGNU软件å«å<a
+href="http://taler.net/">GNU
Taler</a>ãç°å¨æ们åªéè¦åéçåä¸è§åï¼ä»¥åæ¿åºä¸è¦é»æ
è¿äºè§åã</p>
+
+<p>å¦ä¸ä¸ªå¿åä»æ¬¾çå¯è½æ¹æ³æ¯ä½¿ç¨<a
+href="https://stallman.org/articles/anonymous-payments-thru-phones.html">é¢ä»æ¬¾çµè¯å¡</a>ãå®è½ç¶ä¸å¤ªæ¹ä¾¿ï¼ä½æ¯å¾å®¹æå®ç°ã</p>
+
+<p>ç½ç«æ¶é个人æ°æ®çå¦ä¸ä¸ªå¨èæ¯å®å
¨æ»å»è
ä¼ä¾µå
¥ï¼è·åæ°æ®å¹¶æ»¥ç¨ä¹ãè¿å
æ¬å®¢æ·ä¿¡ç¨å¡ç详æ
ãå¿åä»æ¬¾ç³»ç»ä¼ç»æè¿ä¸ªå±é©ï¼ç½ç«çå®å
¨æ¼æ´ä¸ä¼ä¼¤å®³å°ä½ ï¼å 为ç½ç«ä¸ç¥éä½ æ¯è°ã</p>
+</div>
+
+<h3 class="subheader">é对æ
è¡çæ§ç解è¯</h3>
+
+<div class="columns">
+<p>æ们å¿
é¡»å°çµåè¿è·¯è´¹æ¶åç³»ç»æ¹é
为å¿åä»è´¹ç³»ç»ï¼æ¯å¦ï¼ä½¿ç¨æ°åç°éï¼ã车çè¯å«ç³»ç»ä¼è¯å«ææççç
§ï¼èä¸<a
+href="http://news.bbc.co.uk/2/hi/programmes/whos_watching_you/8064333.stm">å
¶æ°æ®æ
éæä¿ç</a>ï¼æ³å¾åºè¯¥è¦æ±è¿äºç³»ç»æ³¨æ并åªè®°å½å·²ç»ææ³åºå½ä»¤éè¦è¿½è¸ªç车çå·ç
ãå¦ä¸ä¸ªä¸å¤ªå®å
¨çæ¿ä»£æ¹æ¡æ¯å°ææ车çè®°å½ï¼ä½åªå¨æ¬å°ä¿åå
天ï¼å¹¶ä¸ä¸æå
¨é¨æ°æ®éè¿ç½ç»ååï¼åªå
许æç´¢é£äºå·²ç»ææ³åºå½ä»¤éè¦è¿½è¸ªç车çå·ç ã</p>
+
+<p>ç¾å½ç“ç¦æ¢é£è¡”åååºè¯¥åæ¶ï¼å 为å®æ¯<a
+href="https://www.aclu.org/blog/national-security-technology-and-liberty-racial-justice/victory-federal-court-recognizes">æªç»å®¡ççæ©ç½</a>ã</p>
+
+<p>å°ä¸äºäººåå
¥éè¦ç¹å«äººèº«åè¡ææ£æ¥çååæ¯å¯ä»¥æ¥åçï¼å½å
èªççå¿åä¹å®¢ä¹å¯ä»¥åæ ·å¯¹å¾
ãä»å
¥å¢èªçæ¦æªé£äºæ¬æ¥å°±ä¸è®¸å
¥å¢ç人åä¹æ¯å¯ä»¥æ¥åçãè¿äºæªæ½åºè¯¥å¯ä»¥æ»¡è¶³ææçæ³å¾ç®çäºã</p>
+
+<p>许å¤å¤§é¢æ¯ä»ç³»ç»ä½¿ç¨æç±»æºè½å¡æå°é¢å¡ï¼RFIDï¼æ¥æ¯ä»ãè¿äºç³»ç»ä¼æ¶é个人æ°æ®ï¼å¦æä½
æä¸æ¬¡æ²¡æ使ç¨ç°éæ¯ä»ï¼å®ä»¬å°±ä¼æ°¸ä¹
æä½
çåååæ使ç¨çå¡ç»å®ãè¿æ
·å®ä»¬å°±çäºå¨è¿è¡å¤§è§æ¨¡ççæ§ãè¿ç±»æ°æ®æ¶éå¿
é¡»åå°ã</p>
+
+<p>导èªæå¡ä¹çæ§ï¼ç¨æ·ççµè设å¤ä¼åè¯å°å¾æå¡åç¨æ·çä½ç½®ä»¥åç¨æ·è¦å»åªéï¼ç¶åæå¡å¨è®¡ç®è·¯çº¿å¹¶ååç»ç¨æ·ç设å¤ï¼è®¾å¤åæ¾ç¤ºè·¯çº¿ãä»å¤©ï¼æå¡å¨å¯è½ä¼è®°å½ç¨æ·çä½ç½®ï¼å
为没ä»ä¹å¯ä»¥é»æ¢å®ä»¬è¿ä¹åãè¿ç§çæ§æ¬èº«å¹¶æ å¿
è¦ï¼éæ°è®¾è®¡å¯ä»¥é¿å
ï¼ç¨æ·è®¾å¤ä¸çèªç±è½¯ä»¶å¯ä»¥ä¸è½½ç¸å
³çå°å¾åºåï¼å¦æä¸æ¯äºå
ä¸è½½å¥½äºï¼ï¼è®¡ç®è·¯çº¿å¹¶æ¾ç¤ºï¼è¿å°±æ²¡æå¿
è¦åè¯ä»»ä½äººç¨æ·è¦å»åªéã</p>
+
+<p>诸å¦ç§åèªè¡è½¦ä¹ç±»çç³»ç»ï¼å¯ä»¥è®¾è®¡ä¸ºç§åè
ç身份ä»
被å½äºåºåç«æç¥ã该åºåç«å¯ä»¥éç¥ææå
¶ä»ç«ç¹æç©å已结å应ï¼è¿æ ·ç§åè
å°±å¯ä»¥å¨ä»»æç«ç¹å½è¿ç©åï¼ä¸è¬æ¥è¯´ï¼æ¯å¦ä¸ä¸ªç«ç¹ï¼ï¼èå½è¿ç«å·²ç¥è¯¥ç©åæ¯ä½æ¶å¨ä½å°è¢«ååºãå®ä¼éç¥å
