- tags
- Internet Protocol
Notes
Foreword: Protocol Is as Protocol Does
NOTER_PAGE: (12 0.11943986820428336 . 0.20233050847457626)
NOTER_PAGE: (14 0.6299782766111512 . 0.22211155378486055)
this is clearly not literary criticism. Nor is it semiotics—textual, visual, or otherwise. This is because computer code is always enacted.
NOTER_PAGE: (13 0.7603186097031136 . 0.5756972111553785)
Networks Are Real but Abstract
NOTER_PAGE: (14 0.4308072487644152 . 0.3516949152542373)
Protocol, or Political Economy
NOTER_PAGE: (19 0.08731466227347612 . 0.3792372881355932)
general talk about “networks,” dissociated from their context and technical instantiation, can be replaced by a discussion of “protocols.” Every network is a network be- cause it is constituted by a protocol.
NOTER_PAGE: (19 0.17627677100494235 . 0.4565677966101695)
The central political question that Protocol asks is where the power has gone.
NOTER_PAGE: (20 0.42751235584843494 . 0.22351694915254236)
Isomorphic Biopolitics
NOTER_PAGE: (20 0.7726523887973641 . 0.3930084745762712)
NOTER_PAGE: (20 0.8031301482701813 . 0.4247881355932203)
the mere decision about standards becomes a discourse on “ontol- ogy” in the philosophical sense.
NOTER_PAGE: (23 0.20098846787479407 . 0.3029661016949153)
Preface
NOTER_PAGE: (24 0.1186161449752883 . 0.4385593220338983)
I consider computers to be fundamentally a textual medium. The reason is obvious: computers are based on a technological language called code. This underlying code provides the textual link between computers and critical theory.
NOTER_PAGE: (24 0.7834167262330236 . 0.7288135593220338)
I. How Control Exists After Decentralization
NOTER_PAGE: (28 0.18039538714991762 . 0.263771186440678)
Introduction
NOTER_PAGE: (29 0.1696869851729819 . 0.4036016949152542)
after the disciplinary societies come the societies of control. Deleuze believed that there exist wholly new technologies concurrent with the societies of control.
NOTER_PAGE: (30 0.6095551894563427 . 0.2680084745762712)
protocol is a technique for achieving vol- untary regulation within a contingent environment.
NOTER_PAGE: (34 0.6960461285008237 . 0.4703389830508475)
common for contemporary critics to describe the Internet as an unpredictable mass of data—rhizomatic and lacking central organization. This position states that since new communication technologies are based on the elimination of centralized command and hierarchical control, it follows that the world is witnessing a general disappearance of control as such. This could not be further from the truth.
NOTER_PAGE: (35 0.13591433278418452 . 0.2828389830508475)
What contributes to this misconception (that the Internet is chaotic rather than highly controlled), I suggest, is that protocol is based on a con- tradiction between two opposing machines: One machine radically distrib- utes control into autonomous locales, the other machine focuses control into rigidly defined hierarchies.
NOTER_PAGE: (35 0.3673805601317957 . 0.24258474576271186)
nearly all Web traffic must submit to a hierarchical structure (DNS) to gain access to the anarchic and radically horizontal struc- ture of the Internet. As I demonstrate later, this contradictory logic is ram- pant throughout the apparatus of protocol.
NOTER_PAGE: (36 0.24052718286655683 . 0.3707627118644068)
Because the DNS system is structured like an inverted tree, each branch of the tree holds absolute control over everything below it.
NOTER_PAGE: (36 0.7116968698517299 . 0.21504237288135594)
the content of every new protocol is always an- other protocol.
NOTER_PAGE: (37 0.6062602965403624 . 0.3082627118644068)
NOTER_PAGE: (38 0.7405271828665568 . 0.4989406779661017)
“[d]istributed systems require for their operation a homogenous standard of interconnectivity.”
NOTER_PAGE: (39 0.17215815485996705 . 0.5540254237288136)
Protocol is to control societies as the panopticon is to disciplinary societies.
NOTER_PAGE: (40 0.6046128500823723 . 0.19597457627118645)
Marvin Minsky, Daniel Dennett, John Searle, Hubert Dreyfus, and oth- ers have also wrestled with the topic of artificial intelligence. But they are not addressed here. I draw a critical distinction between this body of work, which is concerned largely with epistemology and cognitive science, and the critical media theory that inspires this book. Where they are concerned with minds and questions epistemological, I am largely concerned with bodies and the material stratum of computer technology.
NOTER_PAGE: (44 0.6696869851729819 . 0.22033898305084745)
NOTER_PAGE: (45 0.3731466227347611 . 0.23940677966101695)
Periodization
NOTER_PAGE: (47 0.3467874794069193 . 0.4533898305084746)
thinkers have roughly agreed on three broad historical phases, these being the classical era, the modern era, and the postmodern era.
NOTER_PAGE: (47 0.5197693574958814 . 0.3336864406779661)
NOTER_PAGE: (49 0.4612850082372323 . 0.600635593220339)
A distributed architecture is pre- cisely that which makes protocological/imperial control of the network so easy. In fact, the various Internet protocols mandate that control may only be derived from such a distributed architecture.
NOTER_PAGE: (52 0.5444810543657331 . 0.5286016949152542)
Empire is the social theory and protocol the tech- nical.
