diff options
| author | yctct <yctct@yctct.com> | 2025-11-05 15:56:55 +0100 |
|---|---|---|
| committer | yctct <yctct@yctct.com> | 2025-11-05 15:56:55 +0100 |
| commit | 732f6dfff30e655084fbb44f798e9064b41345ae (patch) | |
| tree | 21dd0481bebe2109ff56667c7776b7e9d2ffdc6d /asymmetry.tex | |
Add source file, licences and README
Diffstat (limited to 'asymmetry.tex')
| -rw-r--r-- | asymmetry.tex | 630 |
1 files changed, 630 insertions, 0 deletions
diff --git a/asymmetry.tex b/asymmetry.tex new file mode 100644 index 0000000..254314d --- /dev/null +++ b/asymmetry.tex @@ -0,0 +1,630 @@ +% This file carries two licenses. +% +% The text is license CC BY-SA see imprint. +% +% LaTex template for a pamphlet +% Copyright (C) 2025 Roman Philip +% +% This program is free software: you can redistribute it and/or modify +% it under the terms of the GNU General Public License as published by +% the Free Software Foundation, either version 3 of the License, or +% (at your option) any later version. +% +% This program is distributed in the hope that it will be useful, +% but WITHOUT ANY WARRANTY; without even the implied warranty of +% MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +% GNU General Public License for more details. +% +% You should have received a copy of the GNU General Public License +% along with this program. If not, see <https://www.gnu.org/licenses/>. + +\documentclass[10pt]{book} + +\author{Roman Philip} +\title{Asymmetry, heteronomy, delegation: what happens when our self-reliance in fact relies on technological providers?} + +% making the font TeX Gyre Termes the default font; GFL +\usepackage{tgtermes} +% loading the inter font so I can use throughout the document; OFL +\usepackage{inter} +\usepackage[T1]{fontenc} + +\usepackage[english]{babel} + +\usepackage[ + a6paper, % Set size of document + %top=1.5cm, % margins + top=2cm, % margins + bottom=1.5cm, + inner=1cm, % for twosided docs, left is called inner + textwidth=7cm, + %outer=1cm, % for twosided docs, right is called outer + bindingoffset=0.1cm, + twoside=true, + %showframe, % show actual margin frame on the pdf + %showcrop % show layout size if smaller than paper size + ]{geometry} + +% Set color of the font for the whole document if different than black +%\usepackage{xcolor} +%\color{black} + +% Hyphenation word list +\hyphenation{% + AI + Adobe + Bench + Bitcoin + DIY + Daniel + Instagram + European + Union + France + Cyprus + Central + Bank + heteronomy + heteronomic + Maps + International + Monetary + Fund + Facebook + LinkedIn + Microsoft + Nassim + Nassim + Philip + Roman + Ross + Taleb + bitcoin + lock-in + } + +% Fine tunes typographic effect (i.e. character protrusion?) +% I get a few less Overflow when protusion is on +\usepackage{microtype} +\sloppy + +% hyphens URL +% so that URL line-break +\usepackage[hyphens]{url} + +% To enable strikethrough text with \sout{} +%\usepackage[normalem]{ulem} + +% Group footnotes altogether after the text +% Add \theendnotes to show notes, after the text +\usepackage{endnotes} +\let\footnote=\endnote + +% Make the labels of description lists non-bold (default is bold) +%\renewcommand*\descriptionlabel[1]{\hspace\labelsep\normalfont #1} +% this works because the command \sourceinter is defined in the +% preamble +\renewcommand*\descriptionlabel[1]{\hspace\labelsep\interlight #1} + +% Print commit and branch (git) +% credit CL +% The branch name can be extracted from .git/HEAD +% and given [branch name], the commit ID can be found in +% .git/refs/heads/[branch name] +\usepackage{xstring} +\usepackage{catchfile} + +% The package catchfile provides the command \CatchFileDef, +% which allows us to read .git/HEAD into a macro +\CatchFileDef{\headfull}{.git/HEAD}{} +% Use \StrGobbleRight from the xstring package to trim it +\StrGobbleRight{\headfull}{1}[\head] +% Extract the branch name from the string with \StrBehind +% and save it to \branch +\StrBehind[2]{\head}{/}[\branch] +\IfFileExists{.git/refs/heads/\branch}{% +% Use \CatchFileDef to save the commit ID in \commit + \CatchFileDef{\commit}{.git/refs/heads/\branch}{}}% + +% to display .png file +\usepackage{graphicx} + +\begin{document} + +\newgeometry{ + layoutheight=13.65cm, % custom height for the actually print area + layoutwidth=9.3cm, % custom width for the actually print area + layoutvoffset=0.6cm, % bleed + top=0.8cm, + bottom=0.8cm, + left=1.4cm, + right=1.4cm +} + +\thispagestyle{empty} +\begin{flushleft} + % Add \par so the line spacing is even + {\Huge\interextrabold Asymmetry, heteronomy, delegation:\\ what happens\\ when our\\ self-reliance\\ in fact relies on technological providers?