¶ä»ç«ç¹è¯¥ç©åä¸å毓å应ãå½è¿ç«è¿ä¼è®¡ç®ç¨æ·çè´¦åï¼å¹¶å°ä¹ï¼å¨çå¾
éæºæ¶é´æ®µåï¼ç»ç±å¤ä¸ªç«ç¹ååæ»é¨ï¼è¿æ
·æ»é¨å°±ä¸è½ç¥éè´¦åæ¥èªåªéãå®æåéä¹åï¼å½è¿ç«å°å¿æ该交æãå¦æç©åé¿æ¶é´ä¿æ“å应ï¼ååºç«å¯ä»¥éç¥æ»é¨ï¼æ¤æ¶ï¼å®å¯ä»¥ç«å³æç§åè
ç身份åéè¿å»ã</p>
+</div>
+
+<h3 class="subheader">é对é讯档æ¡ç解è¯</h3>
+
+<div class="columns">
+<p>ç½ç»æå¡ååçµè¯å
¬å¸ä¿çå
¶ç¨æ·ç大éæ°æ®ï¼æµè§è®°å½ãéè¯è®°å½ççï¼ã对移å¨çµè¯ç¨æ·ï¼ä»ä»¬è¿ä¼<a
+href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">è®°å½ç¨æ·çå
·ä½ä½ç½®</a>ãè¿äºæ¡£æ¡ä¼ä¿çå¾é¿æ¶é´ï¼å¯¹AT&Tæ¥è¯´ï¼è¶
è¿30å¹´ãå¨ä¸ä¹
çå°æ¥ä»ä»¬çè³ä¼<a
+href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">è®°å½ç¨æ·ç身ä½å¨ä½</a>ãçèµ·æ¥<a
+href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location">NSAä¹ä¼å¤§éæ¶é移å¨çµè¯çä½ç½®ä¿¡æ¯</a>ã</p>
+
+<p>å¨å¶é
æ¤ç±»æ¡£æ¡çç³»ç»ä¸ï¼é讯ä¸è¢«çæ§æ¯ä¸å¯è½çãæ以å¶é
åä¿çè¿äºæ¡£æ¡åºè¯¥æ¯éæ³çãå¿
é¡»ç¦æ¢ç½ç»æä¾ååçµè¯å
¬å¸é¿æ¶é´ä¿çè¿äºä¿¡æ¯ï¼é¤éé对æäºææ³åºå½ä»¤ç对象ã</p>
+
+<p>该解å³æ¹æ¡ä¸å®å
¨ä»¤äººæ»¡æï¼å 为å®æ æ³å®é
é»æ¢æ¿åºå¨æ°æ®äº§çä¹åç«å³è·å¾—è¿æ£æ¯<a
+href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">ç¾å½æ¿åºå¯¹æäºæå
¨é¨çµè¯å
¬å¸çæä½æ为</a>ãæ们è¿æ¯ä¸å¾ä¸ä¾èµæ³å¾æ¥ç¦æ¢è¿ç§è¡ä¸ºãä½æ¯ï¼è¿æ»å¥½è¿ç®åçæ
åµï¼ç¸å
³æ³å¾ï¼PAT
+RIOT
Actï¼å¹¶ä¸æç¡®å°ç¦æ¢è¿ç§è¡ä¸ºãå¦å¤ï¼å¦ææ¿åºè¦æ¢å¤çæ§ï¼å®ä¹æ
æ³è·å¾å¨æ¢å¤ä¹åçéè¯è®°å½ã</p>
+
+<p>为äºä¿æ¤ä½
çµåé®ä»¶é讯çéç§ï¼ä¸ä¸ªç®åçå±é¨è§£å³åæ³æ¯ä½
åé讯è
使ç¨ä¸ä¼åå½å°æ¿åºåä½çé®ä»¶æå¡åï¼å¹¶äºç¸ä½¿ç¨å
å¯é讯ãä½æ¯ï¼Ladar
+Levisonï¼Lavabité®ä»¶æå¡çæ¥æè
ï¼ç¾å½çæ§æºæä¼å¾å½»åºç
´å该é®ä»¶ç³»ç»ï¼å¯¹é®ä»¶å å¯ç³»ç»æä¸ä¸ªæ´å¤æçæ³æ³ï¼ä½
çé®ä»¶æå¡ååªä¼ç¥éä½
åæçé®ä»¶æå¡åçæ个ç¨æ·åéäºé®ä»¶ï¼åæ¶æçé®ä»¶æå¡ååªä¼ç¥éææ¶å°äºæ¥èªä½
çé®ä»¶æå¡åçæ个ç¨æ·çé®ä»¶ï¼ä½æ¯å®å¾é¾ç¡®å®æ¯ä½
åé®ä»¶ç»äºæã</p>
+</div>
+
+<h3 class="subheader">ä½æ¯æäºçæ§è¿æ¯å¿
è¦ç</h3>
+
+<div class="columns">
+<p>æ¿åºè¦æå°ç½ªç¯ï¼å®è¦è½å¤å¨æ³åºå½ä»¤ä¸è°æ¥æå®ç罪æ¡æè
æå®çå¯çé¢è°ãæäºäºèç½ï¼çå¬çµè¯çæåä¼èªç¶å»¶ä¼¸å°çå¬äºèç½ãè½ç¶æ¿åºå¾å®¹æ滥ç¨è¯¥æåï¼ä½æ¯å®ä¹æ¯å¿
è¦çãæ幸çæ¯ï¼å¦æï¼ææç建议ï¼äºå
å·²ç»ç¦æ¢äºæ¡£æ¡æ¶éï¼å¨äºåæ¥æ¾æ¥è¦è
å°±ä¸å¤ªå¯è½ã</p>
+
+<p>å
·ææ¿åºç¹æç个人ï¼æ¯å¦è¦å¯ï¼å°å¤±å»éç§æ并被çæ§ãï¼äºå®ä¸ï¼è¦å¯èªå·±å°±æå
³äºå伪è¯çä¸ç¨æ¯è¯“<a
+href="https://en.wikipedia.org/w/index.php?title=Police_perjury&oldid=552608302">è¦å¯ä¼ªè¯ç½ªï¼testilyingï¼</a>”ï¼å
