Protocol: how control exists after decentralization

tags
Internet Protocol

Notes

Foreword: Protocol Is as Protocol Does

NOTER_PAGE: (12 0.11943986820428336 . 0.20233050847457626)

makes a case for a material understanding of technology. “Material” can be taken in all senses of the term, as an ontological category as well as a political and economic one. This type of materialist media studies shows how the question “how does it work?” is also the question “whom does it work for?”

NOTER_PAGE: (14 0.6299782766111512 . 0.22211155378486055)

this is clearly not literary criticism. Nor is it semiotics—textual, visual, or otherwise. This is because computer code is always enacted.

NOTER_PAGE: (13 0.7603186097031136 . 0.5756972111553785)

Networks Are Real but Abstract

NOTER_PAGE: (14 0.4308072487644152 . 0.3516949152542373)

Protocol, or Political Economy

NOTER_PAGE: (19 0.08731466227347612 . 0.3792372881355932)

general talk about “networks,” dissociated from their context and technical instantiation, can be replaced by a discussion of “protocols.” Every network is a network be- cause it is constituted by a protocol.

NOTER_PAGE: (19 0.17627677100494235 . 0.4565677966101695)

The central political question that Protocol asks is where the power has gone.

NOTER_PAGE: (20 0.42751235584843494 . 0.22351694915254236)

Isomorphic Biopolitics

NOTER_PAGE: (20 0.7726523887973641 . 0.3930084745762712)
NOTER_PAGE: (20 0.8031301482701813 . 0.4247881355932203)

the mere decision about standards becomes a discourse on “ontol- ogy” in the philosophical sense.

NOTER_PAGE: (23 0.20098846787479407 . 0.3029661016949153)

Preface

NOTER_PAGE: (24 0.1186161449752883 . 0.4385593220338983)
NOTER_PAGE: (24 0.7834167262330236 . 0.7288135593220338)

I. How Control Exists After Decentralization

NOTER_PAGE: (28 0.18039538714991762 . 0.263771186440678)

Introduction

NOTER_PAGE: (29 0.1696869851729819 . 0.4036016949152542)
after the disciplinary societies come the societies of control. Deleuze believed that there exist wholly new technologies concurrent with the societies of control.
NOTER_PAGE: (30 0.6095551894563427 . 0.2680084745762712)
protocol is a technique for achieving vol- untary regulation within a contingent environment.
NOTER_PAGE: (34 0.6960461285008237 . 0.4703389830508475)
common for contemporary critics to describe the Internet as an unpredictable mass of data—rhizomatic and lacking central organization. This position states that since new communication technologies are based on the elimination of centralized command and hierarchical control, it follows that the world is witnessing a general disappearance of control as such. This could not be further from the truth.
NOTER_PAGE: (35 0.13591433278418452 . 0.2828389830508475)
What contributes to this misconception (that the Internet is chaotic rather than highly controlled), I suggest, is that protocol is based on a con- tradiction between two opposing machines: One machine radically distrib- utes control into autonomous locales, the other machine focuses control into rigidly defined hierarchies.
NOTER_PAGE: (35 0.3673805601317957 . 0.24258474576271186)
nearly all Web traffic must submit to a hierarchical structure (DNS) to gain access to the anarchic and radically horizontal struc- ture of the Internet. As I demonstrate later, this contradictory logic is ram- pant throughout the apparatus of protocol.
NOTER_PAGE: (36 0.24052718286655683 . 0.3707627118644068)
Because the DNS system is structured like an inverted tree, each branch of the tree holds absolute control over everything below it.
NOTER_PAGE: (36 0.7116968698517299 . 0.21504237288135594)
the content of every new protocol is always an- other protocol.
NOTER_PAGE: (37 0.6062602965403624 . 0.3082627118644068)
Like the rhizome, each node in a dis- tributed network may establish direct communication with another node, without having to appeal to a hierarchical intermediary. Yet in order to ini- tiate communication, the two nodes must speak the same language. This is why protocol is important. Shared protocols are what defines the landscape of the network—who is connected to whom.
NOTER_PAGE: (38 0.7405271828665568 . 0.4989406779661017)
“[d]istributed systems require for their operation a homogenous standard of interconnectivity.”
NOTER_PAGE: (39 0.17215815485996705 . 0.5540254237288136)
Protocol is to control societies as the panopticon is to disciplinary societies.
NOTER_PAGE: (40 0.6046128500823723 . 0.19597457627118645)
Marvin Minsky, Daniel Dennett, John Searle, Hubert Dreyfus, and oth- ers have also wrestled with the topic of artificial intelligence. But they are not addressed here. I draw a critical distinction between this body of work, which is concerned largely with epistemology and cognitive science, and the critical media theory that inspires this book. Where they are concerned with minds and questions epistemological, I am largely concerned with bodies and the material stratum of computer technology.
NOTER_PAGE: (44 0.6696869851729819 . 0.22033898305084745)
study computers as André Bazin studied film or Roland Barthes studied the striptease: to look at a material technology and analyze its specific formal functions and dysfunctions.
NOTER_PAGE: (45 0.3731466227347611 . 0.23940677966101695)
Periodization
NOTER_PAGE: (47 0.3467874794069193 . 0.4533898305084746)
thinkers have roughly agreed on three broad historical phases, these being the classical era, the modern era, and the postmodern era.
NOTER_PAGE: (47 0.5197693574958814 . 0.3336864406779661)
In Deleuze, therefore, com- puters are historically concurrent with control societies.
NOTER_PAGE: (49 0.4612850082372323 . 0.600635593220339)
A distributed architecture is pre- cisely that which makes protocological/imperial control of the network so easy. In fact, the various Internet protocols mandate that control may only be derived from such a distributed architecture.
NOTER_PAGE: (52 0.5444810543657331 . 0.5286016949152542)
Empire is the social theory and protocol the tech- nical.
NOTER_PAGE: (53 0.2825370675453048 . 0.22245762711864406)
An analysis of computer protocols proves this, for it reassigns the former weapons of Leftists—celebration of difference, attack on essen- tialism, and so forth—as the new tools of Empire: “This new enemy not only is resistant to the old weapons but actually thrives on them, and thus joins its would-be antagonists in applying them to the fullest. Long live differ- ence! Down with essentialist binaries.”49 A distributed network is precisely what gives IP its effectiveness as a dominant protocol. Or to take another ex- ample, the flimsy, cross-platform nature of HTML is precisely what gives it its power as a protocological standard. Like Empire, if protocol dared to cen- tralize, or dared to hierarchize, or dared to essentialize, it would fail.
NOTER_PAGE: (53 0.33031301482701814 . 0.3188559322033898)