NOTER_PAGE: (53 0.2825370675453048 . 0.22245762711864406)
NOTER_PAGE: (53 0.33031301482701814 . 0.3188559322033898)
NOTER_PAGE: (55 0.1186161449752883 . 0.5074152542372882)
During the Cold War, NORAD was the lynchpin of nuclear defense in North America. It is a “solution” to the nuclear threat. The Internet system could not be more different.
NOTER_PAGE: (57 0.19797596457938013 . 0.6154471544715447)
The panopticon, described in Foucault’s Discipline and Punish, is also a centralized network.
NOTER_PAGE: (58 0.4282099936748893 . 0.21544715447154472)
de- centralized networks are the most common diagram of the modern era.
NOTER_PAGE: (58 0.6685641998734978 . 0.6821138211382114)
Truly distributed networks cannot, in fact, support all-channel communication (a combinatorial utopia),
NOTER_PAGE: (59 0.767235926628716 . 0.4959349593495935)
NOTER_PAGE: (60 0.1283997469955724 . 0.45121951219512196)
today re-centralizing most notably under LLM providers
Distribution propagates through rhythm, not rebirth.
NOTER_PAGE: (61 0.7311827956989247 . 0.3227642276422764)
The highway system is a distributed network because it lacks any centralized hubs and offers direct linkages from city to city through a va- riety of highway combinations.
NOTER_PAGE: (62 0.5433270082226439 . 0.31382113821138213)
NOTER_PAGE: (65 0.11132194813409235 . 0.2869918699186992)
interested in this story wrt highways
What was once protocol’s primary liability in its former military con- text—the autonomous agent who does not listen to the chain of command— is now its primary constituent in the civil context.
NOTER_PAGE: (65 0.21948134092346616 . 0.24146341463414633)
RFCs are a discursive treasure trove for the criti- cal theorist.
NOTER_PAGE: (65 0.4775458570524984 . 0.2951219512195122)
NOTER_PAGE: (67 0.7912713472485768 . 0.45772357723577234)
Code vs Data
The ultimate goal of the Internet protocols is totality. The virtues of the Internet are robustness, contingency, interoperability, flexibility, heterogeneity, pantheism. Accept everything, no matter what source, sender, or destination.
NOTER_PAGE: (69 0.4579380139152435 . 0.24227642276422764)
As a system this robustness is achieved by following a general principle: “Be conservative in what you do, be liberal in what you accept from others.”
NOTER_PAGE: (70 0.7381404174573055 . 0.2186991869918699)
The next-hop strategy means that no single node on the Internet knows definitively where a destination is, merely that it is “over there.”
NOTER_PAGE: (72 0.4142947501581278 . 0.21788617886178863)
The tree structure allows Mockapetris to divide the total name space data- base into more manageable and decentralized zones through a process of hi- erarchization.
NOTER_PAGE: (75 0.6299810246679317 . 0.21788617886178863)
NOTER_PAGE: (76 0.6755218216318786 . 0.21544715447154472)
protocol is based on a con- tradiction between two opposing machinic technologies: One radically dis- tributes control into autonomous locales (exemplified here by TCP and IP), and the other focuses control into rigidly defined hierarchies (exemplified here by DNS).
NOTER_PAGE: (77 0.17773561037318153 . 0.2975609756097561)
DNS is the most heroic of human projects; it is the actual construction of a single, exhaustive index for all things. It is the encyclopedia of mankind, a map that has a one-to-one relationship with its territory.
NOTER_PAGE: (77 0.5167615433270082 . 0.2186991869918699)
DNS is like many other protocols in that, in its mad dash toward universality, it produces sameness or consistency where originally there existed arbitrariness.
NOTER_PAGE: (77 0.5869702719797597 . 0.3699186991869919)
DNS is not simply a translation language, it is language. It governs meaning by mandating that anything meaningful must register and appear somewhere in its system. This is the nature of protocol.
NOTER_PAGE: (77 0.6717267552182163 . 0.375609756097561)
protocol is against interpretation.
NOTER_PAGE: (79 0.4364326375711575 . 0.35040650406504065)
protocological analysis must focus not on the sciences of meaning (representation/interpretation/ reading), but rather on the sciences of possibility (physics or logic),
NOTER_PAGE: (79 0.6325110689437066 . 0.6308943089430894)
The limits of a protocological system and the limits of possibility within that system are synonymous.
NOTER_PAGE: (79 0.7147375079063883 . 0.24227642276422764)
NOTER_PAGE: (81 0.17963314358001264 . 0.47235772357723577)
NOTER_PAGE: (82 0.28526249209361165 . 0.24796747967479674)
protocol from the point of view of the webmaster.
NOTER_PAGE: (82 0.39405439595192915 . 0.35528455284552846)
NOTER_PAGE: (82 0.5452245414294751 . 0.24715447154471545)
NOTER_PAGE: (82 0.6325110689437066 . 0.32439024390243903)
why wouldn’t the many-to-many radio net- work already exist, if it was possible for it to exist? Enzensberger’s answer is that it is prohibited for “political reasons,” and that this prohibition arises from the fundamental structure of capital: “The technical distinction be- tween receivers and transmitters reflects the social division of labor into producers and consumers . . . It is based, in the last analysis, on the basic contradiction between the ruling class and the ruled class.”