为è¿äºå¿ç»å¸¸åçï¼ç¹å«æ¯æå
³æè®®è
å<a
+href="http://photographyisnotacrime.com/">æå½±è
</a>æ¶ãï¼å
å·çä¸ä¸ªåå¸è¦æ±è¦å¯å
¨ç¨ç©¿æ´å½åæºï¼ç»ææ¯<a
+href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">è¦å¯ä½¿ç¨æ¦åçç°è±¡åå°60%</a>ãACLUï¼ç¾å½å
¬æ°èªç±èçï¼å¾æ¯æè¿ä¸ªåæ³ã</p>
+
+<p><a
+href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266">ä¼ä¸ä¸æ¯äººï¼å®ä»¬æ²¡æ人æ</a>ãè¦æ±åä¸å
¬å¸å
¬å¼å
¶å¯è½å¯¹ç¤¾ä¼å¯¼è´åå¦ãçç©ãæ
¸ãéèã计ç®ï¼æ¯å¦<a
+href="http://DefectiveByDesign.org">DRM</a>ï¼ææ¿æ²»ï¼æ¯å¦æ¸¸è¯´ï¼çé£é©çæ´»å¨çç»èæ¯åæ³çï¼å¦æè¿äºé£é©å¯¹å¤§ä¼å©ççå½±åè¾¾å°äºä¸å®çæ°´å¹³ãè¿äºæ´»å¨çå±é©ï¼æ³æ³BPåæ²¹æ³æ¼ãç¦å²æ
¸çµç«ååºå æ ¸å¿çæ¯å2008éèå±æºï¼è¶
è¿äºææè¢å»ã</p>
+
+<p>ä½æ¯ï¼è¨è®ºèªç±å¿
é¡»ä¸åçæ§ï¼å³ä½¿å®æ¯ä»¥åä¸çå½¢å¼åç°çã</p>
+</div>
+<div class="column-limit"></div>
+
+<div class="reduced-width">
+<p>æ°åææ¯å¤§å¤§æé«äºå¯¹æ们çæ´»å¨ãè¡ä¸ºåé讯ççæ§æ°´å¹³ãå®è¿è¿è¶
è¿äº1990年代æ们æç»åçæ°´å¹³ï¼ä¹<a
+href="https://hbr.org/2013/06/your-iphone-works-for-the-secret-police">è¿è¶
人们å¨1980年代çéå¹<sup><a
+href="#TransNote9">9</a></sup>ç»å</a>ï¼æ¿åºæè®®ç对ææéæ°æ®ç使ç¨éå¶ä¹æ
æ³æ¹åè¿ä¸ç¹ã</p>
+
+<p>å
¬å¸æ£å¨è®¾è®¡æ´å
·ä¾µç¥æ§ççæ§ãæäºé¡¹ç®å
æ¥ççæ§ï¼ä»¥è¯¸å¦Facebookçå
¬å¸çå½¢å¼ï¼å¯è½ä¼å¯¹<a
+href="https://www.theguardian.com/technology/2015/aug/10/internet-of-things-predictable-people">人们å¦ä½æè</a>ææ·±è¿çå½±åãè¿ç§å¯è½æ§æ¯å¾é¾ä¼°éçï¼ä½æ¯å®å¯¹æ°ä¸»çå¨èå´ä¸æ¯éæ³ãå®åå¨èä¸ç°å¨å°±å¯ä»¥çå¾å°ã</p>
+
+<p>é¤éæ们确信æ们çèªç±å½å®¶è¿å»ä¸¥é缺失çæ§ï¼å
èåºè¯¥è¿è¡è¶
è¿èèåä¸å¾·æè¿è¡ççæ§ï¼æ们å¿
é¡»é转çæ§çå¢é¿ãè¿å°±éè¦åæ¢å¯¹äººæ°ç大æ°æ®æ¶éã</p>
+</div>
+</div>
+
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+<h3>è¯æ³¨</h3>
+<ol>
+<li id="TransNote1">NSAï¼National Security Agencyãç¾å½å½å®¶å®å
¨å±ã</li>
+<li id="TransNote2">virtual
+dossierï¼èææ¡£æ¡ãæ¯æé纸质çå½æ¡£æ件ï¼é常ä¼æéå
³äºä¸ªäººçææçµåèµæä½ä¸ºèææ¡£æ¡ã</li>
+<li id="TransNote3">ACLUï¼American Civil Liberties
+Unionãç¾å½å
¬æ°èªç±èçï¼æå«åä¿æ¤ä¸ªäººæå©åèªç±çæ å
æ´¾ãéçå©ç»ç»ã</li>
+<li id="TransNote4">FISAï¼Foreign Intelligence Surveillance
+Actï¼å¤å½æ
æ¥çå¬æ³ãç¾å½FISAæ³åºå¤çæ¿åºç¸å
³ççå¬ãææ¥ä»¥åå
¶ä»è°æ¥æ´»å¨çåæ³æ§äºç©ã</li>
+<li id="TransNote5">APï¼Associated Pressãç¾è社ã</li>