1 Physical Media

NOTER_PAGE: (55 0.1186161449752883 . 0.5074152542372882)
During the Cold War, NORAD was the lynchpin of nuclear defense in North America. It is a “solution” to the nuclear threat. The Internet system could not be more different.
NOTER_PAGE: (57 0.19797596457938013 . 0.6154471544715447)
The panopticon, described in Foucault’s Discipline and Punish, is also a centralized network.
NOTER_PAGE: (58 0.4282099936748893 . 0.21544715447154472)
de- centralized networks are the most common diagram of the modern era.
NOTER_PAGE: (58 0.6685641998734978 . 0.6821138211382114)
Truly distributed networks cannot, in fact, support all-channel communication (a combinatorial utopia),
NOTER_PAGE: (59 0.767235926628716 . 0.4959349593495935)
“The shift is occurring across the spectrum of information technologies as we move from models of the global application of intelligence, with their universality and frictionless dispersal, to one of local applications, where intelligence is site-specific and fluid.”
NOTER_PAGE: (60 0.1283997469955724 . 0.45121951219512196)

today re-centralizing most notably under LLM providers

Distribution propagates through rhythm, not rebirth.
NOTER_PAGE: (61 0.7311827956989247 . 0.3227642276422764)
The highway system is a distributed network because it lacks any centralized hubs and offers direct linkages from city to city through a va- riety of highway combinations.
NOTER_PAGE: (62 0.5433270082226439 . 0.31382113821138213)
Both the Internet and the U.S. interstate highway system were developed in roughly the same time period (from the late 1950s to the late 1970s), for roughly the same reason (to facilitate mobility and communication in case of war). Later, they both matured into highly useful tools for civilians.
NOTER_PAGE: (65 0.11132194813409235 . 0.2869918699186992)

interested in this story wrt highways

What was once protocol’s primary liability in its former military con- text—the autonomous agent who does not listen to the chain of command— is now its primary constituent in the civil context.
NOTER_PAGE: (65 0.21948134092346616 . 0.24146341463414633)
RFCs are a discursive treasure trove for the criti- cal theorist.
NOTER_PAGE: (65 0.4775458570524984 . 0.2951219512195122)
the OSI model, my preferred heuristic, considers every- thing to be code and makes no allowances for special anthropomorphic uses of data. This makes it much easier to think about protocol. The other models privilege human-legible forms, whose reducibility to protocol is flimsy at best.
NOTER_PAGE: (67 0.7912713472485768 . 0.45772357723577234)

Code vs Data

The ultimate goal of the Internet protocols is totality. The virtues of the Internet are robustness, contingency, interoperability, flexibility, heterogeneity, pantheism. Accept everything, no matter what source, sender, or destination.
NOTER_PAGE: (69 0.4579380139152435 . 0.24227642276422764)
As a system this robustness is achieved by following a general principle: “Be conservative in what you do, be liberal in what you accept from others.”
NOTER_PAGE: (70 0.7381404174573055 . 0.2186991869918699)
The next-hop strategy means that no single node on the Internet knows definitively where a destination is, merely that it is “over there.”
NOTER_PAGE: (72 0.4142947501581278 . 0.21788617886178863)
The tree structure allows Mockapetris to divide the total name space data- base into more manageable and decentralized zones through a process of hi- erarchization.
NOTER_PAGE: (75 0.6299810246679317 . 0.21788617886178863)
In DNS, each name server can reply only with authoritative information about the zone immediately below it. This is why the system is hierarchical. But each name server can only know authoritative information about the zone immediately below it. The second, or third, or even fourth segment down the branch has been delegated to other name servers. This is why the system is decentralized.
NOTER_PAGE: (76 0.6755218216318786 . 0.21544715447154472)
protocol is based on a con- tradiction between two opposing machinic technologies: One radically dis- tributes control into autonomous locales (exemplified here by TCP and IP), and the other focuses control into rigidly defined hierarchies (exemplified here by DNS).
NOTER_PAGE: (77 0.17773561037318153 . 0.2975609756097561)
DNS is the most heroic of human projects; it is the actual construction of a single, exhaustive index for all things. It is the encyclopedia of mankind, a map that has a one-to-one relationship with its territory.
NOTER_PAGE: (77 0.5167615433270082 . 0.2186991869918699)
DNS is like many other protocols in that, in its mad dash toward universality, it produces sameness or consistency where originally there existed arbitrariness.
NOTER_PAGE: (77 0.5869702719797597 . 0.3699186991869919)
DNS is not simply a translation language, it is language. It governs meaning by mandating that anything meaningful must register and appear somewhere in its system. This is the nature of protocol.
NOTER_PAGE: (77 0.6717267552182163 . 0.375609756097561)
protocol is against interpretation.
NOTER_PAGE: (79 0.4364326375711575 . 0.35040650406504065)
protocological analysis must focus not on the sciences of meaning (representation/interpretation/ reading), but rather on the sciences of possibility (physics or logic),
NOTER_PAGE: (79 0.6325110689437066 . 0.6308943089430894)
The limits of a protocological system and the limits of possibility within that system are synonymous.
NOTER_PAGE: (79 0.7147375079063883 . 0.24227642276422764)

2 Form

NOTER_PAGE: (81 0.17963314358001264 . 0.47235772357723577)
computer protocols are not just a set of technical specifications, as de- scribed in chapter 1. They are an entire formal apparatus. By formal appara- tus I mean the totality of techniques and conventions that affect protocol at a social level, not simply a technical one.
NOTER_PAGE: (82 0.28526249209361165 . 0.24796747967479674)
protocol from the point of view of the webmaster.
NOTER_PAGE: (82 0.39405439595192915 . 0.35528455284552846)
one may ask: Is protocol formally healthy?
NOTER_PAGE: (82 0.5452245414294751 . 0.24715447154471545)
radio was in the wrong shape, that it had yet to fulfill its full potential for being a two-way com- munications network: Radio is one-sided when it should be two-. It is purely an apparatus for distribution, for mere sharing out.
NOTER_PAGE: (82 0.6325110689437066 . 0.32439024390243903)
why wouldn’t the many-to-many radio net- work already exist, if it was possible for it to exist? Enzensberger’s answer is that it is prohibited for “political reasons,” and that this prohibition arises from the fundamental structure of capital: “The technical distinction be- tween receivers and transmitters reflects the social division of labor into producers and consumers . . . It is based, in the last analysis, on the basic contradiction between the ruling class and the ruled class.”
NOTER_PAGE: (83 0.3485135989879823 . 0.47804878048780486)

I'm not sure I buy this… hearing is in fact much easier than speaking. it makes sense that far more people would be willing/able to receive than to broadcast