NOTER_PAGE: (83 0.3485135989879823 . 0.47804878048780486)
I'm not sure I buy this… hearing is in fact much easier than speaking. it makes sense that far more people would be willing/able to receive than to broadcast
“Fear of handling shit is a luxury a sewerman cannot necessarily afford,”
NOTER_PAGE: (84 0.23908918406072108 . 0.44634146341463415)
“fear of being swallowed up by the system is a sign of weakness; it presupposes that capitalism could overcome any contradic- tion—a conviction which can easily be refuted historically and is theoreti- cally untenable.”
NOTER_PAGE: (84 0.32637571157495254 . 0.27723577235772356)
NOTER_PAGE: (85 0.19734345351043645 . 0.4089430894308943)
Digital Sublime
NOTER_PAGE: (87 0.13409234661606578 . 0.24308943089430896)
if critical theory teaches anything, it is to be wary of the obvious.
NOTER_PAGE: (88 0.39215686274509803 . 0.25447154471544714)
the Web is structured around rigid protocols that govern the transfer and representation of texts and images—so the Web isn’t “an acentered, nonhierarchical, nonsignifying system” as is Deleuze and Guattari’s rhizome.
NOTER_PAGE: (88 0.4579380139152435 . 0.6536585365853659)
The Web is described as a free, structureless network. Yet the rhizome is clearly not the absence of structure. It is the privileging of a certain kind of structure, the horizontal network, over another structure, the tree.
NOTER_PAGE: (88 0.6306135357368754 . 0.216260162601626)
protocol is in fact both poles of this machinic movement, territorializing structure and anarchical distribu- tion.
NOTER_PAGE: (91 0.1555977229601518 . 0.23821138211382115)
Indeed, the Internet works too well. If the Internet were truly rhizomatic, it would resist identification. It would resist the deep, meaningful uses that people make of it everyday.
NOTER_PAGE: (91 0.2827324478178368 . 0.23577235772357724)
Continuity, then, is defined as the set of techniques practiced by web- masters that, taken as a totality, create this pleasurable, fluid experience for the user.
NOTER_PAGE: (91 0.6299810246679317 . 0.23658536585365852)
Conceal the source.
NOTER_PAGE: (91 0.8001265022137888 . 0.23821138211382115)
Eliminate dead links.
NOTER_PAGE: (92 0.715370018975332 . 0.21788617886178863)
Eliminate no links.
NOTER_PAGE: (93 0.13345983554712207 . 0.24065040650406505)
There can be no dead ends on the Inter- net. Each page must go somewhere else, even if that somewhere else is “back.” Each page must be rich with offerings,
NOTER_PAGE: (93 0.15243516761543327 . 0.4658536585365854)
Green means go.
NOTER_PAGE: (93 0.2612270714737508 . 0.24065040650406505)
“Good interfaces do away with text, the way good psychotherapists get rid of repressed memories and emotional blocks.”
NOTER_PAGE: (93 0.4117647058823529 . 0.26422764227642276)
True identity.
NOTER_PAGE: (93 0.4737507906388362 . 0.23821138211382115)
Remove barriers.
NOTER_PAGE: (93 0.603415559772296 . 0.24146341463414633)
NOTER_PAGE: (94 0.08349146110056926 . 0.21788617886178863)
Prohibition against low resolution.
NOTER_PAGE: (94 0.258697027197976 . 0.216260162601626)
Pixels cannot be visible. Fonts must be smooth. Full color palettes are better than limited ones. High-resolution, representational images are better than cheap, simple ones. Low resolution shatters the illusion of continuity because it means that the source, the code, is not being properly concealed.
NOTER_PAGE: (94 0.3289057558507274 . 0.23089430894308943)
cf Ditherpunk
Highest speed possible.
NOTER_PAGE: (94 0.5641998734977862 . 0.216260162601626)
Prohibition on crashes.
NOTER_PAGE: (94 0.6483238456672992 . 0.2146341463414634)
During a crash, the computer changes from being passive to being active.
NOTER_PAGE: (94 0.7141049968374447 . 0.4658536585365854)
NOTER_PAGE: (95 0.08791903858317521 . 0.24634146341463414)
All technology is new technology. Everything else must be eliminated.
NOTER_PAGE: (95 0.08855154965211891 . 0.37317073170731707)
NOTER_PAGE: (95 0.21758380771663505 . 0.24227642276422764)
make the network a natural-feeling extension of the user’s own body. Thus, any mediation between the user and the network must be eliminated. Interfaces must be as transparent as possible.
NOTER_PAGE: (95 0.24351676154332702 . 0.3943089430894309)
Immediacy
All traces of the medium should be hidden,
NOTER_PAGE: (95 0.3308032890575585 . 0.24227642276422764)
Feedback loops.
NOTER_PAGE: (95 0.38962681846932323 . 0.24227642276422764)
NOTER_PAGE: (95 0.771663504111322 . 0.5439024390243903)
The conflict between the total and the specific is palpable on the Internet. Each movement on the Net is recorded in myriad different locations (log files, server statistics, email boxes); however, the real identity of those movements is irrelevant.
NOTER_PAGE: (96 0.09108159392789374 . 0.4121951219512195)
Anonymous but descriptive.