+<li
id="TransNote6">Torï¼www.torproject.orgãä¿æ¤éç§çèªç±è½¯ä»¶é¡¹ç®ã</li>
+<li
id="TransNote7">PRISMï¼ç¾å½å½å®å±ççæ§ç³»ç»ï¼å®ä»ç¾å½è®¸å¤çµè¯å
¬å¸è·åç½ç»é讯æ°æ®ã</li>
+<li id="TransNote8">DEAï¼ç¾å½ç¨½æ¯å±ã</li>
+<li id="TransNote9">Iron
+Curtainï¼éå¹ãæäºæç»æï¼1945å¹´ï¼å°å·æç»æï¼1991å¹´ï¼æé´ï¼èèå欧洲以å西æ¹å½å®¶å¨æè¯å½¢æåç©çè¾¹çç对ç«åéç»æã</li>
+</ol></div>
+</div>
+
+<!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.zh-cn.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>请å°æå
³èªç±è½¯ä»¶åºéä¼(FSF) & GNU
çä¸è¬æ§é®é¢åéå°<a
+href="mailto:address@hidden"><address@hidden></a>ãä¹å¯ä»¥éè¿ <a
+href="/contact/">å
¶ä»èç³»æ¹æ³</a>
èç³»èªç±è½¯ä»¶åºéä¼(FSF)ãæå
³å¤±æé¾æ¥æå
¶ä»é误å建议ï¼è¯·åéé®ä»¶å°<a
+href="mailto:address@hidden"><address@hidden></a>ã</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+è¥æ¨æ³ç¿»è¯æ¬æï¼è¯·åç<a
+href="/server/standards/README.translations.html">ç¿»è¯é¡»ç¥</a>è·åæå
³åè°åæ交翻è¯çç¸å
³äºé¡¹ã</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 4.0. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright © 2015, 2016, 2017 Richard Stallman</p>
+
+<p>æ¬é¡µé¢ä½¿ç¨<a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/">Creative Commons
+Attribution-NoDerivatives 4.0 International License</a>ææã</p>
+
+<!--#include virtual="/server/bottom-notes.zh-cn.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+<b>ç¿»è¯å¢é</b>ï¼<a rel="team"
+href="https://savannah.gnu.org/projects/www-zh-cn/"><CTT></a>ï¼2017ã</div>
+
+<p class="unprintable"><!-- timestamp start -->
+æåæ´æ°ï¼
+
+$Date: 2017/10/21 12:29:16 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+</body>
+</html>
Index: po/surveillance-vs-democracy.zh-cn-en.html
===================================================================
RCS file: po/surveillance-vs-democracy.zh-cn-en.html
diff -N po/surveillance-vs-democracy.zh-cn-en.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ po/surveillance-vs-democracy.zh-cn-en.html 21 Oct 2017 12:29:16 -0000
1.1
@@ -0,0 +1,597 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.79 -->
+<title>How Much Surveillance Can Democracy Withstand?