“Fear of handling shit is a luxury a sewerman cannot necessarily afford,”
NOTER_PAGE: (84 0.23908918406072108 . 0.44634146341463415)
“fear of being swallowed up by the system is a sign of weakness; it presupposes that capitalism could overcome any contradic- tion—a conviction which can easily be refuted historically and is theoreti- cally untenable.”
NOTER_PAGE: (84 0.32637571157495254 . 0.27723577235772356)
Enzensberger equates decentralization with Marxist liberation. He lauds the new electronic media for being “oriented towards action, not contemplation; towards the present, not [bourgeois] tradition.”9 The very immateriality of the media resists commodification and reification, suggests Enzensberger: “The media produce no objects that can be hoarded and auctioned,”10 and later: “The media also do away with the old category of works of art which can only be considered as separate objects . . . The media do not produce such objects. They create programs. Their production is in the nature of a process.”11 The discovery of processes where once there were ob- jects—this is perhaps the most fundamental moment in a Marxist method.
NOTER_PAGE: (85 0.19734345351043645 . 0.4089430894308943)

Digital Sublime

Both Wiener and Bush have therefore unwittingly contributed greatly to the tradition of Marxist media theory inaugurated by Brecht.
NOTER_PAGE: (87 0.13409234661606578 . 0.24308943089430896)
if critical theory teaches anything, it is to be wary of the obvious.
NOTER_PAGE: (88 0.39215686274509803 . 0.25447154471544714)
the Web is structured around rigid protocols that govern the transfer and representation of texts and images—so the Web isn’t “an acentered, nonhierarchical, nonsignifying system” as is Deleuze and Guattari’s rhizome.
NOTER_PAGE: (88 0.4579380139152435 . 0.6536585365853659)
The Web is described as a free, structureless network. Yet the rhizome is clearly not the absence of structure. It is the privileging of a certain kind of structure, the horizontal network, over another structure, the tree.
NOTER_PAGE: (88 0.6306135357368754 . 0.216260162601626)
protocol is in fact both poles of this machinic movement, territorializing structure and anarchical distribu- tion.
NOTER_PAGE: (91 0.1555977229601518 . 0.23821138211382115)
Indeed, the Internet works too well. If the Internet were truly rhizomatic, it would resist identification. It would resist the deep, meaningful uses that people make of it everyday.
NOTER_PAGE: (91 0.2827324478178368 . 0.23577235772357724)
Continuity, then, is defined as the set of techniques practiced by web- masters that, taken as a totality, create this pleasurable, fluid experience for the user.
NOTER_PAGE: (91 0.6299810246679317 . 0.23658536585365852)
Conceal the source.
NOTER_PAGE: (91 0.8001265022137888 . 0.23821138211382115)
NOTER_PAGE: (92 0.715370018975332 . 0.21788617886178863)
NOTER_PAGE: (93 0.13345983554712207 . 0.24065040650406505)
There can be no dead ends on the Inter- net. Each page must go somewhere else, even if that somewhere else is “back.” Each page must be rich with offerings,
NOTER_PAGE: (93 0.15243516761543327 . 0.4658536585365854)
Green means go.
NOTER_PAGE: (93 0.2612270714737508 . 0.24065040650406505)
“Good interfaces do away with text, the way good psychotherapists get rid of repressed memories and emotional blocks.”
NOTER_PAGE: (93 0.4117647058823529 . 0.26422764227642276)
True identity.
NOTER_PAGE: (93 0.4737507906388362 . 0.23821138211382115)
Remove barriers.
NOTER_PAGE: (93 0.603415559772296 . 0.24146341463414633)
Continuity between media types.
NOTER_PAGE: (94 0.08349146110056926 . 0.21788617886178863)
Prohibition against low resolution.
NOTER_PAGE: (94 0.258697027197976 . 0.216260162601626)
Pixels cannot be visible. Fonts must be smooth. Full color palettes are better than limited ones. High-resolution, representational images are better than cheap, simple ones. Low resolution shatters the illusion of continuity because it means that the source, the code, is not being properly concealed.
NOTER_PAGE: (94 0.3289057558507274 . 0.23089430894308943)

cf Ditherpunk

Highest speed possible.
NOTER_PAGE: (94 0.5641998734977862 . 0.216260162601626)
Prohibition on crashes.
NOTER_PAGE: (94 0.6483238456672992 . 0.2146341463414634)
During a crash, the computer changes from being passive to being active.
NOTER_PAGE: (94 0.7141049968374447 . 0.4658536585365854)
Prohibition on dead media.
NOTER_PAGE: (95 0.08791903858317521 . 0.24634146341463414)
All technology is new technology. Everything else must be eliminated.
NOTER_PAGE: (95 0.08855154965211891 . 0.37317073170731707)
Eliminate mediation.
NOTER_PAGE: (95 0.21758380771663505 . 0.24227642276422764)
make the network a natural-feeling extension of the user’s own body. Thus, any mediation between the user and the network must be eliminated. Interfaces must be as transparent as possible.
NOTER_PAGE: (95 0.24351676154332702 . 0.3943089430894309)