\par} + \bigskip + {\large\intermedium roman philip} +\end{flushleft} + +%\vspace*{\fill}% +\begin{flushright} +\includegraphics*[width=0.2\textwidth]{rabbit.png} +\end{flushright} +\restoregeometry + +\newpage +\thispagestyle{empty} +% start page counter +\mainmatter +%hide page counter +\thispagestyle{empty} +% Setting for the group/page +\begingroup + +\newpage +\date{} % hide date \maketitle prints \today +\maketitle + +\newpage +\thispagestyle{empty} +\vspace*{\fill}% + +\begin{scriptsize} + +\begingroup +\interlight +\parindent 0pt +\parskip 1ex + +Imprint + +\begin{description} + \setlength{\itemsep}{-1.1ex} % horizontal space between list items + \setlength{\labelsep}{0.2em} % horizontal space between label and description + \item[LAYOUT] yctct + \item[ARTWORK] \emph{white rabbit} by le marteau rêveur + \item[EDITORS] Daniel Ross; T.K. + \item[COPY EDITING] Daniel Ross + \item[PRINTING] Lilou (Drucken3000) + \item[PRINTER] RISO MZ1070E + \item[PAPER] Metapaper 90 gsm + \item[INK] Riso ink, blue + \item[PRINT RUN] 150 + \item[BINDING] yctct + \item[FONTS] inter OFL-1.1; termes GFL + \item[SPELLCHECK] aspell licensed under LGPL-2.1+ + \item[TYPESETTING] \LaTeX\ licensed under LPPL-1.3c + \item[VERSION CONTROL] Git licensed under GPL-2.0+ + \item[TEXT EDITOR] Vim licensed under Vim license + \item[OPERATING SYSTEM] GNU/Linux Trisquel %which complies with the GNU Free System Distribution Guidelines + \item[COMPUTER] Thinkpad X220 with Libreboot +\end{description} + +\url{https://pub.yctct.com}\newline +\texttt{yctct@yctct.com}\newline +\texttt{2E0F FB60 7FEF 11D0 FB45 4DDC E979 E52A 7036 7A88}\newline +PGP public key: \url{https://yctct.com/_pubkey.txt} + +Compiled on \today. + +Commit hash \texttt{\commit}%on branch \texttt{\branch}. + +© 2025 \emph{Asymmetry, heteronomy, delegation: what happens when our + self-reliance in fact relies on technological providers?} by Roman + Philip is licensed under \mbox{CC BY-SA 4.0}. + +TL;DR of the license: you can copy, translate and redistribute this essay +with attribution, even commercially. If you redistribute this essay +electronically, you cannot apply technological restrictions e.g. DRM. +To see the full license, check +\url{https://creativecommons.org/licenses/by-sa/4.0/}. + +Like the layout of this pamphlet? Download the source file. + +Source file: \url{https://git.yctct.com/asymmetry} + +To order copies please email \texttt{yctct@yctct.com}. + +\end{scriptsize} +\endgroup + +\newpage +\thispagestyle{empty} +\vspace*{20ex} +Many of us benefit from what technological providers have to offer. + +We +use technologies knowing that the applications or the software we rely +upon will increase the power, speed and scale at which we can operate. + +As we adopt a technology, we entrust the provider of that technology with some +of our autonomy; in return, we expect that the power of that technology will +further empower us. However, sometimes things don't work out as expected. The +heteronomy of providers --- that is, the influence providers have over users +--- can give rise to adverse consequences. Users can discover that they have +been locked out, or they may be dragged along through unwanted changes, or lose +access to their assets. + +A key factor behind such problems is that, very often, asymmetries of power +exist between users and providers. These asymmetries are not always obvious, +and sometimes users hand their autonomy over to these heteronomous powers with +little or no awareness of them. + +This does not imply that we should reject the usage of digital technologies, or to +say that we should decrease our usage of them, or avoid large technology +companies. But it is to raise the question:\\ + +\noindent what would it take for users +to leverage the power that technologies have to offer without finding +themselves subject to the adverse consequences which result from such +asymmetrical relationships to providers?\\ + +\noindent RP. + +\newpage +\thispagestyle{empty} +\vspace*{20ex} +Late in December 2024, Bench, a startup whose promise was to automate +accounting for businesses, shut down. + +On December 27th, users of Bench found that the login interface used to +access their accounting data and tax documents had disappeared. +Instead, a visit to the site revealed only a single webpage bearing the +following message printed on a plain white background: + +\begin{quote} +"We regret to inform you that as of December 27, 2024, the Bench +platform will no longer be accessible. We know this news is abrupt and +may cause disruption, so we're committed to helping Bench customers +navigate through the transition. + +``From the entire team at Bench, it has been an absolute privilege to +serve small businesses for the last 13 years. Thank you for being part +of our journey.''