+- GNU Project - Free Software Foundation</title>
+<style type="text/css" media="print,screen"><!--
+#intro { margin: 1.5em auto; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+ #intro { max-width: 55em; }
+ .pict.wide { margin-bottom: 0; }
+}
+--></style>
+<!-- GNUN: localize URL /graphics/dog.small.jpg -->
+<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
+<!--#include virtual="/server/banner.html" -->
+<h2 class="center">How Much Surveillance Can Democracy Withstand?</h2>
+
+<p class="byline center">by <a href="http://www.stallman.org/">Richard
Stallman</a></p>
+
+<!-- rms: I deleted the link because of Wired's announced
+ anti-ad-block system -->
+<blockquote class="center"><p>A version of this article was first published in
Wired
+in October 2013.</p></blockquote>
+
+<div class="article">
+
+<div id="intro">
+<div class="pict wide">
+<a href="/graphics/dog.html">
+<img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the
three ads that popped up on his computer screen..." /></a>
+<p>“How did they find out I'm a dog?”</p>
+</div>
+
+<p>Thanks to Edward Snowden's disclosures, we know that the current
+level of general surveillance in society is incompatible with human
+rights. The repeated harassment and prosecution of dissidents,
+sources, and journalists in the US and elsewhere provides
+confirmation. We need to reduce the level of general surveillance,
+but how far? Where exactly is the
+<em>maximum tolerable level of surveillance</em>, which we must ensure
+is not exceeded? It is the level beyond which surveillance starts to
+interfere with the functioning of democracy, in that whistleblowers
+(such as Snowden) are likely to be caught.</p>
+</div>
+<div class="columns" style="clear:both">
+<p>Faced with government secrecy, we the people depend on
+whistleblowers
+to <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama">tell
+us what the state is doing</a>. However, today's surveillance
+intimidates potential whistleblowers, which means it is too much. To
+recover our democratic control over the state, we must reduce
+surveillance to the point where whistleblowers know they are safe.</p>
+
+<p>Using free/libre
+software, <a href="/philosophy/free-software-even-more-important.html">as
+I've advocated for 30 years</a>, is the first step in taking control
+of our digital lives, and that includes preventing surveillance. We
+can't trust nonfree software; the NSA
+<a
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">uses</a>
+and
+even <a
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">creates</a>
+security weaknesses in nonfree software to invade our own computers
+and routers. Free software gives us control of our own computers,
+but <a href="http://www.wired.com/opinion/2013/10/149481/">that won't
+protect our privacy once we set foot on the Internet</a>.</p>
+
+<p><a
+href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">Bipartisan
+legislation to “curtail the domestic surveillance
+powers”</a> in the U.S. is being drawn up, but it relies on
+limiting the government's use of our virtual dossiers. That won't
+suffice to protect whistleblowers if “catching the
+whistleblower” is grounds for access sufficient to identify him
+or her. We need to go further.</p>
+</div>
+
+<h3 class="subheader" style="clear: both">The Upper Limit on Surveillance in a
Democracy</h3>
+
+<div class="columns">
+<p>If whistleblowers don't dare reveal crimes and lies, we lose the
+last shred of effective control over our government and institutions.
+That's why surveillance that enables the state to find out who has
+talked with a reporter is too much surveillance—too much for
+democracy to endure.</p>
+
+<p>An unnamed U.S. government official ominously told journalists in
+2011 that
+the <a
href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river">U.S.
would
+not subpoena reporters because “We know who you're talking
+to.”</a>
+Sometimes <a
href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">journalists'
+phone call records are subpoenaed</a> to find this out, but Snowden
+has shown us that in effect they subpoena all the phone call records
+of everyone in the U.S., all the
+time, <a
href="https://web.archive.org/web/20131226044537/http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order">from
+Verizon</a>
+and <a
href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">from
+other companies too</a>.</p>
+
+<p>Opposition and dissident activities need to keep secrets from
+states that are willing to play dirty tricks on them. The ACLU has
+demonstrated the U.S. government's <a
+href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf">systematic
+practice of infiltrating peaceful dissident groups</a> on the pretext
+that there might be terrorists among them. The point at which
+surveillance is too much is the point at which the state can find who
+spoke to a known journalist or a known dissident.</p>
+</div>
+
+<h3 class="subheader">Information, Once Collected, Will Be Misused</h3>
+
+<div class="columns">
+<p id="willbemisused">When people recognize
+that the level of general surveillance is too
+high, the first response is to propose limits on access to the
+accumulated data. That sounds nice, but it won't fix the problem, not
+even slightly, even supposing that the government obeys the rules.
+(The NSA has misled the FISA court, which said it
+was <a href="http://www.wired.com/threatlevel/2013/09/nsa-violations/">unable
+to effectively hold the NSA accountable</a>.) Suspicion of a crime
+will be grounds for access, so once a whistleblower is accused of
+“espionage,” finding the “spy” will provide an
+excuse to access the accumulated material.</p>
+
+<p>In addition, the state's surveillance staff will misuse the data
+for personal reasons. Some NSA
+agents <a
href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">used
+U.S. surveillance systems to track their lovers</a>—past,
+present, or wished-for—in a practice called
+“LOVEINT.” The NSA says it has caught and punished this a
+few times; we don't know how many other times it wasn't caught. But
+these events shouldn't surprise us, because police have
+long <a
href="https://web.archive.org/web/20160401102120/http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I">used
+their access to driver's license records to track down someone
+attractive</a>, a practice known as “running a plate for a
+date.” This practice has expanded
+with <a
href="https://theyarewatching.org/issues/risks-increase-once-data-shared">new
+digital systems</a>. In 2016, a prosecutor was accused of forging
+judges' signatures to get authorization
+to <a
href="http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933">
+wiretap someone who was the object of a romantic obsession</a>. The AP
+knows
+of <a
href="http://bigstory.ap.org/article/699236946e3140659fff8a2362e16f43/ap-across-us-police-officers-abuse-confidential-databases">many
+other instances in the US</a>.