NOTER_PAGE: (96 0.09171410499683745 . 0.2186991869918699)
NOTER_PAGE: (96 0.21631878557874762 . 0.33170731707317075)
NOTER_PAGE: (96 0.32131562302340294 . 0.2186991869918699)
NOTER_PAGE: (96 0.4560404807084124 . 0.3008130081300813)
Record
NOTER_PAGE: (99 0.49335863377609107 . 0.4772357723577236)
NOTER_PAGE: (99 0.5445920303605313 . 0.567479674796748)
NOTER_PAGE: (100 0.17204301075268819 . 0.1951219512195122)
NOTER_PAGE: (100 0.2593295382669197 . 0.22276422764227644)
“the ability to record sense data technologically,” using such instruments as the phonograph and the typwriter, “shifted the entire discourse network circa 1900. For the first time in history, writing ceased to be synonymous with the serial storage of data. The technological recording of the real entered into competition with the symbolic registration of the Symbolic.”
NOTER_PAGE: (100 0.38962681846932323 . 0.41544715447154473)
The record is, in the most abstract sense, any nonchaotic something.
NOTER_PAGE: (100 0.562302340290955 . 0.608130081300813)
Object
NOTER_PAGE: (100 0.6306135357368754 . 0.46260162601626015)
A record is one particular form-of-appearance of an object. The object is the digital economy’s basic unit. It is any unit of content.
NOTER_PAGE: (100 0.6489563567362429 . 0.1943089430894309)
Digital objects are pure positivities. They are the heterogenous elements that exist in what Deleuze and Guattari have called “machinic” processes.
NOTER_PAGE: (101 0.19860847564832385 . 0.2186991869918699)
Objects exist only upon use. They are assembled from scratch each time
NOTER_PAGE: (101 0.3485135989879823 . 0.23739837398373984)
Protocol
NOTER_PAGE: (101 0.6647691334598356 . 0.4788617886178862)
NOTER_PAGE: (101 0.7115749525616698 . 0.25203252032520324)
Browser
NOTER_PAGE: (102 0.5850727387729285 . 0.4585365853658537)
In digital space this “hiding machine,” this making-no-difference machine, is epitomized in the Internet browser.
NOTER_PAGE: (102 0.6748893105629349 . 0.348780487804878)
the goal of protocol is totality, to accept everything. This principle is also exhibited in the browser.
NOTER_PAGE: (103 0.3074003795066414 . 0.4113821138211382)
Resilience vs Efficiency: More generality means less ability to meaningfully describe particular things
cf Should this be a map or 500 maps?
Its virtue is not diversity but university.
NOTER_PAGE: (103 0.49905123339658447 . 0.25853658536585367)
HTML
NOTER_PAGE: (103 0.5401644528779254 . 0.4943089430894309)
Fonts
NOTER_PAGE: (104 0.49968374446552816 . 0.46422764227642277)
3 Power
NOTER_PAGE: (107 0.1752055660974067 . 0.4658536585365854)
consider protocol in its political sense, as a pseudo- ideological force that has influence over real human lives.
NOTER_PAGE: (108 0.3311367380560132 . 0.3654661016949153)
NOTER_PAGE: (108 0.3673805601317957 . 0.6091101694915254)
Foucault has argued that the further the progression into the post- modern (or digital) age, the more politics ceases to interest itself in the soul or the body. Instead, politics desires “life itself.” Foucault calls this type of politics “bio-politics.”
NOTER_PAGE: (108 0.4357495881383855 . 0.2542372881355932)
protocol is an affective, aesthetic force that has control over “life it- self.” This is the key to thinking of protocol as power.
NOTER_PAGE: (108 0.5675453047775947 . 0.2658898305084746)
“Discourse is not the majestically unfolding manifestation of a think- ing, knowing, speaking subject, but, on the contrary, a totality, in which the dispersion of the subject and his discontinuity with himself may be deter- mined.”6 In fact, Foucault writes that his interest lies in the “anonymous and general subject of history,”7 not the social subject of history.
NOTER_PAGE: (110 0.6054365733113674 . 0.2542372881355932)
Biopolitics, then, connects to a certain statistical knowledge about populations. Foucault notes that it is dependent on the basic tenets of liberalism— namely, that people and their societies possess various statistical properties that can be measured. Biopolitics is a species-level knowledge. It is the type of knowledge that, say, UNICEF employs when it claims that the infant mor- tality rate in the United States is 7 per every 1,000 births.16 This is the mo- ment of biopolitics.
NOTER_PAGE: (112 0.2895696571845368 . 0.30393996247654786)
Legibility
NOTER_PAGE: (114 0.2676878191101386 . 0.3123827392120075)
Second Nature
NOTER_PAGE: (114 0.40700218818380746 . 0.4268292682926829)
For my purposes, “second nature” refers to the way in which material objects in the modern era have a tendency to become aesthetic objects.
NOTER_PAGE: (115 0.5805981035740335 . 0.2073170731707317)
Does Capital have an aesthetic essence accessible to the medium of film? How would it be possible to make such a film, and who would watch it?
NOTER_PAGE: (116 0.39095550692924874 . 0.551594746716698)
NOTER_PAGE: (117 0.5229759299781181 . 0.2626641651031895)
The contradiction at the heart of protocol is that it has to standardize in order to liberate. It has to be fascistic and unilateral in order to be utopian. It contains, as Jameson wrote of mass culture before it, both the ability to imagine an unalienated social life and a window into the dystopian realities of that life.
NOTER_PAGE: (122 0.09117432530999271 . 0.075046904315197)
Marx is obsessed with animals, plants and minerals of all kinds.
