What is this?
http://blogs.harvard.edu/doc/feed/
<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:creativeCommons="http://backend.userland.com/creativeCommonsRssModule"
>

<channel>
	<title>Doc Searls Weblog</title>
	<atom:link href="http://blogs.harvard.edu/doc/feed/" rel="self" type="application/rss+xml" />
	<link>http://blogs.harvard.edu/doc</link>
	<description>Holding forth on stuff since 1998</description>
	<lastBuildDate>Fri, 24 Jan 2020 14:53:46 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.8.1</generator>
	<creativeCommons:license>https://creativecommons.org/licenses/by/4.0/</creativeCommons:license>
<site xmlns="com-wordpress:feed-additions:1">87129286</site>	<item>
		<title>Do you really need all this personal information, @RollingStone?</title>
		<link>http://blogs.harvard.edu/doc/2020/01/22/rs/</link>
		<comments>http://blogs.harvard.edu/doc/2020/01/22/rs/#respond</comments>
		<pubDate>Wed, 22 Jan 2020 20:31:47 +0000</pubDate>
		<dc:creator><![CDATA[Doc Searls]]></dc:creator>
				<category><![CDATA[adtech]]></category>
		<category><![CDATA[advertising]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[history]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Journalism]]></category>
		<category><![CDATA[Law]]></category>
		<category><![CDATA[marketing]]></category>
		<category><![CDATA[Personal]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[publishing]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[VRM]]></category>

		<guid isPermaLink="false">http://blogs.harvard.edu/doc/?p=12454</guid>
		<description><![CDATA[Here&#8217;s the popover that greets visitors on arrival at Rolling Stone&#8216;s website: Our Privacy Policy has been revised as of January 1, 2020. This policy outlines how we use your information. By using our site and products, you are agreeing to the policy. That policy is supplied by Rolling Stone&#8217;s parent (PMC) and weighs more than 10,000 words. In [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><img class="aligncenter size-large wp-image-12456" src="http://blogs.harvard.edu/doc/files/2020/01/vampire-personal-data_800px-1-1024x784.jpg" alt="" width="500" height="383" srcset="http://blogs.harvard.edu/doc/files/2020/01/vampire-personal-data_800px-1-1024x784.jpg 1024w, http://blogs.harvard.edu/doc/files/2020/01/vampire-personal-data_800px-1-300x230.jpg 300w, http://blogs.harvard.edu/doc/files/2020/01/vampire-personal-data_800px-1-768x588.jpg 768w, http://blogs.harvard.edu/doc/files/2020/01/vampire-personal-data_800px-1-392x300.jpg 392w, http://blogs.harvard.edu/doc/files/2020/01/vampire-personal-data_800px-1.jpg 1106w" sizes="(max-width: 500px) 100vw, 500px" /></p>
<p>Here&#8217;s the popover that greets visitors on arrival at <em>Rolling Stone</em>&#8216;s website:</p>
<blockquote>
<p style="text-align: center">Our <a href="https://pmc.com/privacy-policy/" target="_blank" rel="noopener">Privacy Policy</a> has been revised as of January 1, 2020. This policy outlines how we use your information. By using our site and products, you are agreeing to the policy.</p>
</blockquote>
<p>That policy is supplied by <em>Rolling Stone&#8217;s</em> parent (<a href="https://pmc.com/about-us/">PMC</a>) and weighs more than 10,000 words. In it the word &#8220;advertising&#8221; appears 68 times. Adjectives modifying it include &#8220;targeted,&#8221; &#8220;personalized,&#8221; &#8220;tailored,&#8221; &#8220;cookie-based,&#8221; &#8220;behavioral&#8221; and &#8220;interest-based.&#8221; All of that is made possible by, among other things—</p>
<blockquote><p><strong>Information we collect automatically:</strong></p>
<p><strong>Device information and identifiers</strong> such as IP address; browser type and language; operating system; platform type; device type; software and hardware attributes; and unique device, advertising, and app identifiers</p>
