Going dark: anonymising technology in cyberspace

Ethics and Information Technology 20 (3):189-204 (2018)
  Copy   BIBTEX

Abstract

Anonymising technologies are cyber-tools that protect people from online surveillance, hiding who they are, what information they have stored and what websites they are looking at. Whether it is anonymising online activity through ‘TOR’ and its onion routing, 256-bit encryption on communications sent or smart phone auto-deletes, the user’s identity and activity is protected from the watchful eyes of the intelligence community. This represents a clear challenge to intelligence actors as it prevents them access to information that many would argue plays a vital part in locating and preventing threats from being realised. Moreover, such technology offers more than ordinary information protections as it erects ‘warrant-proof’ spaces, technological black boxes that no matter what some authority might deem as being legitimately searchable is protected to the extent that there are very limited or non-existent means of forcing oneself in. However, it will be argued here that not only is using such anonymising technology and its extra layer of protection people’s right, but that it is ethically mandatory. That is, due to the en masse surveillance—from both governments and corporations—coupled with people’s limited awareness and ability to comprehend such data collections, anonymising technology should be built into the fabric of cyberspace to provide a minimal set of protections over people’s information, and in doing so force the intelligence community to develop more targeted forms of data collection.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,881

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

The Limits of Deterrence Theory in Cyberspace.Mariarosaria Taddeo - 2018 - Philosophy and Technology 31 (3):339-355.
Can Cyberspace Be Just?James Moor - 1999 - Etica E Politica 1 (2).
Deterrence in Cyberspace: a Silver Bullet or a Sacred Cow?Ewan Lawson - 2018 - Philosophy and Technology 31 (3):431-436.
Information Technology and Cyberspace.D. Pullinger - 2003 - The Australasian Catholic Record 80 (2):266-266.
Code and Other Laws of Cyberspace.J. Magney - 2000 - Knowledge, Technology & Policy 13 (1):104-105.
Review of The Medicalization of Cyberspace. [REVIEW]Kristi Scott - 2008 - Studies in Ethics, Law, and Technology 2 (3).
Code and moral values in cyberspace.Richard A. Spinello - 2001 - Ethics and Information Technology 3 (2):137-150.

Analytics

Added to PP
2018-06-23

Downloads
146 (#128,444)

6 months
121 (#32,572)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

Was Snowden virtuous?Clive Harfield - 2021 - Ethics and Information Technology 23 (3):373-383.

Add more citations

References found in this work

What is the point of equality.Elizabeth Anderson - 1999 - Ethics 109 (2):287-337.
Freedom of the will and the concept of a person.Harry Frankfurt - 2004 - In Tim Crane & Katalin Farkas (eds.), Metaphysics: a guide and anthology. Oxford University Press UK.
Paternalism.Gerald Dworkin - 1972 - The Monist 56 (1):64-84.
On liberty.John Stuart Mill - 2000 - In Steven M. Cahn (ed.), Exploring Philosophy: An Introductory Anthology. New York, NY, United States of America: Oxford University Press USA. pp. 519-522.
Paternalism.Gerald Dworkin - 1972 - The Monist.

View all 28 references / Add more references