NOTER_PAGE: (123 0.45805981035740334 . 0.28330206378986866)
Specters, monsters, and vampires riddle his text. As Derrida has shown in Specters of Marx, the concept of haunting appears several times in Capital
NOTER_PAGE: (124 0.1539022611232677 . 0.2270168855534709)
the idea that inversion, or upside-downness, is linked directly to illusion, mystification, and misrecognition. Because Hegel (and idealists like him) was standing on his head, he couldn’t see the world as it was.
NOTER_PAGE: (126 0.13274981765134938 . 0.23921200750469043)
The use of vitalistic imagery, no matter how margin- alized within the text, quite literally aestheticizes capitalism. It turns capital- ism into media.
NOTER_PAGE: (129 0.3063457330415755 . 0.3330206378986867)
NOTER_PAGE: (129 0.450036469730124 . 0.25328330206378985)
The vital quality of pure matter has long haunted the modern era.
NOTER_PAGE: (129 0.5652808169219548 . 0.21669793621013134)
NOTER_PAGE: (129 0.6090444930707513 . 0.3142589118198874)
this book has very little to say about questions epistemological. Protocol is not a theory of mind.
NOTER_PAGE: (130 0.28519328956965717 . 0.24859287054409004)
NOTER_PAGE: (130 0.4405543398978848 . 0.18574108818011256)
The anti-entropic position states, simply, that life is precisely that force that resists entropy.
NOTER_PAGE: (130 0.5886214442013129 . 0.3921200750469043)
Life as Anti-Entropy
Genes and memes (themselves also genes, but in the realm of culture) are two ways of moving against the entropic force,
NOTER_PAGE: (131 0.26258205689277897 . 0.4024390243902439)
living beings are characterized as anti-entropic, vitality being the op- posite of entropy,
NOTER_PAGE: (131 0.5667396061269147 . 0.2654784240150094)
machines also resist entropy.
NOTER_PAGE: (132 0.5674690007293947 . 0.23170731707317074)
NOTER_PAGE: (133 0.08533916849015317 . 0.21200750469043153)
NOTER_PAGE: (134 0.22173595915390226 . 0.6210131332082551)
The self-determinism of material systems is therefore the essence of cybernetics, and it is a positive essence,
NOTER_PAGE: (134 0.41210795040116704 . 0.4906191369606004)
Artificial Life
NOTER_PAGE: (134 0.4989059080962801 . 0.42964352720450283)
this shift—from procedural to object-oriented—follows the shift from the modern to the postmodern eras. In what she calls “the modernist computational aesthetic” the computer was viewed as a “giant calculator,” and program- ming it “was a cut-and-dried technical activity whose rules were crystal clear.”90 However, in today’s multifaceted, distributed environments, “com- putational models of the mind often embrace a postmodern aesthetic of com- plexity and decentering. Mainstream computer researchers no longer aspire to program intelligence into computers but expect intelligence to emerge from the interactions of small subprograms.”
NOTER_PAGE: (135 0.3698517298187809 . 0.4173728813559322)
The ecologically minded Ray has gone so far as to advocate the institution on the Net of a wildlife preserve for digital organisms.
NOTER_PAGE: (136 0.5601317957166392 . 0.21610169491525424)
Life as Medium (Life Becoming Matter)
NOTER_PAGE: (137 0.2504118616144975 . 0.3326271186440678)
NOTER_PAGE: (137 0.30642504118616143 . 0.448093220338983)
The “information age”—a term irreverently tossed to and fro by many critics of contemporary life—is not simply that moment when computers come to dominate, but is instead that moment in history when matter itself is understood in terms of information or code. At this historical moment, protocol becomes a controlling force in social life.
NOTER_PAGE: (138 0.15197779319916724 . 0.1944692239072257)
cf Cybernetics
from a “kingdom of sense” in the year 1800 to a “kingdom of pat- tern” in 1900.
NOTER_PAGE: (138 0.2817487855655795 . 0.256021409455843)
NOTER_PAGE: (138 0.30603747397640524 . 0.2952720785013381)
Life was no longer a “pair of ragged claws / Scuttling across the floors of silent seas” (Eliot), it was a code borne from pure mathematics, an object of aesthetic beauty, a double helix! This historical moment—when life is de- fined no longer as essence, but as code—is the moment when life becomes a medium.
NOTER_PAGE: (138 0.5412907702984039 . 0.21855486173059768)
biometrics does some- thing much more important. It considers living human bodies not in their immaterial essences, or souls, or what have you, but in terms of quantifiable, recordable, enumerable, and encodable characteristics. It considers life as an aesthetic object.
NOTER_PAGE: (140 0.5614156835530881 . 0.288135593220339)
NOTER_PAGE: (140 0.6981263011797363 . 0.2167707404103479)
Collaborative filtering, also called suggestive filtering and included in the growing field of “intelligent agents,” allows one to predict new characteristics (particularly one’s so-called desires) based on survey data.
NOTER_PAGE: (140 0.8008327550312283 . 0.4674397859054416)
because collaborative filtering works through a process of interpellation (selecting data interior rather than exterior to a given set), no improvement in the overall data pool is possible. Thus, collaborative filtering ensures structural homogeneity rather than het- erogeneity. While any given user may experience a broadening of his or her personal tastes, the pool at large becomes less and less internally diverse.
