![]() ![]() In doing so, it seeks to build bridges between approaches grounded in STS-infrastructure studies in particular-and the emerging studies on privacy-by-design approaches, in which computer science and legal sciences are featured most prominently with respect to the social sciences. 7 Indeed, the history of internet innovation suggests that the shaping of technical architectures populating the network of networks is, in the words of philosopher Bruno Latour, ‘politics by other means.’ 8 This chapter situates itself into, and contributes to, the interdisciplinary body of work that seeks to investigate how, in networked services and media, architecture is politics, protocols are law, code shapes rights. 8 Bruno Latour, The Pasteurization of France, A. Sheridan and J. Law (transl.), Cambridge (MA), Harva (.)Ĥ“Study an information system and neglect its standards, wires, and settings, and you miss equally essential aspects of aesthetics, justice, and change,” once wrote science and technology studies (STS) scholar Susan Leigh Star.Star, “The ethnography of infrastructure,” American Behavioral Scientist, 43(3), 1999: 339 ![]() Approach: Infrastructure studies meet privacy by design In particular, this conception of privacy by design takes shape around two entities, the password and an encryption-enabling “friendship key.” The chapter addresses the negotiations leading to the development of these two features and in particular, it examines how the password, that remains locally stored in the user’s P2P client, becomes a form of disengagement of the service provider with respect to security issues: a detail whose importance may seem small at first, but eventually leads to changes in the forms of technical solidarity 6 established between users and provider. The local, client-side encryption of data first, and their fragmentation afterwards-both operations conducted within the P2P client installed by the user, and entirely on his terminal-are proposed by Drizzle as evidence that the firm, in its own words, “does not even have the technical means” to betray the trust of users. 5 Ultimately, we will see how decentralizing the cloud leads to a reformulation and “re-balancing” of the relationship between the user and the service provider. La conscience collective dans les sociétés technicisées (.)ģBuilding on the analysis of Drizzle’s “peer-to-peer cloud,” this chapter discusses how changes in the architectural design of networked services affect data circulation, storage and privacy-and in doing so, reconfigure the articulation of the ‘locality’ and the ‘centrality’ in the network.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |