Maxims, rules of thumb and other observations on human cognition and sociocultural affectations

This will be added to on an irregular basis...
  • What is said to humans directly is received with skepticism and considered with dubiousness while that which is heard in passing, especially that which most conforms to their mentality or prejudices, is readily believed.
  • Humans have a certain cognitive latency between exposure to new information or experiences and the ability to think dispassionately and intellectually about it.
  • Humans have a certain cognitive spectrum starting with the moment of exposure to new information or experiences and ending with some point at which the thing is effectively "in the past" for them.
  • This cognitive spectrum is linked to the emotional process often referred to as shock, anger, denial and acceptance.
  • The more and faster information or experiences are presented to people and the closer the quarters and the lesser the distance between people, the more their early reactions in the passionate emotional stage are reflected back to them in the manner of responses to those reactions from others in light of those responses.
  • The more outrages which are suffered without sufficient time to allow emotional bleed-off, the farther the bar for subsequent reaction and outrage are pushed, and the more further events must progress before reaction and outrage.
  • It is possible for serious detriments to eventually sit below this threshold for long enough for their damaging effects to build and multiply until their entire society undergoes some reactive convulsion.
Bookmark and Share

Friday, January 11, 2008

AT&T and the rest of the Internet carriers JUST DON'T GET IT.

Maybe this will help:

Image from Star Wars, found at http://www.georgettesworld.com/main/swlukehanleia.html 

"The more you tighten your grip, Tarkin, the more star systems will slip through your fingers."

AT&T and Other I.S.P.s May Be Getting Ready to Filter - Bits - Technology - New York Times Blog

Encrypted filed sharing systems immune to such packet filtering other than to block them because the ISP can't figure out what they are already exist and will continue to expand and evolve. Steganographic techniques to alleviate that problem by making them look like normal allowed traffic will be used. Encryption, deception, misdirection, and just plain shiftiness will become the average netizen's every day experience and modus operandi.

HOWEVER, the average American is totally unaware of how to do these things without goodly study online of the techniques now available, and the present complexities make it not worth while. So how do you reconcile the two facts? Simple. Just as Internet usage at the dawn of the transition from DARPANET to Internet was complex and required technical skill and no longer does, so too will the techie geeks conquer these usability issues and make it as easy as point, double-click, done.

Right now, use of encrypting hard drive controllers and boot loaders is a bit beyond even the otherwise very thorough terrorists of Al Queda. In a few years, thanks to the government and big business, politics and influence, and the paranoia which drives and governs them so often, such things will come with the machine when you buy it. Enter your set-up passwords and there you go. Everything encrypted in multiple layers making the ultimate breaking of captured data take longer than the Earth has left before the Sun enters its red giant phase.

EVERYONE WILL BY DEFAULT HAVE ALL DATA ENCRYPTED AT ALL TIMES WHETHER ON MEDIA OR TRANSMITTED ACROSS NETWORKS. THE VERY SOFTWARE VIEWERS THEY USE WILL NEVER LEAVE THE DATA IN ANY UNENCRYPTED FORMAT AT ALL WHERE IT CAN BE CAPTURED.

Just as the proliferation of viruses and spyware has resulted in a large industry of point and click anti-virus solutions causing computers to be vastly more secured today than they were in the past, so too will these continuing encroachments on the privacy of the populace drive a defensive response by the people towards embracing hiding their data no matter what it is.

If you think getting at hidden and encrypted data is hard for law enforcement now, wait till they can't tell a recipe from a communication to bomb a government facility. The very government which used fear of that very eventuality as an excuse to infringe our rights will be one third of the reason that in the future their problems become multiplied beyond exponentially.

The second third will be the cretins of AT&T, the RIAA and MPAA, and our law industry all of whom are either living in fear of lawsuits, or living in slathering anticipation of lawsuits.

The final third will be the people themselves who are simultaneously too stupid to realize what venal, dishonest, unprincipled, unethical, immoral weasels they've put in power in both government and business, and too stupid to stop them from passing whatever laws and colluding to create whatever agreements they feel best for their own selfish interests.

Never mind too stupid to stop selling themselves and each other crushing hopelessness that they seek to fill with never ending gluttony for senseless, mindless, vacuous shit that passes for entertainment.

On come the cyber wars and the static leveling.