NOTER_PAGE: (141 0.6585704371963914 . 0.5771632471008029)
NOTER_PAGE: (141 0.8084663428174879 . 0.5343443354148082)
II. Failures of Protocol
NOTER_PAGE: (144 0.11242192921582234 . 0.47903657448706516)
4 Institutionalization
NOTER_PAGE: (145 0.12144344205412907 . 0.5084745762711864)
NOTER_PAGE: (146 0.1970853573907009 . 0.22123104371097235)
protocol requires universal adoption. As a protocological product, Usenet is vulnerable because of this. Even a single party can exploit a weakness and, like a virus, propagate through the system with logical ferocity.
NOTER_PAGE: (147 0.15336571825121442 . 0.3818019625334523)
think of bureaucratic interests as visiting protocol from without due to the im- position of a completely prior and foreign control diagram, while propri- etary interests arrive from within as a coopting of protocol’s own explosive architecture. Bureaucracy is protocol atrophied, while propriety is protocol reified.
NOTER_PAGE: (148 0.11242192921582234 . 0.19000892060660127)
bureaucratic and institutional forces (as well as proprietary interests) are together the inverse of protocol’s control logic.
NOTER_PAGE: (148 0.28452463566967384 . 0.38626226583407675)
Organizations like ICANN are the enemy of protocol because they limit the open, free development of technology.
NOTER_PAGE: (148 0.5010409437890354 . 0.3621766280107047)
protocol is a type of controlling logic that operates outside institutional, governmental, and corporate power,
NOTER_PAGE: (149 0.28383067314365024 . 0.3175735950044603)
Of the twenty-five or so orig- inal protocol pioneers, three of them—Vint Cerf, Jon Postel, and Steve Crocker—all came from a single high school in Los Angeles’s San Fernando Valley.
NOTER_PAGE: (149 0.6280360860513532 . 0.25512934879571814)
the standards makers at the heart of this technology are a small entrenched group of techno-elite peers. The reasons for this are largely practical. “Most users are not interested in the details of Internet protocols,” Cerf observes. “They just want the system to work.”
NOTER_PAGE: (150 0.17626648160999306 . 0.3621766280107047)
Consumers Don't Care
C++ has been tremendously successful as a language. “The spread was world-wide from the beginning,” recalled Stroustrup. “[I]t fit into more environments with less trouble than just about anything else.” Just like a protocol.
NOTER_PAGE: (151 0.5440666204024982 . 0.23996431757359502)
NOTER_PAGE: (152 0.3913948646773074 . 0.4504906333630687)
Sony tried to fortify its market position by keeping Betamax to itself.
NOTER_PAGE: (152 0.5003469812630118 . 0.3916146297948261)
protocological behavior (giving out your technology broadly even if it means giving it to your competitors) often wins out over proprietary behavior.
NOTER_PAGE: (153 0.33032616238723106 . 0.6975914362176628)
Protocol does not interface with content, with se- mantic value. It is, as I have said, against interpretation. But with Bern- ers-Lee comes a new strain of protocol: protocol that cares about meaning. This is what he means by a Semantic Web.
NOTER_PAGE: (166 0.4580152671755725 . 0.3960749330954505)
NOTER_PAGE: (166 0.6516308119361555 . 0.24085637823371991)
local differences are elided in favor of uni- versal consistencies.
NOTER_PAGE: (168 0.131852879944483 . 0.33898305084745767)
Thus it is an oversight for theorists like Lawrence Lessig (despite his strengths) to suggest that the origin of Internet communication was one of total freedom and lack of control.46 Instead, it is clear to me that the exact opposite of freedom—that is, control—has been the outcome of the last forty years of developments in networked communications. The founding prin- ciple of the Net is control, not freedom. Control has existed from the beginning.
NOTER_PAGE: (168 0.3275503122831367 . 0.2176628010704728)
control based on openness, inclusion, universalism, and flexibility. It is control borne from high degrees of technical organization (protocol), not this or that limitation on individual freedom or decision making (fascism).
NOTER_PAGE: (169 0.17557251908396945 . 0.27832292595896524)
NOTER_PAGE: (169 0.24219292158223454 . 0.2863514719000892)
The generative contradiction that lies at the very heart of protocol is that in order to be politically progressive, protocol must be partially reactionary.
NOTER_PAGE: (169 0.5419847328244275 . 0.6851025869759144)
in order for protocol to enable radically distributed communications between autonomous entities, it must employ a strategy of universalization, and of homogeneity. It must be anti-diversity.
NOTER_PAGE: (169 0.6099930603747398 . 0.41570026761819806)
Scale requires/creates homogeneity
III Protocol Futures
NOTER_PAGE: (172 0.11450381679389313 . 0.471900089206066)
5 Hacking
NOTER_PAGE: (173 0.1179736294240111 . 0.5066904549509367)
NOTER_PAGE: (174 0.24219292158223454 . 0.3175735950044603)
Network Effects
especially difficult to speak about protocol in a nega- tive sense, for its very success helps preclude outsider positions. Only the participants can connect, and therefore, by definition, there can be no resist- ance to protocol (at least not in any direct or connected sense).
NOTER_PAGE: (174 0.4587092297015961 . 0.36752899197145406)
members of the left continue to act as if they still live in the age of early capital.”
NOTER_PAGE: (177 0.4802220680083275 . 0.43086529884032115)
The police crackdown arrived full force in 1990 after the January 15, 1990, crash of AT&T’s long- distance system.
NOTER_PAGE: (183 0.2623178348369188 . 0.3336306868867083)
Now when people say hacker, they mean terrorist.