Immediacy

All traces of the medium should be hidden,
NOTER_PAGE: (95 0.3308032890575585 . 0.24227642276422764)
Feedback loops.
NOTER_PAGE: (95 0.38962681846932323 . 0.24227642276422764)
downstream bandwidth (the size of the pipe entering your house) can be as much as ten times the size of the upstream bandwidth (the size of the pipe leaving your house). Thus, it becomes easier to re- ceive information than it does to send it, creating a scenario much more like television than the many-to-many structure promised by the Internet.
NOTER_PAGE: (95 0.771663504111322 . 0.5439024390243903)
The conflict between the total and the specific is palpable on the Internet. Each movement on the Net is recorded in myriad different locations (log files, server statistics, email boxes); however, the real identity of those movements is irrelevant.
NOTER_PAGE: (96 0.09108159392789374 . 0.4121951219512195)
Anonymous but descriptive.
NOTER_PAGE: (96 0.09171410499683745 . 0.2186991869918699)
The clustering of de- scriptive information around a specific user becomes sufficient to explain the identity of that user.
NOTER_PAGE: (96 0.21631878557874762 . 0.33170731707317075)
biopower is the power to interpret material objects as information,
NOTER_PAGE: (96 0.32131562302340294 . 0.2186991869918699)
the most interesting forms of cultural production appear when some of these principles are inverted,
NOTER_PAGE: (96 0.4560404807084124 . 0.3008130081300813)
Record
NOTER_PAGE: (99 0.49335863377609107 . 0.4772357723577236)
A record is any type of nonrandom information, not simply something that records language or data.
NOTER_PAGE: (99 0.5445920303605313 . 0.567479674796748)
Certain records can experience a conjunction of utility and information. Thus, a knife not only contains the information of cutting in its form, but is also used to cut. A photograph of a knife, on the other hand, contains the information of cutting, but cannot be used to cut.
NOTER_PAGE: (100 0.17204301075268819 . 0.1951219512195122)
With the alphabet comes a perfect synergy of form and information.
NOTER_PAGE: (100 0.2593295382669197 . 0.22276422764227644)
“the ability to record sense data technologically,” using such instruments as the phonograph and the typwriter, “shifted the entire discourse network circa 1900. For the first time in history, writing ceased to be synonymous with the serial storage of data. The technological recording of the real entered into competition with the symbolic registration of the Symbolic.”
NOTER_PAGE: (100 0.38962681846932323 . 0.41544715447154473)
The record is, in the most abstract sense, any nonchaotic something.
NOTER_PAGE: (100 0.562302340290955 . 0.608130081300813)
Object
NOTER_PAGE: (100 0.6306135357368754 . 0.46260162601626015)
A record is one particular form-of-appearance of an object. The object is the digital economy’s basic unit. It is any unit of content.
NOTER_PAGE: (100 0.6489563567362429 . 0.1943089430894309)
Digital objects are pure positivities. They are the heterogenous elements that exist in what Deleuze and Guattari have called “machinic” processes.
NOTER_PAGE: (101 0.19860847564832385 . 0.2186991869918699)
Objects exist only upon use. They are assembled from scratch each time
NOTER_PAGE: (101 0.3485135989879823 . 0.23739837398373984)
Protocol
NOTER_PAGE: (101 0.6647691334598356 . 0.4788617886178862)
from a formal perspective, protocol is a type of object.
NOTER_PAGE: (101 0.7115749525616698 . 0.25203252032520324)
Browser
NOTER_PAGE: (102 0.5850727387729285 . 0.4585365853658537)
In digital space this “hiding machine,” this making-no-difference machine, is epitomized in the Internet browser.
NOTER_PAGE: (102 0.6748893105629349 . 0.348780487804878)
the goal of protocol is totality, to accept everything. This principle is also exhibited in the browser.
NOTER_PAGE: (103 0.3074003795066414 . 0.4113821138211382)

Resilience vs Efficiency: More generality means less ability to meaningfully describe particular things

cf Should this be a map or 500 maps?

Its virtue is not diversity but university.
NOTER_PAGE: (103 0.49905123339658447 . 0.25853658536585367)
HTML
NOTER_PAGE: (103 0.5401644528779254 . 0.4943089430894309)
Fonts
NOTER_PAGE: (104 0.49968374446552816 . 0.46422764227642277)

3 Power

NOTER_PAGE: (107 0.1752055660974067 . 0.4658536585365854)
consider protocol in its political sense, as a pseudo- ideological force that has influence over real human lives.
NOTER_PAGE: (108 0.3311367380560132 . 0.3654661016949153)
Deleuze de- fines control societies as being primarily “digital.” They operate through “ultrarapid forms of apparently free-floating control.”
NOTER_PAGE: (108 0.3673805601317957 . 0.6091101694915254)
Foucault has argued that the further the progression into the post- modern (or digital) age, the more politics ceases to interest itself in the soul or the body. Instead, politics desires “life itself.” Foucault calls this type of politics “bio-politics.”
NOTER_PAGE: (108 0.4357495881383855 . 0.2542372881355932)
protocol is an affective, aesthetic force that has control over “life it- self.” This is the key to thinking of protocol as power.
NOTER_PAGE: (108 0.5675453047775947 . 0.2658898305084746)
“Discourse is not the majestically unfolding manifestation of a think- ing, knowing, speaking subject, but, on the contrary, a totality, in which the dispersion of the subject and his discontinuity with himself may be deter- mined.”6 In fact, Foucault writes that his interest lies in the “anonymous and general subject of history,”7 not the social subject of history.
NOTER_PAGE: (110 0.6054365733113674 . 0.2542372881355932)
Biopolitics, then, connects to a certain statistical knowledge about populations. Foucault notes that it is dependent on the basic tenets of liberalism— namely, that people and their societies possess various statistical properties that can be measured. Biopolitics is a species-level knowledge. It is the type of knowledge that, say, UNICEF employs when it claims that the infant mor- tality rate in the United States is 7 per every 1,000 births.16 This is the mo- ment of biopolitics.
NOTER_PAGE: (112 0.2895696571845368 . 0.30393996247654786)

Legibility

biopolitics and biopower are Foucault’s terms for protocol as it relates to life forms. They are Foucault’s terms for the statistical coding, the making-statistical, of large living masses, such that any singular life-form within that mass may be compared in its organic nature to the totality. This is exactly how protocol functions, as a management style for distributed masses of autonomous agents.
NOTER_PAGE: (114 0.2676878191101386 . 0.3123827392120075)
Second Nature
NOTER_PAGE: (114 0.40700218818380746 . 0.4268292682926829)
For my purposes, “second nature” refers to the way in which material objects in the modern era have a tendency to become aesthetic objects.
NOTER_PAGE: (115 0.5805981035740335 . 0.2073170731707317)
Does Capital have an aesthetic essence accessible to the medium of film? How would it be possible to make such a film, and who would watch it?
NOTER_PAGE: (116 0.39095550692924874 . 0.551594746716698)
the discourse of Capital itself was always already in aesthetic form, bol- stered by never-ending naturalistic and vitalistic imagery (natural objects, biological processes, monsters, transmutations, and mystifications). This vitalism in Marx heralds the dawning age of protocol, I argue, by transforming life itself into an aesthetic object.
NOTER_PAGE: (117 0.5229759299781181 . 0.2626641651031895)
The contradiction at the heart of protocol is that it has to standardize in order to liberate. It has to be fascistic and unilateral in order to be utopian. It contains, as Jameson wrote of mass culture before it, both the ability to imagine an unalienated social life and a window into the dystopian realities of that life.
NOTER_PAGE: (122 0.09117432530999271 . 0.075046904315197)
Marx is obsessed with animals, plants and minerals of all kinds.
NOTER_PAGE: (123 0.45805981035740334 . 0.28330206378986866)
Specters, monsters, and vampires riddle his text. As Derrida has shown in Specters of Marx, the concept of haunting appears several times in Capital
NOTER_PAGE: (124 0.1539022611232677 . 0.2270168855534709)
the idea that inversion, or upside-downness, is linked directly to illusion, mystification, and misrecognition. Because Hegel (and idealists like him) was standing on his head, he couldn’t see the world as it was.
NOTER_PAGE: (126 0.13274981765134938 . 0.23921200750469043)
The use of vitalistic imagery, no matter how margin- alized within the text, quite literally aestheticizes capitalism. It turns capital- ism into media.
NOTER_PAGE: (129 0.3063457330415755 . 0.3330206378986867)
Emergence of Artificial Life Forms (Matter Becoming Life)
NOTER_PAGE: (129 0.450036469730124 . 0.25328330206378985)
The vital quality of pure matter has long haunted the modern era.
NOTER_PAGE: (129 0.5652808169219548 . 0.21669793621013134)
the emergence of autonomous vital forms appears as a distinct trend in the last two hundred years of contem- plative thought.
NOTER_PAGE: (129 0.6090444930707513 . 0.3142589118198874)
this book has very little to say about questions epistemological. Protocol is not a theory of mind.
NOTER_PAGE: (130 0.28519328956965717 . 0.24859287054409004)
protocological life is considered here as “the forces—aesthetic, technical, po- litical, sexual—with which things combine in order to form novel aggre- gates of pattern and behavior.”
NOTER_PAGE: (130 0.4405543398978848 . 0.18574108818011256)
The anti-entropic position states, simply, that life is precisely that force that resists entropy.
NOTER_PAGE: (130 0.5886214442013129 . 0.3921200750469043)

