Like It or Not, We're Already Cyborgs
Our interview with @laura for PC Magazine was published today.
“To privacy activists Aral Balkan and Laura Kalbag, we don't need brain implants to become cyborgs; we're already jacked in. And we need a Universal Declaration of Cyborg Rights.”
My studies on cyber-power genesis lead me to demonstrate that what chatacterize cyber-power models of digital systems (computers) or networks (cyberspaces architectures) are a combination of architectural choices in the following, and erroneously differenciated fields (This differenciation being a formattage of your reasoning capabilities too) :
• Integrated circuits, microprocessors, microprocessor based systems’ architectures. The concept of CPU as it is defined today being an architectural limitation too.
• Kernel, OS, software architectures, being mainly dependent of previous ones.
• Telecommunication networks physical topologies, and data transmission technologies.
• And finaly, protocols implemented on such networks.
In all these fields, architectural choices made everywhere
When reading your interview, I realize that you limit your reasonning capabilities to protocols and software only, but you don’t « play » with the too other fields that are indeed the ones that have most impact on a cyberspace architecture overall cyber-power model.
@aral @laura So I would say that your attempt to conceptualize a Universal Declaration of Cyborg Rights is indeed a truncated idea of what I would rather call the right to consciously choose a cyber-power model for a new cyberspace architecture.
Standards define architectures. Architectures caracterize cyber-power models. And who decided on these standards mainly ? Historicaly military, and later multinationals. They have imposed us a cyber-power model
@aral @laura for the current cyberspace architecture called internet, and this cyber-power model is shaping society the way they want, both politicaly and geopolitocaly. It defines how our world is running. But we never choose anything democraticaly. We had no choice at all.
At best, they let play with upper level protocols based on TCP/IP, and with software. That’s the restricted sandbox we are allowed to play in, and its impact on the overall
This is my personal Mastodon.