NOTER_PAGE: (184 0.10548230395558639 . 0.33987511150758254)
the current debate on hackers is help- lessly throttled by the discourse on contemporary liberalism: should one re- spect data as private property, or should one cultivate individual freedom and leave computer users well enough alone?
NOTER_PAGE: (184 0.13462873004857737 . 0.4870651204281891)
NOTER_PAGE: (184 0.5655794587092297 . 0.4130240856378234)
Tiger Teams
NOTER_PAGE: (185 0.3233865371269951 . 0.46208742194469227)
“A true hacker is not a group person,”31 wrote Stewart Brand in 1972. Or, as he would write fifteen years later: “Workers of the world, fan out”32—advice that inverts the message of resistance-through-unity found in Marx and En- gel’s Communist Manifesto.
NOTER_PAGE: (187 0.476058292852186 . 0.23996431757359502)
“[t]he use of power through number—from labor unions to activist organizations—is bankrupt, because such a strategy requires . . . the existence of a centralized present enemy.”
NOTER_PAGE: (187 0.5641915336571824 . 0.33541480820695807)
The nomadic model “seeks to undermine the symbolic order with more ephemeral, process-oriented methods,”
NOTER_PAGE: (188 0.10687022900763359 . 0.19090098126672614)
Code
NOTER_PAGE: (191 0.24288688410825815 . 0.495985727029438)
NOTER_PAGE: (192 0.15614156835530882 . 0.2167707404103479)
not in the fact that code is sub- linguistic, but rather in the fact that it is hyperlinguistic. Code is a language, but a very special kind of language. Code is the only language that is executable.
NOTER_PAGE: (192 0.41360166551006244 . 0.5504014272970562)
cf Code vs Data: this is the characteristic that distinguishes code from mere data
a machine for con- verting meaning into action.
NOTER_PAGE: (193 0.08882720333102012 . 0.43264942016057095)
Code has a semantic meaning, but it also has an enactment of meaning.
NOTER_PAGE: (193 0.13254684247050658 . 0.23996431757359502)
NOTER_PAGE: (193 0.5218598195697433 . 0.2167707404103479)
Uncompiled source code is logically equivalent to that same code compiled into assembly language and/or linked into machine code.
NOTER_PAGE: (194 0.23941707147814018 . 0.26583407671721676)
NOTER_PAGE: (194 0.3504510756419153 . 0.40053523639607497)
Possibility
NOTER_PAGE: (194 0.527411519777932 . 0.44157002676181983)
Protocol is synonymous with possibility. From the perspective of protocol, if you can do it, it can’t be bad,
NOTER_PAGE: (195 0.21790423317140872 . 0.24353256021409456)
Hackers don’t care about rules, feelings, or opinions. They care about what is true and what is possible. And in the logical world of computers, if it is possible then it is real. Can you break into a computer, not should you or is it right to.
NOTER_PAGE: (195 0.28452463566967384 . 0.24620874219446923)
Now, who is to blame? ME for getting it or YOU for being such an idiot?!”
NOTER_PAGE: (195 0.5232477446217904 . 0.5976806422836753)
if technology is proprietary it ceases to be protocological.
NOTER_PAGE: (199 0.26717557251908397 . 0.4451382694023194)
with protocol comes the exciting new ability to leverage possibility and action through code.
NOTER_PAGE: (199 0.6315058986814712 . 0.6173059768064229)
NOTER_PAGE: (201 0.12352532963219985 . 0.5075825156110616)
computer viruses are incredibly effective at identifying anti- protocological technologies. They infect proprietary systems and propagate through the homogeneity contained within them. Show me a computer virus and I’ll show you proprietary software with a market monopoly.
NOTER_PAGE: (202 0.6544066620402498 . 0.3175735950044603)
Computer Viruses
NOTER_PAGE: (203 0.34351145038167935 . 0.4362176628010705)
Morris’s worm was characterized as a mistake, not an overt criminal act. Likewise his punishment was relatively lenient
NOTER_PAGE: (211 0.1554476058292852 . 0.39072256913470116)
While Melissa was gen- erally admitted to have been more of a nuisance than a real threat, Smith was treated as a hard criminal rather than a blundering geek. He pleaded guilty to ten years and a $150,000 fine.
NOTER_PAGE: (211 0.32616238723108953 . 0.4469223907225692)
self-replicating programs flipped 180 degrees. The virus is now indicative of criminal wrongdoing.
NOTER_PAGE: (211 0.41360166551006244 . 0.39964317573595004)
Cyberfeminism
NOTER_PAGE: (211 0.6481609993060374 . 0.4487065120428189)
women have traditionally comprised the laboring core of networks of all kinds, particularly the telecommunications networks.
NOTER_PAGE: (216 0.20333102012491325 . 0.21409455842997324)
a lot of ‘orthodox’ feminist theory was still very technophobic.”
NOTER_PAGE: (216 0.3934767522553782 . 0.608385370205174)
Conflicting Diagrams
NOTER_PAGE: (223 0.3247744621790423 . 0.4210526315789474)
Terrorism is a sign that we are in a transitional moment in history. (Could there ever be anything else?) It signals that historical actors are not in a re- lationship of equilibrium, but are instead grossly mismatched.