Life as Anti-Entropy

Genes and memes (themselves also genes, but in the realm of culture) are two ways of moving against the entropic force,
NOTER_PAGE: (131 0.26258205689277897 . 0.4024390243902439)
living beings are characterized as anti-entropic, vitality being the op- posite of entropy,
NOTER_PAGE: (131 0.5667396061269147 . 0.2654784240150094)
machines also resist entropy.
NOTER_PAGE: (132 0.5674690007293947 . 0.23170731707317074)
It’s not simply that machines are like people, or that people are like machines, but that both entities are like something else, what Wiener calls “communicative organisms,” or what today might be called “information organisms.” These are the same organisms that live inside protocol.
NOTER_PAGE: (133 0.08533916849015317 . 0.21200750469043153)
upon formulating his theory of cybernetics, his first instinct was to warn organized labor,
NOTER_PAGE: (134 0.22173595915390226 . 0.6210131332082551)
The self-determinism of material systems is therefore the essence of cybernetics, and it is a positive essence,
NOTER_PAGE: (134 0.41210795040116704 . 0.4906191369606004)
Artificial Life
NOTER_PAGE: (134 0.4989059080962801 . 0.42964352720450283)
this shift—from procedural to object-oriented—follows the shift from the modern to the postmodern eras. In what she calls “the modernist computational aesthetic” the computer was viewed as a “giant calculator,” and program- ming it “was a cut-and-dried technical activity whose rules were crystal clear.”90 However, in today’s multifaceted, distributed environments, “com- putational models of the mind often embrace a postmodern aesthetic of com- plexity and decentering. Mainstream computer researchers no longer aspire to program intelligence into computers but expect intelligence to emerge from the interactions of small subprograms.”
NOTER_PAGE: (135 0.3698517298187809 . 0.4173728813559322)
The ecologically minded Ray has gone so far as to advocate the institution on the Net of a wildlife preserve for digital organisms.
NOTER_PAGE: (136 0.5601317957166392 . 0.21610169491525424)
Life as Medium (Life Becoming Matter)
NOTER_PAGE: (137 0.2504118616144975 . 0.3326271186440678)
life forms, both artificial and organic, exist in any space where material forces are actively aestheticized,
NOTER_PAGE: (137 0.30642504118616143 . 0.448093220338983)
The “information age”—a term irreverently tossed to and fro by many critics of contemporary life—is not simply that moment when computers come to dominate, but is instead that moment in history when matter itself is understood in terms of information or code. At this historical moment, protocol becomes a controlling force in social life.
NOTER_PAGE: (138 0.15197779319916724 . 0.1944692239072257)

cf Cybernetics

from a “kingdom of sense” in the year 1800 to a “kingdom of pat- tern” in 1900.
NOTER_PAGE: (138 0.2817487855655795 . 0.256021409455843)
the transformation of matter into code is not only a passage from the qualitative to the quantita- tive but also a passage from the non-aesthetic to the aesthetic—the passage from non-media to media.
NOTER_PAGE: (138 0.30603747397640524 . 0.2952720785013381)
Life was no longer a “pair of ragged claws / Scuttling across the floors of silent seas” (Eliot), it was a code borne from pure mathematics, an object of aesthetic beauty, a double helix! This historical moment—when life is de- fined no longer as essence, but as code—is the moment when life becomes a medium.
NOTER_PAGE: (138 0.5412907702984039 . 0.21855486173059768)
biometrics does some- thing much more important. It considers living human bodies not in their immaterial essences, or souls, or what have you, but in terms of quantifiable, recordable, enumerable, and encodable characteristics. It considers life as an aesthetic object.
NOTER_PAGE: (140 0.5614156835530881 . 0.288135593220339)
Biometrics is important, therefore, not because it infringes on privacy, but because it has redefined what counts as proof of the true identity of ma- terial life forms.
NOTER_PAGE: (140 0.6981263011797363 . 0.2167707404103479)
Collaborative filtering, also called suggestive filtering and included in the growing field of “intelligent agents,” allows one to predict new characteristics (particularly one’s so-called desires) based on survey data.
NOTER_PAGE: (140 0.8008327550312283 . 0.4674397859054416)
because collaborative filtering works through a process of interpellation (selecting data interior rather than exterior to a given set), no improvement in the overall data pool is possible. Thus, collaborative filtering ensures structural homogeneity rather than het- erogeneity. While any given user may experience a broadening of his or her personal tastes, the pool at large becomes less and less internally diverse.
NOTER_PAGE: (141 0.6585704371963914 . 0.5771632471008029)
Personal identity is formed only on certain hegemonic patterns. In this massive algorithmic collaboration, the user is always suggested to be like someone else, who, in order for the system to work, is already like the user to begin with!
NOTER_PAGE: (141 0.8084663428174879 . 0.5343443354148082)

II. Failures of Protocol

NOTER_PAGE: (144 0.11242192921582234 . 0.47903657448706516)