<p><strong>Internet network and device activity data</strong> such as information about files you download, domain names, landing pages, browsing activity, content or ads viewed and clicked, dates and times of access, pages viewed, forms you complete or partially complete, search terms, uploads or downloads, the URL that referred you to our Services, the web sites you visit after this web site; if you share our content to social media platforms; and other web usage activity and data logged by our web servers, whether you open an email and your interaction with email content, access times, error logs, and other similar information. See “<a href="https://pmc.com/privacy-policy/#cookies">Cookies and Other Tracking Technologies</a>” below for more information about how we collect and use this information.</p>
<p><strong>Geolocation information</strong> such as city, state and ZIP code associated with your IP address or derived through Wi-Fi triangulation; and precise geolocation information from GPS-based functionality on your mobile devices, with your permission in accordance with your mobile device settings.</p></blockquote>
<p>The &#8220;How We Use the Information We Collect&#8221; section says they will—</p>
<blockquote><p><strong>Personalize your experience to Provide the Services, for example to:</strong></p>
<ul>
<li>Customize certain features of the Services,</li>
<li>Deliver relevant content and to provide you with an enhanced experience based on your activities and interests</li>
<li>Send you personalized newsletters, surveys, and information about products, services and promotions offered by us, our partners, and other organizations with which we work</li>
<li>Customize the advertising on the Services based on your activities and interests</li>
<li>Create and update inferences about you and audience segments that can be used for targeted advertising and marketing on the Services, third party services and platforms, and mobile apps</li>
<li>Create profiles about you, including adding and combining information we obtain from third parties, which may be used for analytics, marketing, and advertising</li>
<li>Conduct cross-device tracking by using information such as IP addresses and unique mobile device identifiers to identify the same unique users across multiple browsers or devices (such as smartphones or tablets, in order to save your preferences across devices and analyze usage of the Service.</li>
<li>using inferences about your preferences and interests for any and all of the above purposes</li>
</ul>
</blockquote>
<p>For a look at what <em>Rolling Stone</em>, PMC and their third parties are up to, Privacy Badger&#8217;s browser extension &#8220;found 73 potential trackers on&nbsp;<a href="http://www.rollingstone.com" title="http://www.rollingstone. " target="_blank">www.rollingstone.com</a>:</p>
<blockquote><p>tagan.adlightning.com<br />
&nbsp;<a href="http://acdn.adnxs.com" title="http://acdn.adnxs.
" target="_blank">acdn.adnxs.com</a><br />
&nbsp;<a href="http://ib.adnxs.com" title="http://ib.adnxs.
" target="_blank">ib.adnxs.com</a><br />
&nbsp;<a href="http://cdn.adsafeprotected.com" title="http://cdn.adsafeprotected.
" target="_blank">cdn.adsafeprotected.com</a><br />
&nbsp;<a href="http://static.adsafeprotected.com" title="http://static.adsafeprotected.
" target="_blank">static.adsafeprotected.com</a><br />
&nbsp;<a href="http://d.agkn.com" title="http://d.agkn.
" target="_blank">d.agkn.com</a><br />
&nbsp;<a href="http://js.agkn.com" title="http://js.agkn.
" target="_blank">js.agkn.com</a><br />
&nbsp;<a href="http://c.amazon-adsystem.com" title="http://c.amazon-adsystem.
" target="_blank">c.amazon-adsystem.com</a><br />
&nbsp;<a href="http://z-na.amazon-adsystem.com" title="http://z-na.amazon-adsystem.
" target="_blank">z-na.amazon-adsystem.com</a><br />
&nbsp;<a href="http://display.apester.com" title="http://display.apester.
" target="_blank">display.apester.com</a><br />
&nbsp;<a href="http://events.apester.com" title="http://events.apester.
" target="_blank">events.apester.com</a><br />
&nbsp;<a href="http://static.apester.com" title="http://static.apester.
" target="_blank">static.apester.com</a><br />
&nbsp;<a href="http://as-sec.casalemedia.com" title="http://as-sec.casalemedia.
" target="_blank">as-sec.casalemedia.com</a><br />
&nbsp;<a href="http://ping.chartbeat.net" title="http://ping.chartbeat.
" target="_blank">ping.chartbeat.net</a><br />
&nbsp;<a href="http://static.chartbeat.com" title="http://static.chartbeat.