NOTER_PAGE: (224 0.5857043719639139 . 0.18911685994647637)
NOTER_PAGE: (227 0.32616238723108953 . 0.24085637823371991)
Baran’s advice to the American military was to become network-like. And once it did the nuclear threat was no longer a catastrophic threat to communications and mobility
NOTER_PAGE: (231 0.7869535045107564 . 0.46297948260481714)
NOTER_PAGE: (232 0.41221374045801523 . 0.21409455842997324)
The dilemma, then, is that while hierarchy and centralization are almost certainly politically tainted due to their historical association with fascism and other abuses, networks are both bad and good.
NOTER_PAGE: (233 0.13254684247050658 . 0.24174843889384479)
mobility and disguise.
NOTER_PAGE: (233 0.24358084663428173 . 0.21409455842997324)
7 Internet Art
NOTER_PAGE: (235 0.11589174184594031 . 0.5084745762711864)
NOTER_PAGE: (237 0.43650242886884105 . 0.215878679750223)
NOTER_PAGE: (237 0.6086051353226926 . 0.24085637823371991)
NOTER_PAGE: (240 0.13532269257460097 . 0.23015165031222123)
NOTER_PAGE: (241 0.13324080499653018 . 0.27564674397859057)
NOTER_PAGE: (241 0.3941707147814018 . 0.3978590544157003)
NOTER_PAGE: (241 0.6509368494101319 . 0.520963425512935)
If the network itself is political from the start, then any artistic practice within that network must engage politics or feign ignorance.
NOTER_PAGE: (241 0.8008327550312283 . 0.5263157894736842)
NOTER_PAGE: (246 0.41360166551006244 . 0.3452274754683319)
Constraints Encourage Creativity
As computers and network bandwidth improved during the late 1990s, the primary physical reality that governed the aesthetic space of net.art began to fall away.
NOTER_PAGE: (247 0.11242192921582234 . 0.215878679750223)
Internet Art as Art of the Network
NOTER_PAGE: (247 0.24011103400416375 . 0.3621766280107047)
Internet Art as Art of Software
NOTER_PAGE: (253 0.7335183900069396 . 0.3791257805530776)
NOTER_PAGE: (254 0.19777931991672448 . 0.31400535236396077)
artist groups like Etoy and RTMark have begun to think and act like corporations, even going so far as to create mutual funds and issue stocks as art objects.
NOTER_PAGE: (255 0.11450381679389313 . 0.5860838537020517)
cf NFTs
People will have their own character and will have an in- come—if they work hard they get etoy.SHARE options.
NOTER_PAGE: (259 0.1956974323386537 . 0.3639607493309545)
The goal of Toywar was to wage “art war” on eToys Inc., trying to drive its stock price to as low a value as possible—and in the first two weeks of Toywar, eToys’ stock price on the NASDAQ plummeted by over 50 percent and continued to nosedive.
NOTER_PAGE: (259 0.30326162387231087 . 0.264049955396967)
Auctionism
NOTER_PAGE: (260 0.15822345593337958 . 0.43978590544157004)
Conclusion
NOTER_PAGE: (267 0.18181818181818182 . 0.42283675289919714)
With bumps, the driver wants to drive more slowly. With bumps, it becomes a virtue to drive slowly. But with police presence, driving slowly can never be more than coerced behavior. Thus, the signage appeals to the mind, while protocol always appeals to the body.
NOTER_PAGE: (268 0.5010409437890354 . 0.2542372881355932)
Regulative vs Constitutive
Protocol is not a superego (like the police); instead it always operates at the level of desire, at the level of “what we want.”
NOTER_PAGE: (268 0.564885496183206 . 0.35236396074933096)
the ruling elite is tired of trees too.
NOTER_PAGE: (269 0.5218598195697433 . 0.4611953612845674)
NOTER_PAGE: (270 0.17834836918806385 . 0.5941123996431757)
restating a few summarizing moments
NOTER_PAGE: (270 0.4809160305343511 . 0.3345227475468332)
It is very likely if not inevitable that the core Internet protocols, to- day largely safe from commercial and state power, will be replaced by some type of proprietary system. (The fact that Microsoft has not yet replaced TCP/IP with a commercial product of its own is one of the miracles of computer history. Chances are this will happen very soon.)
NOTER_PAGE: (271 0.5447605829285218 . 0.2872435325602141)
has this happened? TCP/IP hasn't been “replaced”, but…
NOTER_PAGE: (271 0.7834836918806384 . 0.592328278322926)
a better synonym for protocol might be “the practical,” or even “the sensible.”
NOTER_PAGE: (272 0.08952116585704371 . 0.2578055307760928)
“sensible” as in “partage du”?
it is dangerous because it acts to make concrete our fun- damentally contingent and immaterial desires (a process called reification), and in this sense protocol takes on authoritarian undertones.
NOTER_PAGE: (272 0.3504510756419153 . 0.35682426404995543)
NOTER_PAGE: (272 0.5433726578764746 . 0.19714540588760038)
Perhaps an analogy from Berners-Lee would help clarify this. The Web, he writes, is like a market economy: In a market economy, anybody can trade with anybody, and they don’t have to go to a market square to do it. What they do need, however, are a few practices everyone has to agree to, such as the currency used for trade, and the rules of fair trading.
NOTER_PAGE: (273 0.10964607911172797 . 0.431757359500446)
Do we want the Web to function like a mar- ket economy?
NOTER_PAGE: (273 0.5850104094378903 . 0.3033006244424621)
Index
NOTER_PAGE: (276 0.12283136710617626 . 0.4531668153434434)
Notes that link to this note