4 Institutionalization

NOTER_PAGE: (145 0.12144344205412907 . 0.5084745762711864)
Spam was born. The perpetrators, Arizona lawyers Laurence Canter and Martha Seigel, had effectively transformed a democratic, protocological system for exchange of ideas into a unilateral, homogenous tool for commercial solicitation.
NOTER_PAGE: (146 0.1970853573907009 . 0.22123104371097235)
protocol requires universal adoption. As a protocological product, Usenet is vulnerable because of this. Even a single party can exploit a weakness and, like a virus, propagate through the system with logical ferocity.
NOTER_PAGE: (147 0.15336571825121442 . 0.3818019625334523)
think of bureaucratic interests as visiting protocol from without due to the im- position of a completely prior and foreign control diagram, while propri- etary interests arrive from within as a coopting of protocol’s own explosive architecture. Bureaucracy is protocol atrophied, while propriety is protocol reified.
NOTER_PAGE: (148 0.11242192921582234 . 0.19000892060660127)
bureaucratic and institutional forces (as well as proprietary interests) are together the inverse of protocol’s control logic.
NOTER_PAGE: (148 0.28452463566967384 . 0.38626226583407675)
Organizations like ICANN are the enemy of protocol because they limit the open, free development of technology.
NOTER_PAGE: (148 0.5010409437890354 . 0.3621766280107047)
protocol is a type of controlling logic that operates outside institutional, governmental, and corporate power,
NOTER_PAGE: (149 0.28383067314365024 . 0.3175735950044603)
Of the twenty-five or so orig- inal protocol pioneers, three of them—Vint Cerf, Jon Postel, and Steve Crocker—all came from a single high school in Los Angeles’s San Fernando Valley.
NOTER_PAGE: (149 0.6280360860513532 . 0.25512934879571814)
the standards makers at the heart of this technology are a small entrenched group of techno-elite peers. The reasons for this are largely practical. “Most users are not interested in the details of Internet protocols,” Cerf observes. “They just want the system to work.”
NOTER_PAGE: (150 0.17626648160999306 . 0.3621766280107047)

Consumers Don't Care

C++ has been tremendously successful as a language. “The spread was world-wide from the beginning,” recalled Stroustrup. “[I]t fit into more environments with less trouble than just about anything else.” Just like a protocol.
NOTER_PAGE: (151 0.5440666204024982 . 0.23996431757359502)
JVC’s economic strategy that included aggressive licensing of the VHS format to competitors. JVC’s behavior is pseudo-protocological.
NOTER_PAGE: (152 0.3913948646773074 . 0.4504906333630687)
Sony tried to fortify its market position by keeping Betamax to itself.
NOTER_PAGE: (152 0.5003469812630118 . 0.3916146297948261)
protocological behavior (giving out your technology broadly even if it means giving it to your competitors) often wins out over proprietary behavior.
NOTER_PAGE: (153 0.33032616238723106 . 0.6975914362176628)
Protocol does not interface with content, with se- mantic value. It is, as I have said, against interpretation. But with Bern- ers-Lee comes a new strain of protocol: protocol that cares about meaning. This is what he means by a Semantic Web.
NOTER_PAGE: (166 0.4580152671755725 . 0.3960749330954505)
debate as to whether descriptive protocols actually add intelligence to information, or whether they are simply subjective descriptions (originally written by a human) that computers mimic but understand little about.
NOTER_PAGE: (166 0.6516308119361555 . 0.24085637823371991)
local differences are elided in favor of uni- versal consistencies.
NOTER_PAGE: (168 0.131852879944483 . 0.33898305084745767)
Thus it is an oversight for theorists like Lawrence Lessig (despite his strengths) to suggest that the origin of Internet communication was one of total freedom and lack of control.46 Instead, it is clear to me that the exact opposite of freedom—that is, control—has been the outcome of the last forty years of developments in networked communications. The founding prin- ciple of the Net is control, not freedom. Control has existed from the beginning.
NOTER_PAGE: (168 0.3275503122831367 . 0.2176628010704728)
control based on openness, inclusion, universalism, and flexibility. It is control borne from high degrees of technical organization (protocol), not this or that limitation on individual freedom or decision making (fascism).
NOTER_PAGE: (169 0.17557251908396945 . 0.27832292595896524)
it is with complete sincerity that Berners-Lee writes: “I had (and still have) a dream that the web could be less of a television channel and more of an interactive sea of shared knowledge. I imagine it immersing us as a warm, friendly environment made of the things we and our friends have seen, heard, believe or have figured out.”47 The irony is, of course, that in or- der to achieve this social utopia computer scientists like Berners-Lee had to develop the most highly controlled and extensive mass media yet known.
NOTER_PAGE: (169 0.24219292158223454 . 0.2863514719000892)
The generative contradiction that lies at the very heart of protocol is that in order to be politically progressive, protocol must be partially reactionary.
NOTER_PAGE: (169 0.5419847328244275 . 0.6851025869759144)
in order for protocol to enable radically distributed communications between autonomous entities, it must employ a strategy of universalization, and of homogeneity. It must be anti-diversity.
NOTER_PAGE: (169 0.6099930603747398 . 0.41570026761819806)

Scale requires/creates homogeneity

III Protocol Futures

NOTER_PAGE: (172 0.11450381679389313 . 0.471900089206066)

5 Hacking

NOTER_PAGE: (173 0.1179736294240111 . 0.5066904549509367)
Not to enter into the protocological community carries such a high price that to reject protocol would be foolish.
NOTER_PAGE: (174 0.24219292158223454 . 0.3175735950044603)

Network Effects

especially difficult to speak about protocol in a nega- tive sense, for its very success helps preclude outsider positions. Only the participants can connect, and therefore, by definition, there can be no resist- ance to protocol (at least not in any direct or connected sense).
NOTER_PAGE: (174 0.4587092297015961 . 0.36752899197145406)
members of the left continue to act as if they still live in the age of early capital.”
NOTER_PAGE: (177 0.4802220680083275 . 0.43086529884032115)
The police crackdown arrived full force in 1990 after the January 15, 1990, crash of AT&T’s long- distance system.
NOTER_PAGE: (183 0.2623178348369188 . 0.3336306868867083)
Now when people say hacker, they mean terrorist.
NOTER_PAGE: (184 0.10548230395558639 . 0.33987511150758254)
the current debate on hackers is help- lessly throttled by the discourse on contemporary liberalism: should one re- spect data as private property, or should one cultivate individual freedom and leave computer users well enough alone?
NOTER_PAGE: (184 0.13462873004857737 . 0.4870651204281891)
hacking is an index of protocological transformations taking place in the broader world of techno-culture.
NOTER_PAGE: (184 0.5655794587092297 . 0.4130240856378234)
Tiger Teams
NOTER_PAGE: (185 0.3233865371269951 . 0.46208742194469227)
“A true hacker is not a group person,”31 wrote Stewart Brand in 1972. Or, as he would write fifteen years later: “Workers of the world, fan out”32—advice that inverts the message of resistance-through-unity found in Marx and En- gel’s Communist Manifesto.
NOTER_PAGE: (187 0.476058292852186 . 0.23996431757359502)
“[t]he use of power through number—from labor unions to activist organizations—is bankrupt, because such a strategy requires . . . the existence of a centralized present enemy.”
NOTER_PAGE: (187 0.5641915336571824 . 0.33541480820695807)
The nomadic model “seeks to undermine the symbolic order with more ephemeral, process-oriented methods,”
NOTER_PAGE: (188 0.10687022900763359 . 0.19090098126672614)
Code
NOTER_PAGE: (191 0.24288688410825815 . 0.495985727029438)
Code thus purports to be multidimensional. Code draws a line between what is material and what is active, in essence saying that writing (hardware) can- not do anything, but must be transformed into code (software) to be effective.
NOTER_PAGE: (192 0.15614156835530882 . 0.2167707404103479)
not in the fact that code is sub- linguistic, but rather in the fact that it is hyperlinguistic. Code is a language, but a very special kind of language. Code is the only language that is executable.
NOTER_PAGE: (192 0.41360166551006244 . 0.5504014272970562)