" target="_blank">static.chartbeat.com</a><br />
&nbsp;<a href="http://quantcast.mgr.consensu.org" title="http://quantcast.mgr.consensu.
" target="_blank">quantcast.mgr.consensu.org</a><br />
&nbsp;<a href="http://script.crazyegg.com" title="http://script.crazyegg.
" target="_blank">script.crazyegg.com</a><br />
&nbsp;<a href="http://dc8xl0ndzn2cb.cloudfront.net" title="http://dc8xl0ndzn2cb.cloudfront.
" target="_blank">dc8xl0ndzn2cb.cloudfront.net</a><br />
cdn.digitru.st<br />
&nbsp;<a href="http://ad.doubleclick.net" title="http://ad.doubleclick.
" target="_blank">ad.doubleclick.net</a><br />
&nbsp;<a href="http://securepubads.g.doubleclick.net" title="http://securepubads.g.doubleclick.
" target="_blank">securepubads.g.doubleclick.net</a><br />
&nbsp;<a href="http://hbint.emxdgt.com" title="http://hbint.emxdgt.
" target="_blank">hbint.emxdgt.com</a><br />
&nbsp;<a href="http://connect.facebook.net" title="http://connect.facebook.
" target="_blank">connect.facebook.net</a><br />
&nbsp;<a href="http://adservice.google.com" title="http://adservice.google.
" target="_blank">adservice.google.com</a><br />
&nbsp;<a href="http://pagead2.googlesyndication.com" title="http://pagead2.googlesyndication.
" target="_blank">pagead2.googlesyndication.com</a><br />
&nbsp;<a href="http://www.googletagmanager.com" title="http://www.googletagmanager.
" target="_blank">www.googletagmanager.com</a><br />
&nbsp;<a href="http://www.gstatic.com" title="http://www.gstatic.
" target="_blank">www.gstatic.com</a><br />
&nbsp;<a href="http://static.hotjar.com" title="http://static.hotjar.
" target="_blank">static.hotjar.com</a><br />
&nbsp;<a href="http://imasdk.googleapis.com" title="http://imasdk.googleapis.
" target="_blank">imasdk.googleapis.com</a><br />
&nbsp;<a href="http://js-sec.indexww.com" title="http://js-sec.indexww.
" target="_blank">js-sec.indexww.com</a><br />
&nbsp;<a href="http://load.instinctiveads.com" title="http://load.instinctiveads.
" target="_blank">load.instinctiveads.com</a><br />
&nbsp;<a href="http://ssl.p.jwpcdn.com" title="http://ssl.p.jwpcdn.
" target="_blank">ssl.p.jwpcdn.com</a><br />
&nbsp;<a href="http://content.jwplatform.com" title="http://content.jwplatform.
" target="_blank">content.jwplatform.com</a><br />
&nbsp;<a href="http://ping-meta-prd.jwpltx.com" title="http://ping-meta-prd.jwpltx.
" target="_blank">ping-meta-prd.jwpltx.com</a><br />
&nbsp;<a href="http://prd.jwpltx.com" title="http://prd.jwpltx.
" target="_blank">prd.jwpltx.com</a><br />
&nbsp;<a href="http://assets-jpcust.jwpsrv.com" title="http://assets-jpcust.jwpsrv.
" target="_blank">assets-jpcust.jwpsrv.com</a><br />
&nbsp;<a href="http://g.jwpsrv.com" title="http://g.jwpsrv.
" target="_blank">g.jwpsrv.com</a><br />
pixel.keywee.co<br />
&nbsp;<a href="http://beacon.krxd.net" title="http://beacon.krxd.
" target="_blank">beacon.krxd.net</a><br />
&nbsp;<a href="http://cdn.krxd.net" title="http://cdn.krxd.
" target="_blank">cdn.krxd.net</a><br />
&nbsp;<a href="http://consumer.krxd.net" title="http://consumer.krxd.
" target="_blank">consumer.krxd.net</a><br />
&nbsp;<a href="http://www.lightboxcdn.com" title="http://www.lightboxcdn.
" target="_blank">www.lightboxcdn.com</a><br />
&nbsp;<a href="http://widgets.outbrain.com" title="http://widgets.outbrain.