\footnote{You can still see that page on archive.org: + \url{https://web.archive.org/web/20241227223423if_/https://bench.co/}} +\end{quote} + +A few days later, an announcement was made that Bench had been acquired +by a company with no experience in running accounting books for +businesses.\footnote{\url{https://techcrunch.com/2025/01/03/inside-the-wild-fall-and-last-minute-revival-of-bench-the-vc-backed-accounting-startup-that-imploded-over-the-holidays/}} +Some users tried to obtain their data or close their accounts, but +couldn't. They were forced to transfer their accounting data to the new +owner.\footnote{\url{https://techcrunch.com/2025/01/10/bench-customers-are-now-being-forced-to-hand-over-their-data-or-risk-losing-it-they-say/}}\textsuperscript{,}\footnote{Thank you to Fabien K. for letting me know about the shutdown of Bench.} + +Earlier in 2024, another scandal had broken out: ``tens of thousands of +U.S. businesses and individuals''\footnote{\url{https://apnews.com/article/synapse-evolve-bank-fintech-accounts-frozen-07ecb45f807a8114cac7438e7a66b512}} +found themselves locked out, unable to access their savings.\footnote{\url{https://www.nbcnews.com/buisness/consumer/collapse-fintech-firm-10-million-users-without-access-money-rcna153599}} +This happened because a financial technology company, which was the +backbone of other financial digital applications, shut down. In the +turmoil, the authorities found that the bank balance of these technology +companies did not match the balance of users. \$96 million in funds were +missing.\footnote{\url{https://www.cnbc.com/2024/11/22/synapse-bankruptcy-thousands-of-americans-see-their-savings-vanish.html}} +Some users said they were refunded less than 1\% of their +balance;\footnote{We would like to think that users would be refunded in + this kind of situation, like when a bank goes bust; however, that did + not happen here, because the deposits at these financial technology + companies weren't insured by the Federal Deposit Insurance + Corporation.} a woman was told that she would only get \$500 back from +the \$280,000 she initially deposited, another user said he was offered +81 cents against his \$22,000.\footnote{\emph{Ibid.}} + +Some other disruptions are less devastating, yet still show that users +can, without realising it, find themselves in a position where they are +effectively powerless. For example, over the last decade or so, a trend +has emerged for software companies to herd users onto the cloud. That +means that, if users want to utilise an application, they must now +remain tethered to the servers of providers. It also means, most of the +time, that users must store their work on servers belonging to providers, +rather than on their own computers. The problem, though, is that once a +company has locked users in, they can drag them along as they implement +unwanted changes, or decide to use the work of users as input to train +their own technology. For example, Adobe's AI technology scans the work +of all users by default.\footnote{\url{https://infosec.exchange/@briankrebs/111965550971762920} + and \url{https://helpx.adobe.com/acrobat/using/generative-ai.html}} Along +the same lines, back in 2023 Microsoft allegedly trained their AI +technology on the data of companies storing their work on the servers of +Microsoft.\footnote{\url{https://www.saverilawfirm.com/our-cases/github-copilot-intellectual-property-litigation}} + +These are examples showing that the \emph{heteronomy} of providers --- +that is the influence providers can have on users --- can cause adverse +consequences. Once users have come to trust providers with their +autonomy, the heteronomous power of providers can lead to situations +such as the ones described above. Users can get locked out from their +accounts, lose their savings, or be dragged along powerlessly as +providers make unwanted changes. + +The implication of all these stories and unwanted +consequences is not that we should abandon the use of technological +applications, cloud infrastructures or artificial intelligence. + +Asking someone, be it a company or a technology, to run our accounting books, +keep our money or our data, or run computing tasks, is nothing new. We've been +delegating tasks for a long time: to accountants, to bankers, to lawyers, as +well as to technologies and machines. + +However, we usually don't delegate unquestioningly. We know things can go +wrong; we know there is always a chance the other party may mislead us. So when +we delegate, as far as possible we make sure that there are safeguards in +place. For example, we review contracts before signing; we get advice from +lawyers; we make sure the law will protect us; we figure out which pieces of +information, or bits of knowledge, we can risk transferring --- and which we +cannot. We would not sign a contract that allows someone else to lock us in, +or take advantage of our situation, while we remain powerless. + +In other words, as the philosopher Daniel Ross tells me: + +\begin{quote} +``We take care of the conditions of delegations. What is delegation? It +is the fact that, ever since the dawn of agriculture, when it became +possible to generate large surpluses of food, structures have arisen +relieving some people of certain tasks and designating other people with +other tasks. It is what we call the division of labour, and it usually +also involves the introduction of one or another kind of hierarchy. This +hierarchical division is a delegation. And with the Industrial +Revolution this delegation is extended to machines, to factories, and +then to all kinds of other technological systems, and today to apps, +platforms and so on. All of these delegations involve an interplay of +power and powerlessness. The time we save by delegating grants us +autonomy, the freedom to do other things. But it does so by taking those +tasks out of our hands, and therefore, potentially, out of our control: +autonomy depends on heteronomy, but it comes at a cost. This is why the division of labour, from +the very beginning, brings about new potentials for tension, conflict, +disagreement and war. It is to mitigate those risks that we must always +pay attention to our delegations, to the conditions in which they +operate, and to the rules we establish to ensure that the risks of +delegation are kept to a minimum.'' +\end{quote} + +But somehow, with digital technologies, we miss something; we do not +seem to have figured out what the \emph{conditions of delegations} are, +or what those conditions ought to be. Most of us have been caught in the +trap. + +It's true that the kinds of technologies we are considering here can +initially give users a sense of empowerment: for example, by using +Google Maps, we suddenly realise that we have increased our freedom, +because we can find our way literally anywhere. But then, somehow, over +time, users can become trapped: in the case of Google Maps, we +increasingly realise that, without this navigational delegation, we no +longer know how to find our way around, sometimes even along routes with +which we were formerly familiar. And this is a problem that is not just +individual, but generational: to grow up without ever having learned to +navigate without delegating to Google Maps is another thing again. + +It is as if individuals and even generations of individuals can no longer +imagine that alternatives exist. Today, some businesses can no longer exist +without an Instagram account; some people can no longer exist professionally +without a LinkedIn account. And so it becomes a paradox: + +\begin{quote} +\emph{Technologies that were first +affording users new possibilities have become the only possibility there is.} +\end{quote} + +In short: the systemic asymmetry of these delegations means that their +heteronomous character can fail to foster autonomy in a way users might have +first imagined, but instead, lock them in, or nudge them into situations +sometimes with no way out. + +An oft-cited example is how the world wide web first granted, to just about +anyone, the ability to publish information to the world, creating a new global +public, but then, before too many years had passed, this new capacity fell +captive to a consortium of walled gardens\footnote{``A walled garden is a +software system wherein the carrier or service provider has control over +applications, content, and/or media, and restricts convenient access to +non-approved applicants or content.'' Wikipedia} dominated by a few +planetary-scale companies. Within the walls of these gardens, users have no +other choice but to accept the conditions offered to them by the gatekeepers. +And this offer is made on a take it or leave it basis: accept or decline the +heteronomous conditions of access provided by Facebook if you want to keep in +touch with others, by Instagram if you want to conduct marketing, by LinkedIn +if you want to exist on the job market, \emph{et cetera}. Yet, even though most +of us have identified these patterns, most of us still don't know how to avoid +those traps. We come to accept that `there is no alternative'', and we limit +ourselves to adapting to this mantra. + +In more recent years, we have observed a similar pattern unfolding in +the way some cryptocurrency companies deal with their users. + +For a long time, banks have had custody over people's financial assets; meaning +that the ``owner'' of a bank account, the account ``holder'', does not in any +clear way hold the ultimate power in relation to the release of funds held in +that account. The bank does. For example, in France (and probably in other +countries), if someone wants to withdraw a large sum of money from \emph{their own} +bank account, they have to request permission. While the process is mundane, they still have to fill out a +form, or provide an explanation of their reasons for wishing +to withdraw \emph{their own} funds. They can't just use their funds freely. Sometimes the restrictions can be more drastic: +cases where customers find that they really have no control over \emph{their} +funds, for example when banks freeze accounts, as occurred in Canada in +2022, when 210 bank accounts were frozen by the government without a court +order.\footnote{\url{https://www.cbc.ca/news/politics/ottawa-protests-frozen-bank-accounts-1.6355396}} +Or worse: when authorities grab funds sitting in bank accounts, as +occurred in 2013 in Cyprus when deposits above €100,000 were used to resolve +the debt of one of the largest local banks, as part of a deal with the European +Union, the European Central Bank and the International Monetary +Fund.\footnote{\url{https://web.archive.org/web/20130325042059if\_/https://www.reuters.com/article/2013/03/25/us-cyprus-parliament-idUSBRE92G03I20130325}} + +With some technologies, such as bitcoin, this situation is changing: +individuals can have custody of their financial assets. In saying this, +we do not mean to imply that bitcoin is a panacea for the risk of +account-holders finding themselves deprived of their funds. Other risks +of that kind remain for those who deal in bitcoin. Nevertheless, the +fact remains that no technology provider can lock a user out from +accessing his or her bitcoin funds, as long as users keep their seed +secret. Yet, as we just stated, risks remain, and users can still fall +into one kind of trap or another. Users of cryptocurrencies can +undoubtedly still find themselves the victim of the heteronomy of +providers of technologies related to cryptocurrency management. These +providers might first provide users with tools that facilitate managing or +exchanging cryptocurrencies, but they can also put users in situations where +adverse circumstances can deprive them of access to their funds, locking +them out of their accounts, or even losing the whole value of their +holdings. In short, there is no escape from the need to pay attention to +the conditions of our delegations. + +What is it that we are missing, then? + +Some readers will shrug their shoulders and think that for one to have +access to the immense power and scale afforded by these technologies, +they simply have to accept the requirement to submit to these +asymmetries of power. That is just the price of doing business: we have +no choice. Other readers might think that for one to be free from these +asymmetries of power, one has to acquire extraordinary skills. + +But this is not the case. + +Avoiding asymmetries of power is not a question of whether one can write +code, or is some kind of IT wizard. You don't have to be a lawyer to +read and sign a contract, and we are often quite capable of doing so on +our own. We might not know all the intricate details of the meanings of +the clauses and the laws that govern them, but as individuals we still +acquire a set of heuristics (rules) that allow us to detect red flags. +It is the same with the kinds of technologies we are discussing here: +avoiding pitfalls is about having a short checklist in mind of what the +conditions of delegations should be (and what they shouldn't be), so +that when we are faced with using a new technology we can run that +checklist on our own, and give ourselves a pretty good chance to figure +out whether we will fall into a trap leaving us at the mercy of +providers. + +Most of us do not want to get ourselves into situations where we would +be forced to ask for permission, jump through a painful set of hoops, or +get into a seemingly endless argument with a digital provider, just in +order to use \emph{our} digital assets. We want to have control over our +digital assets regardless of the deeds and practices of digital +providers. + +For example, and here we are looping back to the case of Bench with which we +began, one can choose to use an accounting software whose providers cannot lock +you in. This doesn't mean that you shouldn't delegate the job of running your +accounting