Sure. I guess you don’t put your phone on the floor when you crash on a night train. Even if it’s 10 cm from your pillow. Naturally, you go to bed with your gadget. Still, fat dude on bunk 82, wagon 5, did you strategically snore all night so you could snatch my phone when I was down and out? Or was that just a convenient coincidence?
I was travelling to Stockholm to film a TPB AFK scene around the seminar Internet and Democratic Change where a bunch of hacktivists and people from human rights organisations got together “to discuss strategies and possibilities for the future”. Network nurturer Marcin de Kaminski of the Julia Group and one of the Pirate Bureau founders, had curated an inspiring line up of speakers.
One of them was the super cool Egyptian democracy activist and blogger Salma Said. “I didn’t use twitter in the revolution” she said “I used rocks”. You can tell her frustration is for real when she talks about how Western media constantly exaggerates the role of Twitter and Facebook in the Egyptian revolution. “It’s not just inaccurate” she says “but insulting. Yes, we used the internet, but to exclude the elements that led to the revolution and only focus on a communication tool is wrong and misleading. It points to one class and one social background, making people think that the revolution was carried out by middle class, English speaking girls. These conferences are good but instead of talking about empowering people with the internet, you should pressure your governments to stop empowering the dictators. People will use the internet anyway. And, no, I’m not gonna thank Gramham Bell for the Egyptian revolution either.”
Hacker and TOR-developer Jake Applebaum started his talk by pointing to the paradox that to many Western governments, including the Swedish one, building open internet infrastructure in the Middle East makes you a hero while building the same infrastructure in western countries makes you a crook. A crook like Peter Sunde.
Applebaum emphasized that the internet in itself is a system for surveillance and that the network should be treated as hostile. He encouraged people to work towards developing communication tools with built in, default encryption instead of the way it works today.
When he asked the audience to recontextualize their smart phones as their own personal tracking devices, constantly surveilling you – for a second – I felt relieved that that dude stole my phone.
If someone knows how to go back to a life with a dumb phone, holla back! As pathetic as it sounds, I’m in serious cold turkey mode whenever I’m not carrying the interwebs in my pocket.