" target="_blank">widgets.outbrain.com</a><br />
&nbsp;<a href="http://cdn.permutive.com" title="http://cdn.permutive.
" target="_blank">cdn.permutive.com</a><br />
&nbsp;<a href="http://assets.pinterest.com" title="http://assets.pinterest.
" target="_blank">assets.pinterest.com</a><br />
&nbsp;<a href="http://openbid.pubmatic.com" title="http://openbid.pubmatic.
" target="_blank">openbid.pubmatic.com</a><br />
&nbsp;<a href="http://secure.quantserve.com" title="http://secure.quantserve.
" target="_blank">secure.quantserve.com</a><br />
&nbsp;<a href="http://cdn.roiq.ranker.com" title="http://cdn.roiq.ranker.
" target="_blank">cdn.roiq.ranker.com</a><br />
&nbsp;<a href="http://eus.rubiconproject.com" title="http://eus.rubiconproject.
" target="_blank">eus.rubiconproject.com</a><br />
&nbsp;<a href="http://fastlane.rubiconproject.com" title="http://fastlane.rubiconproject.
" target="_blank">fastlane.rubiconproject.com</a><br />
&nbsp;<a href="http://s3.amazonaws.com" title="http://s3.amazonaws.
" target="_blank">s3.amazonaws.com</a><br />
&nbsp;<a href="http://sb.scorecardresearch.com" title="http://sb.scorecardresearch.
" target="_blank">sb.scorecardresearch.com</a><br />
&nbsp;<a href="http://p.skimresources.com" title="http://p.skimresources.
" target="_blank">p.skimresources.com</a><br />
&nbsp;<a href="http://r.skimresources.com" title="http://r.skimresources.
" target="_blank">r.skimresources.com</a><br />
&nbsp;<a href="http://s.skimresources.com" title="http://s.skimresources.
" target="_blank">s.skimresources.com</a><br />
&nbsp;<a href="http://t.skimresources.com" title="http://t.skimresources.
" target="_blank">t.skimresources.com</a><br />
launcher.spot.im<br />
recirculation.spot.im<br />
&nbsp;<a href="http://js.spotx.tv" title="http://js.spotx.
" target="_blank">js.spotx.tv</a><br />
&nbsp;<a href="http://search.spotxchange.com" title="http://search.spotxchange.
" target="_blank">search.spotxchange.com</a><br />
&nbsp;<a href="http://sync.search.spotxchange.com" title="http://sync.search.spotxchange.
" target="_blank">sync.search.spotxchange.com</a><br />
&nbsp;<a href="http://cc.swiftype.com" title="http://cc.swiftype.
" target="_blank">cc.swiftype.com</a><br />
&nbsp;<a href="http://s.swiftypecdn.com" title="http://s.swiftypecdn.
" target="_blank">s.swiftypecdn.com</a><br />
&nbsp;<a href="http://jwplayer.eb.tremorhub.com" title="http://jwplayer.eb.tremorhub.
" target="_blank">jwplayer.eb.tremorhub.com</a><br />
&nbsp;<a href="http://pbs.twimg.com" title="http://pbs.twimg.
" target="_blank">pbs.twimg.com</a><br />
&nbsp;<a href="http://cdn.syndication.twimg.com" title="http://cdn.syndication.twimg.
" target="_blank">cdn.syndication.twimg.com</a><br />
&nbsp;<a href="http://platform.twitter.com" title="http://platform.twitter.
" target="_blank">platform.twitter.com</a><br />
&nbsp;<a href="http://syndication.twitter.com" title="http://syndication.twitter.
" target="_blank">syndication.twitter.com</a><br />
&nbsp;<a href="http://mrb.upapi.net" title="http://mrb.upapi.
" target="_blank">mrb.upapi.net</a><br />
&nbsp;<a href="http://pixel.wp.com" title="http://pixel.wp.
" target="_blank">pixel.wp.com</a><br />
&nbsp;<a href="http://stats.wp.com" title="http://stats.wp.
" target="_blank">stats.wp.com</a><br />
&nbsp;<a href="http://www.youtube.com" title="http://www.youtube.