cf Code vs Data: this is the characteristic that distinguishes code from mere data

a machine for con- verting meaning into action.
NOTER_PAGE: (193 0.08882720333102012 . 0.43264942016057095)
Code has a semantic meaning, but it also has an enactment of meaning.
NOTER_PAGE: (193 0.13254684247050658 . 0.23996431757359502)
“There Is No Software”1
NOTER_PAGE: (193 0.5218598195697433 . 0.2167707404103479)
Uncompiled source code is logically equivalent to that same code compiled into assembly language and/or linked into machine code.
NOTER_PAGE: (194 0.23941707147814018 . 0.26583407671721676)
it is wrong to make claims about the relative pu- rity of machine code over source code, for each is equally mediated by the environment of the digital computer.
NOTER_PAGE: (194 0.3504510756419153 . 0.40053523639607497)
Possibility
NOTER_PAGE: (194 0.527411519777932 . 0.44157002676181983)
Protocol is synonymous with possibility. From the perspective of protocol, if you can do it, it can’t be bad,
NOTER_PAGE: (195 0.21790423317140872 . 0.24353256021409456)
Hackers don’t care about rules, feelings, or opinions. They care about what is true and what is possible. And in the logical world of computers, if it is possible then it is real. Can you break into a computer, not should you or is it right to.
NOTER_PAGE: (195 0.28452463566967384 . 0.24620874219446923)
Now, who is to blame? ME for getting it or YOU for being such an idiot?!”
NOTER_PAGE: (195 0.5232477446217904 . 0.5976806422836753)
if technology is proprietary it ceases to be protocological.
NOTER_PAGE: (199 0.26717557251908397 . 0.4451382694023194)
with protocol comes the exciting new ability to leverage possibility and action through code.
NOTER_PAGE: (199 0.6315058986814712 . 0.6173059768064229)

6 Tactical Media

NOTER_PAGE: (201 0.12352532963219985 . 0.5075825156110616)
computer viruses are incredibly effective at identifying anti- protocological technologies. They infect proprietary systems and propagate through the homogeneity contained within them. Show me a computer virus and I’ll show you proprietary software with a market monopoly.
NOTER_PAGE: (202 0.6544066620402498 . 0.3175735950044603)
Computer Viruses
NOTER_PAGE: (203 0.34351145038167935 . 0.4362176628010705)
Morris’s worm was characterized as a mistake, not an overt criminal act. Likewise his punishment was relatively lenient
NOTER_PAGE: (211 0.1554476058292852 . 0.39072256913470116)
While Melissa was gen- erally admitted to have been more of a nuisance than a real threat, Smith was treated as a hard criminal rather than a blundering geek. He pleaded guilty to ten years and a $150,000 fine.
NOTER_PAGE: (211 0.32616238723108953 . 0.4469223907225692)
self-replicating programs flipped 180 degrees. The virus is now indicative of criminal wrongdoing.
NOTER_PAGE: (211 0.41360166551006244 . 0.39964317573595004)
Cyberfeminism
NOTER_PAGE: (211 0.6481609993060374 . 0.4487065120428189)
women have traditionally comprised the laboring core of networks of all kinds, particularly the telecommunications networks.
NOTER_PAGE: (216 0.20333102012491325 . 0.21409455842997324)
a lot of ‘orthodox’ feminist theory was still very technophobic.”
NOTER_PAGE: (216 0.3934767522553782 . 0.608385370205174)
Conflicting Diagrams
NOTER_PAGE: (223 0.3247744621790423 . 0.4210526315789474)
Terrorism is a sign that we are in a transitional moment in history. (Could there ever be anything else?) It signals that historical actors are not in a re- lationship of equilibrium, but are instead grossly mismatched.
NOTER_PAGE: (224 0.5857043719639139 . 0.18911685994647637)
“City by city, country by country, the bomb helped drive dispersion,”2 Galison continues, highlighting the power of the A-bomb to drive the push toward distribution in urban planning.
NOTER_PAGE: (227 0.32616238723108953 . 0.24085637823371991)
Baran’s advice to the American military was to become network-like. And once it did the nuclear threat was no longer a catastrophic threat to communications and mobility
NOTER_PAGE: (231 0.7869535045107564 . 0.46297948260481714)
“Bureaucracy lies at the root of our military weakness,” wrote advocates of military reform in the mid-eighties. “The bureaucratic model is inher- ently contradictory to the nature of war, and no military that is a bureaucracy can produce military excellence.”
NOTER_PAGE: (232 0.41221374045801523 . 0.21409455842997324)
The dilemma, then, is that while hierarchy and centralization are almost certainly politically tainted due to their historical association with fascism and other abuses, networks are both bad and good.
NOTER_PAGE: (233 0.13254684247050658 . 0.24174843889384479)
mobility and disguise.
NOTER_PAGE: (233 0.24358084663428173 . 0.21409455842997324)