+</p>
+
+<p>Surveillance data will always be used for other purposes, even if
+this is prohibited. Once the data has been accumulated and the state
+has the possibility of access to it, it can misuse that data in
+dreadful ways, as shown by examples
+from <a
href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/">Europe</a>
+and <a href="https://en.wikipedia.org/wiki/Japanese_American_internment">the
+US </a>.</p>
+
+<p>Personal data collected by the state is also likely to be obtained
+by outside crackers that break the security of the servers, even
+by <a
href="https://www.techdirt.com/articles/20150612/16334231330/second-opm-hack-revealed-even-worse-than-first.shtml">crackers
+working for hostile states</a>.</p>
+
+<p>Governments can easily use massive surveillance capability
+to <a
href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html">subvert
+democracy directly</a>.</p>
+
+<p>Total surveillance accessible to the state enables the state to
+launch a massive fishing expedition against any person. To make
+journalism and democracy safe, we must limit the accumulation of data
+that is easily accessible to the state.</p>
+</div>
+
+<h3 class="subheader">Robust Protection for Privacy Must Be Technical</h3>
+
+<div class="columns">
+<p>The Electronic Frontier Foundation and other organizations propose
+a set of legal principles designed to <a
+href="https://en.necessaryandproportionate.org/text">prevent the
+abuses of massive surveillance</a>. These principles include,
+crucially, explicit legal protection for whistleblowers; as a
+consequence, they would be adequate for protecting democratic
+freedoms—if adopted completely and enforced without exception
+forever.</p>
+
+<p>However, such legal protections are precarious: as recent history
+shows, they can be repealed (as in the FISA Amendments Act),
+suspended, or <a
+href="http://www.nytimes.com/2009/04/16/us/16nsa.html">ignored</a>.</p>
+
+<p>Meanwhile, demagogues will cite the usual excuses as grounds for
+total surveillance; any terrorist attack, even one that kills just a
+handful of people, can be hyped to provide an opportunity.</p>
+
+<p>If limits on access to the data are set aside, it will be as if
+they had never existed: years worth of dossiers would suddenly become
+available for misuse by the state and its agents and, if collected by
+companies, for their private misuse as well. If, however, we stop the
+collection of dossiers on everyone, those dossiers won't exist, and
+there will be no way to compile them retroactively. A new illiberal
+regime would have to implement surveillance afresh, and it would only
+collect data starting at that date. As for suspending or momentarily
+ignoring this law, the idea would hardly make sense.</p>
+</div>
+
+<h3 class="subheader">First, Don't Be Foolish</h3>
+
+<div class="columns">
+<p>To have privacy, you must not throw it away: the first one who has
+to protect your privacy is you. Avoid identifying yourself to web
+sites, contact them with Tor, and use browsers that block the schemes
+they use to track visitors. Use the GNU Privacy Guard to encrypt the
+contents of your email. Pay for things with cash.</p>
+
+<p>Keep your own data; don't store your data in a company's
+“convenient” server. It's safe, however, to entrust a
+data backup to a commercial service, provided you put the files in an
+archive and encrypt the whole archive, including the names of the
+files, with free software on your own computer before uploading
+it.</p>
+
+<p>For privacy's sake, you must avoid nonfree software since, as a
+consequence of giving others control of your computing, it
+is <a href="/philosophy/proprietary-surveillance.html">likely to spy
+on you</a>.
+Avoid <a href="/philosophy/who-does-that-server-really-serve.html">service
+as a software substitute</a>; as well as giving others control of your
+computing, it requires you to hand over all the pertinent data to the
+server.</p>
+
+<p>Protect your friends' and acquaintances' privacy,
+too. <a
href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/">Don't
+give out their personal information</a> except how to contact them,
+and never give any web site your list of email or phone contacts.
+Don't tell a company such as Facebook anything about your friends that
+they might not wish to publish in a newspaper. Better yet, don't be
+used by Facebook at all. Reject communication systems that require
+users to give their real names, even if you are going to give yours,
+since they pressure other people to surrender their privacy.</p>
+
+<p>Self-protection is essential, but even the most rigorous
+self-protection is insufficient to protect your privacy on or from
+systems that don't belong to you. When we communicate with others or
+move around the city, our privacy depends on the practices of society.
+We can avoid some of the systems that surveil our communications and
+movements, but not all of them. Clearly, the better solution is to
+make all these systems stop surveilling people other than legitimate
+suspects.</p>
+</div>
+
+<h3 class="subheader">We Must Design Every System for Privacy</h3>
+
+<div class="columns">
+<p>If we don't want a total surveillance society, we must consider
+surveillance a kind of social pollution, and limit the surveillance
+impact of each new digital system just as we limit the environmental
+impact of physical construction.</p>
+
+<p>For example: “smart” meters for electricity are touted
+for sending the power company moment-by-moment data about each
+customer's electric usage, including how usage compares with users in
+general. This is implemented based on general surveillance, but does
+not require any surveillance. It would be easy for the power company
+to calculate the average usage in a residential neighborhood by
+dividing the total usage by the number of subscribers, and send that
+to the meters. Each customer's meter could compare her usage, over
+any desired period of time, with the average usage pattern for that
+period. The same benefit, with no surveillance!</p>
+
+<p>We need to design such privacy into all our digital systems.</p>
+</div>
+
+<h3 class="subheader">Remedy for Collecting Data: Leaving It Dispersed</h3>
+
+<div class="columns">
+<p>One way to make monitoring safe for privacy is
+to <a name="dispersal">keep the data dispersed and inconvenient to
+access</a>. Old-fashioned security cameras were no threat to privacy(<a
href="#privatespace">*</a>).
+The recording was stored on the premises, and kept for a few weeks at
+most. Because of the inconvenience of accessing these recordings, it
+was never done massively; they were accessed only in the places where
+someone reported a crime. It would not be feasible to physically
+collect millions of tapes every day and watch them or copy them.</p>
+
+<p>Nowadays, security cameras have become surveillance cameras: they
+are connected to the Internet so recordings can be collected in a data
+center and saved forever. This is already dangerous, but it is going
+to get worse. Advances in face recognition may bring the day when
+suspected journalists can be tracked on the street all the time to see
+who they talk with.</p>
+
+<p>Internet-connected cameras often have lousy digital security
+themselves, which
+means <a
href="http://www.networkworld.com/community/blog/cia-wants-spy-you-through-your-appliances">anyone
+can watch what those cameras see</a>. This makes internet-connected
+cameras a major threat to security as well as privacy. For privacy's
+sake, we should ban the use of Internet-connected cameras aimed where
+and when the public is admitted, except when carried by people.