" target="_blank">www.youtube.com</a><br />
&nbsp;<a href="http://s.ytimg.com" title="http://s.ytimg.
" target="_blank">s.ytimg.com</a>&#8220;</p></blockquote>
<p>This kind of shit is why we have the EU&#8217;s <a href="https://en.wikipedia.org/wiki/General_Data_Protection_Regulation">GDPR (General Data Protection Regulation)</a> and California&#8217;s <a href="https://en.wikipedia.org/wiki/California_Consumer_Privacy_Act">CCPA (California Consumer Privacy Act)</a>. (No, it&#8217;s not just because Google and Facebook.) If publishers and the adtech industry (those third parties) hadn&#8217;t turned the commercial Web into <a href="http://blogs.harvard.edu/doc/2018/03/23/nothing/">a target-rich environment for suckage by data vampires</a>, we&#8217;d never have had either law. (In fact, both laws are still new: the GDPR went into effect in May 2018 and the CCPA a few days ago.)</p>
<p>I&#8217;m in California, where the CCPA gives me the right to shake down the vampiretariat for all the information about me they&#8217;re harvesting, sharing, selling or giving away to or through those third parties.* But apparently <em>Rolling Stone</em> and PMC don&#8217;t care about that.</p>
<p>Others do, and I&#8217;ll visit some of those in later posts. Meanwhile I&#8217;ll let <em>Rolling Stone</em> and PMC stand as examples of bad acting by publishers that remains rampant, unstopped and almost entirely <a href="https://blogs.harvard.edu/doc/2018/07/03/without-enforcement-the-gdpr-is-a-fail/">unpunished</a>, even under these new laws.</p>
<p>I also suggest following and getting involved with the fight against the plague of data vampirism in the publishing world. These will help:</p>
<ol>
<li>Reading <a href="https://blog.zgp.org/">Don Marti&#8217;s blog</a>, where he shares expert analysis and advice on the CCPA and related matters. Also <a href="https://blogs.harvard.edu/doc/the-adblock-war/">People vs. Adtech</a>, a compilation of my own writings on the topic, going back to 2008.</li>
<li>Following what the browser makers are doing with tracking protection (alas, differently†). Shortcuts: Brave, Google&#8217;s <a href="https://duckduckgo.com/?q=chrome+tracking+protection&amp;ia=web">Chrome</a>, Ghostery&#8217;s Cliqz, Microsoft&#8217;s Edge, <a href="https://duckduckgo.com/?q=epic+browser+tracking+protection">Epic</a>, Mozilla&#8217;s <a href="https://duckduckgo.com/?q=firefox+tracking+protection">Firefox</a>.</li>
<li>Following or joining communities working to introduce safe forms of nourishment for publishers and better habits for advertisers and their agencies. Those include <a href="http://customercommons.org">Customer Commons</a>, <a href="http://me2b.us">Me2B Alliance</a>, <a href="https://mydata.org/">MyData Global</a> and <a href="http://projectvrm.org">ProjectVRM</a>.</li>
</ol>
<p>______________</p>
<p>*<a href="https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=201720180AB375">The bill (AB 375)</a>, begins,</p>
<blockquote><p>The California Constitution grants a right of privacy. Existing law provides for the confidentiality of personal information in various contexts and requires a business or person that suffers a breach of security of computerized data that includes personal information, as defined, to disclose that breach, as specified.</p>
<p>This bill would enact the California Consumer Privacy Act of 2018. Beginning January 1, 2020, the bill would grant a consumer a right to request a business to disclose the categories and specific pieces of personal information that it collects about the consumer, the categories of sources from which that information is collected, the business purposes for collecting or selling the information, and the categories of 3rd parties with which the information is shared. The bill would require a business to make disclosures about the information and the purposes for which it is used. The bill would grant a consumer the right to request deletion of personal information and would require the business to delete upon receipt of a verified request, as specified. The bill would grant a consumer a right to request that a business that sells the consumer’s personal information, or discloses it for a business purpose, disclose the categories of information that it collects and categories of information and the identity of 3rd parties to which the information was sold or disclosed&#8230;</p></blockquote>