7 Internet Art

NOTER_PAGE: (235 0.11589174184594031 . 0.5084745762711864)
a ‘new art,’ as people say a little loosely, may be recognized by the fact that it is not recognized.”4 Thus, a truly subversive art form would, in fact, be invisible. The moment video is seen as art, it is divorced from its “newness.”
NOTER_PAGE: (237 0.43650242886884105 . 0.215878679750223)
Let me suggest that the “new art” that Derrida calls for is not in fact video, but the new media art that has appeared over the last few decades with the arrival of digital computers.
NOTER_PAGE: (237 0.6086051353226926 . 0.24085637823371991)
the very limitations of new media technology, what she describes as the “delays in transmission-time, busy signals from service providers, crashing web browsers,” are what bring about its specificity as an artistic medium.
NOTER_PAGE: (240 0.13532269257460097 . 0.23015165031222123)
Many on the Left have been disappointed with the political potential of hacking because of this libertarian, gee-whiz desire for freedom of information. Tactical media, on the other hand, is almost synonymous with the Left because it is driven almost exclusively by progressive politics.
NOTER_PAGE: (241 0.13324080499653018 . 0.27564674397859057)
Floodnet is primarily a vi- sualization tool, but for abstract networks rather than real world situations. It makes the Internet and the people in it more visible—and their political cause with them—by creating what EDT founder Ricardo Dominguez calls “disturbances” within protocol.
NOTER_PAGE: (241 0.3941707147814018 . 0.3978590544157003)
Freedom of all information was more important to the HEART hackers than the political disturbances.
NOTER_PAGE: (241 0.6509368494101319 . 0.520963425512935)
If the network itself is political from the start, then any artistic practice within that network must engage politics or feign ignorance.
NOTER_PAGE: (241 0.8008327550312283 . 0.5263157894736842)
“the end of an era. The first formative period of net cul- ture seems to be over.”23 He is referring to a series of years from 1995 to 1999 when the genre of net.art was first developed. In this period, due to prominent technical constraints such as bandwidth and computer speed, many artists were forced to turn toward conceptual uses of the Internet that were not hindered by these technical constraints, or, in fact, made these constrains the subject of the work. All art media involve constraints, and through these constraints creativity is born. Net.art is low bandwidth through and through.
NOTER_PAGE: (246 0.41360166551006244 . 0.3452274754683319)

Constraints Encourage Creativity

As computers and network bandwidth improved during the late 1990s, the primary physical reality that governed the aesthetic space of net.art began to fall away.
NOTER_PAGE: (247 0.11242192921582234 . 0.215878679750223)
Internet Art as Art of the Network
NOTER_PAGE: (247 0.24011103400416375 . 0.3621766280107047)
Internet Art as Art of Software
NOTER_PAGE: (253 0.7335183900069396 . 0.3791257805530776)
Toywar was an online gaming platform playable simulta- neously by multiple users around the world. The goal of the game was to negatively affect specific capital valuations on the NASDAQ stock market.
NOTER_PAGE: (254 0.19777931991672448 . 0.31400535236396077)
artist groups like Etoy and RTMark have begun to think and act like corporations, even going so far as to create mutual funds and issue stocks as art objects.
NOTER_PAGE: (255 0.11450381679389313 . 0.5860838537020517)

cf NFTs

People will have their own character and will have an in- come—if they work hard they get etoy.SHARE options.
NOTER_PAGE: (259 0.1956974323386537 . 0.3639607493309545)
The goal of Toywar was to wage “art war” on eToys Inc., trying to drive its stock price to as low a value as possible—and in the first two weeks of Toywar, eToys’ stock price on the NASDAQ plummeted by over 50 percent and continued to nosedive.
NOTER_PAGE: (259 0.30326162387231087 . 0.264049955396967)
Auctionism
NOTER_PAGE: (260 0.15822345593337958 . 0.43978590544157004)

Conclusion

NOTER_PAGE: (267 0.18181818181818182 . 0.42283675289919714)

With bumps, the driver wants to drive more slowly. With bumps, it becomes a virtue to drive slowly. But with police presence, driving slowly can never be more than coerced behavior. Thus, the signage appeals to the mind, while protocol always appeals to the body.

NOTER_PAGE: (268 0.5010409437890354 . 0.2542372881355932)

Regulative vs Constitutive

Protocol is not a superego (like the police); instead it always operates at the level of desire, at the level of “what we want.”

NOTER_PAGE: (268 0.564885496183206 . 0.35236396074933096)

the ruling elite is tired of trees too.

NOTER_PAGE: (269 0.5218598195697433 . 0.4611953612845674)

How is a technology able to establish real-world control when it lacks certain fundamental tools such as hierarchy, centralization, and violence? Why does technology seem, as Kevin Kelly likes to put it, so “out of control” yet still function so flawlessly? There must be some machine that, at the end of the day, sorts it all out. Protocol is that machine, that massive control apparatus that guides dis- tributed networks, creates cultural objects, and engenders life forms.

NOTER_PAGE: (270 0.17834836918806385 . 0.5941123996431757)

restating a few summarizing moments

NOTER_PAGE: (270 0.4809160305343511 . 0.3345227475468332)

It is very likely if not inevitable that the core Internet protocols, to- day largely safe from commercial and state power, will be replaced by some type of proprietary system. (The fact that Microsoft has not yet replaced TCP/IP with a commercial product of its own is one of the miracles of computer history. Chances are this will happen very soon.)

NOTER_PAGE: (271 0.5447605829285218 . 0.2872435325602141)

has this happened? TCP/IP hasn't been “replaced”, but…

pro- tocol is like the trace of footprints left in snow, or a mountain trail whose route becomes fixed only after years of constant wear. One is always free to pick a different route. But protocol makes one instantly aware of the best route—and why wouldn’t one want to follow it?

NOTER_PAGE: (271 0.7834836918806384 . 0.592328278322926)

a better synonym for protocol might be “the practical,” or even “the sensible.”

NOTER_PAGE: (272 0.08952116585704371 . 0.2578055307760928)

“sensible” as in “partage du”?

it is dangerous because it acts to make concrete our fun- damentally contingent and immaterial desires (a process called reification), and in this sense protocol takes on authoritarian undertones.

NOTER_PAGE: (272 0.3504510756419153 . 0.35682426404995543)

protocol is also dangerous in the way that a weapon is dangerous. It is potentially an effective tool that can be used to roll over one’s political op- ponents.

NOTER_PAGE: (272 0.5433726578764746 . 0.19714540588760038)

Perhaps an analogy from Berners-Lee would help clarify this. The Web, he writes, is like a market economy: In a market economy, anybody can trade with anybody, and they don’t have to go to a market square to do it. What they do need, however, are a few practices everyone has to agree to, such as the currency used for trade, and the rules of fair trading.

NOTER_PAGE: (273 0.10964607911172797 . 0.431757359500446)

Do we want the Web to function like a mar- ket economy?

NOTER_PAGE: (273 0.5850104094378903 . 0.3033006244424621)

Index

NOTER_PAGE: (276 0.12283136710617626 . 0.4531668153434434)

Footnotes:

1

Friedrich A. Kittler, “There Is No Software,” in Electronic Culture: Technology and Visual Representation, by Timothy Druckrey (New York: Aperture, 1996).

2

Peter Galison, “War against the Center,” Grey Room 4 (June 2001): 5–33, https://doi.org/10.1162/grey.2001.1.04.5.