Project Summary: In collaboration with the other CryptoParty group, the three members of the Ethics team disseminated information about how to use and access different encryption techniques. While this was the main goal of the EFF conference booth, the Ethics team was responsible for mentioning how software such as Tor grants the user much more freedom to explore the "shallow" and "deep" internet, without fear of being surveilled. While this freedom is in fact activated by the use of such encryption software, it remains essential that each user practices good moral judgement when using encryption techniques, without mentioning the obvious moral pitfalls of buying contraband online, as well as the fact that remaining 100% anonymous while online is nearly impossible. 

 

Project Case Statement: Establish a solid base for a more secure online identity, as well as providing education about the ethical ramifications of encryption software.

 

Project Problem Statement: Recent revelations about NSA and global government interference with privacy and censorship has created a space in which completely anonymous software exists, what are the socio-political ramifications of technology like this?

 

Term
Winter 2014
Category
Privacy & Surveillance
Short Summary

A second group of 3 students (Pete, Garret, Ray) focusing not on the technology side of the CryptoParty, but the ethics of using such software. This is fundamental to the implementation of such software, because of its ability to bypass certain methods of surveillance used by the U.S. government. This is not to say that all users of such software have unscrupulous motives, merely that it is up to the user to retain moral integrity when browsing.

"With great power comes great responsibility" -Voltaire.

Files
CryptoParty.pdf (107.66 KB)