<p>Don Marti has <a href="https://blog.zgp.org/ccpa-letter/">a draft letter</a> one might submit to the brokers and advertisers who use all that personal data. (He also tweets a caution <a href="https://twitter.com/dmarti/status/1220088259369287680">here</a>.)</p>
<p>†This will be the subject of my next post.</p>
]]></content:encoded>
			<wfw:commentRss>http://blogs.harvard.edu/doc/2020/01/22/rs/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
			<creativeCommons:license>https://creativecommons.org/licenses/by/4.0/</creativeCommons:license>
<post-id xmlns="com-wordpress:feed-additions:1">12454</post-id>	</item>
		<item>
		<title>Let&#8217;s get #deepreal</title>
		<link>http://blogs.harvard.edu/doc/2019/12/16/lets-get-deepreal/</link>
		<pubDate>Mon, 16 Dec 2019 20:35:01 +0000</pubDate>
		<dc:creator><![CDATA[Doc Searls]]></dc:creator>
				<category><![CDATA[Identity]]></category>

		<guid isPermaLink="false">http://blogs.harvard.edu/doc/?p=12383</guid>
		<description><![CDATA[Deepfakes are a big thing, and a bad one. On the big side, a Google search for deepfake brings up more than 23 billion results. On the bad side, today&#8217;s top result in a search on Twitter for the hashtag #deepfake says, &#8220;Technology is slowly killing reality. I am worried of tomorrow&#8217;s truths that will be made in [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><img class="aligncenter size-full wp-image-12384" src="http://blogs.harvard.edu/doc/files/2019/12/deepfake-deepreal.jpg" alt="" width="386" height="281" srcset="http://blogs.harvard.edu/doc/files/2019/12/deepfake-deepreal.jpg 386w, http://blogs.harvard.edu/doc/files/2019/12/deepfake-deepreal-300x218.jpg 300w" sizes="(max-width: 386px) 100vw, 386px" /></p>
<p><a href="https://en.wikipedia.org/wiki/Deepfake">Deepfakes</a> are a big thing, and a bad one.</p>
<p>On the big side, a <a href="https://www.google.com/search?&amp;q=deepfake">Google search for <em>deepfake</em></a> brings up more than 23 billion results.</p>
<p>On the bad side, today&#8217;s <a href="https://twitter.com/Abdallahsasah/status/1205956368383041537">top result</a> in a <a href="https://twitter.com/hashtag/deepfake">search on Twitter for the hashtag <em>#deepfake</em></a> says, &#8220;Technology is slowly killing reality. I am worried of tomorrow&#8217;s truths that will be made in shops. This #deepfake is bothering my soul deeply.&#8221; In another of the top results, a <em>Vice</em> report is headlined <a href="https://www.vice.com/en_us/article/9keen8/deepfake-porn-is-evolving-to-give-people-total-control-over-womens-bodies">Deepfake Porn Is Evolving to Give People Total Control Over Women&#8217;s Bodies</a>.</p>
<p>Clearly we need an antidote here.</p>
<p>I suggest <em>deepreal.</em></p>
<p>If <em>deepfake</em> lies at the bottom of the <a href="https://en.wikipedia.org/wiki/Uncanny_valley">uncanny valley</a> (as <a href="https://www.google.com/search?&amp;q=%22uncanny%20valley%22+deepfake">more than 37 thousand sites online suggest</a>), <em>deepreal</em> should be just as highly <em>out </em>of that valley. As the graphic above (<a href="https://commons.wikimedia.org/wiki/File:Wpdms_fh_uncanny_valley_3.jpg">source</a>) suggests, the deeply real (I added that) is fully human, and can elicit any level of emotional response, as real humans tend to do.</p>
<p>So what do we know that&#8217;s already <em>deepreal</em>?</p>
<p>Well, there&#8217;s reality itself, meaning the physical kind. A real person talking to you in the real world is undeniably human (at least until robots perfectly emulate human beings walking, talking and working among us, which will be icky and therefore deep in the uncanny valley). But what about the digital world? How can we be sure that a fully human being is also deeply real where the prevalent state is incorporeal—absent of physical existence?</p>