+Everyone must be free to post photos and video recordings
+occasionally, but the systematic accumulation of such data on the
+Internet must be limited.</p>
+
+<p><a name="privatespace"><b>*</b></a>I assume here that the security
+camera points at the inside of a store, or at the street. Any camera
+pointed at someone's private space by someone else violates privacy,
+but that is another issue.</p>
+</div>
+
+<h3 id="digitalcash" class="subheader">Remedy for Internet Commerce
Surveillance</h3>
+
+<div class="columns">
+<p>Most data collection comes from people's own digital activities.
+Usually the data is collected first by companies. But when it comes
+to the threat to privacy and democracy, it makes no difference whether
+surveillance is done directly by the state or farmed out to a
+business, because the data that the companies collect is
+systematically available to the state.</p>
+
+<p>The NSA, through PRISM,
+has <a href="https://www.commondreams.org/headline/2013/08/23-2">gotten
+into the databases of many large Internet corporations</a>. AT&T
+has saved all its phone call records since 1987
+and <a
href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">makes
+them available to the DEA</a> to search on request. Strictly
+speaking, the U.S. government does not possess that data, but in
+practical terms it may as well possess it. Some companies are praised
+for <a
href="https://www.eff.org/who-has-your-back-government-data-requests-2015">resisting
+government data requests to the limited extent they can</a>, but that
+can only partly compensate for the harm they do to by collecting that
+data in the first place. In addition, many of those companies misuse
+the data directly or provide it to data brokers.</p>
+
+<p>The goal of making journalism and democracy safe therefore requires
+that we reduce the data collected about people by any organization,
+not just by the state. We must redesign digital systems so that they
+do not accumulate data about their users. If they need digital data
+about our transactions, they should not be allowed to keep them more
+than a short time beyond what is inherently necessary for their
+dealings with us.</p>
+
+<p>One of the motives for the current level of surveillance of the
+Internet is that sites are financed through advertising based on
+tracking users' activities and propensities. This converts a mere
+annoyance—advertising that we can learn to ignore—into a
+surveillance system that harms us whether we know it or not.
+Purchases over the Internet also track their users. And we are all
+aware that “privacy policies” are more excuses to violate
+privacy than commitments to uphold it.</p>
+
+<p>We could correct both problems by adopting a system of anonymous
+payments—anonymous for the payer, that is. (We don't want to
+help the payee dodge
+taxes.) <a
href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">Bitcoin
+is not anonymous</a>, though there are efforts to develop ways to pay
+anonymously with Bitcoin. However, technology
+for <a href="http://www.wired.com/wired/archive/2.12/emoney_pr.html">digital
+cash was first developed in the 1980s</a>; the GNU software for doing
+this is called <a href="http://taler.net/">GNU Taler</a>. Now we need
+only suitable business arrangements, and for the state not to obstruct
+them.</p>
+
+<p>Another possible method for anonymous payments would
+use <a
href="https://stallman.org/articles/anonymous-payments-thru-phones.html">prepaid
+phone cards</a>. It is less convenient, but very easy to
+implement.</p>
+
+<p>A further threat from sites' collection of personal data is that
+security breakers might get in, take it, and misuse it. This includes
+customers' credit card details. An anonymous payment system would end
+this danger: a security hole in the site can't hurt you if the site
+knows nothing about you.</p>
+</div>
+
+<h3 class="subheader">Remedy for Travel Surveillance</h3>
+
+<div class="columns">
+<p>We must convert digital toll collection to anonymous payment (using
+digital cash, for instance). License-plate recognition systems
+recognize all license plates, and
+the <a
href="http://news.bbc.co.uk/2/hi/programmes/whos_watching_you/8064333.stm">data
+can be kept indefinitely</a>; they should be required by law to notice
+and record only those license numbers that are on a list of cars
+sought by court orders. A less secure alternative would record all
+cars locally but only for a few days, and not make the full data
+available over the Internet; access to the data should be limited to
+searching for a list of court-ordered license-numbers.</p>
+
+<p>The U.S. “no-fly” list must be abolished because it is
+<a
href="https://www.aclu.org/blog/national-security-technology-and-liberty-racial-justice/victory-federal-court-recognizes">punishment
+without trial</a>.</p>
+
+<p>It is acceptable to have a list of people whose person and luggage
+will be searched with extra care, and anonymous passengers on domestic
+flights could be treated as if they were on this list. It is also
+acceptable to bar non-citizens, if they are not permitted to enter the
+country at all, from boarding flights to the country. This ought to
+be enough for all legitimate purposes.</p>
+
+<p>Many mass transit systems use some kind of smart cards or RFIDs for
+payment. These systems accumulate personal data: if you once make the
+mistake of paying with anything but cash, they associate the card
+permanently with your name. Furthermore, they record all travel
+associated with each card. Together they amount to massive
+surveillance. This data collection must be reduced.</p>
+
+<p>Navigation services do surveillance: the user's computer tells the
+map service the user's location and where the user wants to go; then
+the server determines the route and sends it back to the user's
+computer, which displays it. Nowadays, the server probably records
+the user's locations, since there is nothing to prevent it. This
+surveillance is not inherently necessary, and redesign could avoid it:
+free/libre software in the user's computer could download map data for
+the pertinent regions (if not downloaded previously), compute the
+route, and display it, without ever telling anyone where the user is
+or wants to go.</p>
+
+<p>Systems for borrowing bicycles, etc., can be designed so that the
+borrower's identity is known only inside the station where the item
+was borrowed. Borrowing would inform all stations that the item is
+“out,” so when the user returns it at any station (in
+general, a different one), that station will know where and when that
+item was borrowed. It will inform the other station that the item is
+no longer “out.” It will also calculate the user's bill,
+and send it (after waiting some random number of minutes) to
+headquarters along a ring of stations, so that headquarters would not
+find out which station the bill came from. Once this is done, the
+return station would forget all about the transaction. If an item
+remains “out” for too long, the station where it was
+borrowed can inform headquarters; in that case, it could send the
+borrower's identity immediately.</p>
+</div>
+
+<h3 class="subheader">Remedy for Communications Dossiers</h3>
+
+<div class="columns">
+<p>Internet service providers and telephone companies keep extensive
+data on their users' contacts (browsing, phone calls, etc). With
+mobile phones, they
+also <a
href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">record
+the user's physical location</a>. They keep these dossiers for a long
+time: over 30 years, in the case of AT&T. Soon they will
+even <a
href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">record
+the user's body activities</a>. It appears that
+the <a
href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location">NSA
+collects cell phone location data</a> in bulk.</p>
+
+<p>Unmonitored communication is impossible where systems create such
+dossiers. So it should be illegal to create or keep them. ISPs and
+phone companies must not be allowed to keep this information for very
+long, in the absence of a court order to surveil a certain party.</p>
+
+<p>This solution is not entirely satisfactory, because it won't
+physically stop the government from collecting all the information
+immediately as it is generated—which is what
+the <a
href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">U.S.