software to a provider, or that you have to have your own server. +Not at all. You can still rely on the servers of a third-party provider to run +your accounting system, but you have to take care of the conditions of +delegations, so if you're unhappy with the software, or the provider, you can +quit and carry on using the software \emph{without} the provider. Or if that +proves difficult, you can hire another provider to run that software for you, +which is, of course, still a delegation, but of a different kind, and with +fewer risks. How all of that is possible is something that will be explained +in more detail in subsequent articles. + +For now, my point is simple: one does not just have to accept these +asymmetries. There are indeed alternatives. It is possible for the user not +to abandon their autonomy. Users can have as much power as providers. When the +conditions of delegation are such as to ensure that users keep their power and +autonomy, then, if a provider does something users don't like, users can walk +out with their digital assets, e.g. accounting books, tax documents, data, +work documents, funds as well as software they have become dependent upon. + +It is in no way necessary to put yourself +in a situation where you can get locked out, or where you are obliged to enter +into difficult and painful arguments and negotiations just to win back the +right to use assets that were yours from the outset. In the words of Nassim Taleb: + +\begin{quote} ``You do not want to win an argument. You want to +win.''\footnote{\emph{Skin in the Game}, Nassim Nicholas Taleb, 2018, p.24} +\end{quote} + +And so the question we must ask is simple: how does one ``win'' when +using digital technologies? + +What is the checklist for these conditions of delegations that you must +keep in mind so that you can leverage the power such technologies have +to offer, yet insulate yourself from the hubris and heteronomic excess +that providers can exert over users? + +In a series of articles to come, these questions will be addressed, and exactly +what counts as the conditions of delegation will be discussed and explored in +detail. In other words, our aim will be to provide readers with heuristics they +can use, so that they can avoid falling into asymmetries of power, without +denying that in today's world self-reliance does not mean cutting oneself off +from technology, but rather means knowing how best to rely on new technologies, +and how best to take care of the risks of that reliance. + +These technologies +are indeed immensely powerful, and therefore contain inherent threats and +risks. Our reliance upon them must not, and need not, end up making us, the +users of these technologies, powerless and trapped. But for that, we need +knowledge. + +\newpage +\thispagestyle{empty} +\begingroup +% Set indent +\parindent 0pt +% Set space between paragraphs +\parskip 1ex + +\newpage +\thispagestyle{empty} + +\vspace*{\fill}% +\begin{center} +Thank you to those who financed this work. +\end{center} +\vspace*{\fill}% + +\newpage +\thispagestyle{empty} +\textbf{\large Next essays} + +If you'd like to receive an email when the next essay is out, you can sign up to a newsletter there: \url{https://lists.yctct.com/wws/subscribe/updates}. + +\includegraphics*[width=0.4\textwidth]{subscribe.png} + +\newpage +\thispagestyle{empty} +\textbf{\large Fundraising} + +If you or your organisation would like to finance this work, you can use one of the following methods: cash, bank transfer, bitcoin, monero. + +\textbf{Cash} + +All currencies welcome. + +You can send cash to the following address: + +\texttt{Roman Philip\\ +C/O Cultivation Space\\ +ExRotaprint\\ +Ausgang 4\\ +Gottschedstr. 4\\ +13357 Berlin\\ +Germany} + +\textbf{Bank transfer} + +Please email me at \texttt{yctct@yctct.com} and I'll provide you with banking details. + +\newpage +\textbf{Bitcoin} + +\includegraphics*[width=0.4\textwidth]{btc.png} + +\texttt{bc1qvtkplyg43uw35czec8cr35kmganvh6y2tr\\fcev} + +\thispagestyle{empty} +\textbf{Monero} + +\includegraphics*[width=0.4\textwidth]{xmr_cropped.png} + +\texttt{86XSBNFRWSWLehxTcQrRMuMyssdhBWNCpAYi3G\\sgJf8f8BhLJUBpvCwheVUrPeTpKBDjRfLK7uzc\\bdd6ubTQ2b6m3ZUkRTg} + +\newpage +\thispagestyle{empty} +\textbf{\large About} + +I do independent research in philosophy, \mbox{security} \& technology. + +I distribute my work under a \mbox{CC BY-SA} license; in short, that means that anyone can copy, translate and redistribute this work with attribution (credit), even commercially. +To see the full license, check \url{https://creativecommons.org/licenses/by-sa/4.0/}. + + +\endgroup + +\newpage +\theendnotes + +\end{document} |