does
+with some or all phone companies</a>. We would have to rely on
+prohibiting that by law. However, that would be better than the
+current situation, where the relevant law (the PAT RIOT Act) does not
+clearly prohibit the practice. In addition, if the government did
+resume this sort of surveillance, it would not get data about
+everyone's phone calls made prior to that time.</p>
+
+<p>For privacy about who you exchange email with, a simple partial
+solution is for you and others to use email services in a country that
+would never cooperate with your own government, and which communicate
+with each other using encryption. However, Ladar Levison (owner of
+the mail service Lavabit that US surveillance sought to corrupt
+completely) has a more sophisticated idea for an encryption system
+through which your email service would know only that you sent mail to
+some user of my email service, and my email service would know only
+that I received mail from some user of your email service, but it
+would be hard to determine that you had sent mail to me.</p>
+</div>
+
+<h3 class="subheader">But Some Surveillance Is Necessary</h3>
+
+<div class="columns">
+<p>For the state to find criminals, it needs to be able to investigate
+specific crimes, or specific suspected planned crimes, under a court
+order. With the Internet, the power to tap phone conversations would
+naturally extend to the power to tap Internet connections. This power
+is easy to abuse for political reasons, but it is also necessary.
+Fortunately, this won't make it possible to find whistleblowers after
+the fact, if (as I recommend) we prevent digital systems from accumulating
+massive dossiers before the fact.</p>
+
+<p>Individuals with special state-granted power, such as police,
+forfeit their right to privacy and must be monitored. (In fact,
+police have their own jargon term for perjury,
+“<a
href="https://en.wikipedia.org/w/index.php?title=Police_perjury&oldid=552608302">testilying</a>,”
+since they do it so frequently, particularly about protesters
+and <a href="http://photographyisnotacrime.com/">photographers</a>.)
+One city in California that required police to wear video cameras all
+the time
+found <a
href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">their
+use of force fell by 60%</a>. The ACLU is in favor of this.</p>
+
+<p><a
+href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266">Corporations
+are not people, and not entitled to human rights</a>. It is
+legitimate to require businesses to publish the details of processes
+that might cause chemical, biological, nuclear, fiscal, computational
+(e.g., <a href="http://DefectiveByDesign.org">DRM</a>) or political
+(e.g., lobbying) hazards to society, to whatever level is needed for
+public well-being. The danger of these operations (consider the BP
+oil spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs
+that of terrorism.</p>
+
+<p>However, journalism must be protected from surveillance even when
+it is carried out as part of a business.</p>
+</div>
+<div class="column-limit"></div>
+
+<div class="reduced-width">
+<p>Digital technology has brought about a tremendous increase in the
+level of surveillance of our movements, actions, and communications.
+It is far more than we experienced in the 1990s, and <a
+href="https://hbr.org/2013/06/your-iphone-works-for-the-secret-police">far
+more than people behind the Iron Curtain experienced</a> in the 1980s,
+and proposed legal limits on state use of the accumulated data would
+not alter that.</p>
+
+<p>Companies are designing even more intrusive surveillance. Some
+project that pervasive surveillance, hooked to companies such as
+Facebook, could have deep effects on <a
+href="https://www.theguardian.com/technology/2015/aug/10/internet-of-things-predictable-people">how
+people think</a>. Such possibilities are imponderable; but the threat
+to democracy is not speculation. It exists and is visible today.</p>
+
+<p>Unless we believe that our free countries previously suffered from
+a grave surveillance deficit, and ought to be surveilled more than the
+Soviet Union and East Germany were, we must reverse this increase.
+That requires stopping the accumulation of big data about people.</p>
+</div>
+</div>
+
+</div><!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Please send general FSF & GNU inquiries to
+<a href="mailto:address@hidden"><address@hidden></a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF. Broken links and other corrections or suggestions can be sent
+to <a href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 4.0. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright © 2015, 2016, 2017 Richard Stallman</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2017/10/21 12:29:16 $
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+</body>
+</html>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/philosophy po/surveillance-vs-democracy.tra...,
GNUN <=