<p>The only way I know, so far, is with <a href="https://www.google.com/search?q=self+sovereign+identity">self-sovereign identity (SSI)</a> technology, which gives us standardized ways of letting others know required facts about us (e.g. &#8220;I&#8217;m over 18,&#8221; &#8220;I&#8217;m a citizen of this country,&#8221; &#8220;I have my own car insurance,&#8221; &#8220;I live in this state,&#8221; &#8220;I&#8217;m a member of this club.&#8221;) Here&#8217;s some of what I&#8217;ve written and said about SSI:</p>
<ol>
<li><a href="https://oneworldidentity.com/podcast/sovereign-identity/">The Sovereign Identity Revolution</a> (<em>OneWorldIdentity</em>, 21 February, 2017)</li>
<li><a href="https://www.linuxjournal.com/content/new-hope-digital-identity">New Hope for Digital Identity</a> (<em>Linux Journal</em>, 9 November 2017)</li>
<li><a href="http://doc.blog/2019/03/16/someThoughtsAboutSelfsovereignIdentity.html">Some Thoughts About Self-Sovereign Identity</a> (<em>doc.blog</em>, 16 March 2019)</li>
<li><a href="https://www.kuppingercole.com/blog/guest/some-perspective-on-self-sovereign-identity">Some Perspective on  Self-Sovereign Identity</a> (<em>KuppingerCole</em>, 20 April 2019)</li>
<li><a href="https://blogs.harvard.edu/doc/2019/09/19/id2020/">Thoughts at #ID2020</a> (<em>Doc Searls Weblog</em>, 19 September 2019)</li>
</ol>
<p>As I put it in #4 above, &#8220;The time has come to humanize identity in the networked world by making it as personal as it has been all along in the natural one.&#8221; I believe it is <em>only</em> by humanizing identity in the networked world that we can start to deal with deepfakes and other ways we are being dehumanized online. (And, if you&#8217;re skeptical about SSI, as are some I shouted out to <a href="https://twitter.com/dsearls/status/1206680812302655488">here</a>, what other means to you suggest? It&#8217;s still early, and the world of possibility is large.)</p>
<p>I also look forward to discussing this with real people here online—and in the physical world. Toward that, here are some identity tech gatherings coming up in 2020:</p>
<ul>
<li><a href="https://www.knowidentity.com/">KnowIdentity</a> (April 5-8, in Las Vegas)</li>
<li><a href="https://www.eic2020.de/">EIC 2020</a> (12-15 May, in Munich)</li>
<li><a href="http://iiworkshop.org">Internet Identity Workshop</a> (28-30 April and 20-22 October)</li>
<li>Others <a href="https://idpro.org/conferences">listed by IDpro</a></li>
</ul>
<p>I also look forward to playing whack-a-mole with robots faking interest in this post; and which, because I&#8217;ll succeed, you&#8217;ll not see in the comment section below. (You probably also won&#8217;t see comments by humans, because humans prefer conversational venues not hogged by robots.)</p>
]]></content:encoded>
				<creativeCommons:license>https://creativecommons.org/licenses/by/4.0/</creativeCommons:license>
<post-id xmlns="com-wordpress:feed-additions:1">12383</post-id>	</item>
		<item>
		<title>On Dion Neutra, 1926-2019</title>
		<link>http://blogs.harvard.edu/doc/2019/12/07/on-dion-neutra-1926-2019/</link>
		<pubDate>Sat, 07 Dec 2019 17:56:35 +0000</pubDate>
		<dc:creator><![CDATA[Doc Searls]]></dc:creator>
				<category><![CDATA[Architecture]]></category>
		<category><![CDATA[history]]></category>
		<category><![CDATA[Photography]]></category>

		<guid isPermaLink="false">http://blogs.harvard.edu/doc/?p=12360</guid>
		<description><![CDATA[The Los Angeles in your head is a Neutra house. You&#8217;ve seen many of them in movies, and some of them in many movies. Some of those are now gone, alas, as is the architect and preservationist who also designed, or helped design, many of the buildings that bear his surname. Dion Neutra died last week, at [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><img class="aligncenter size-large wp-image-12363" src="http://blogs.harvard.edu/doc/files/2019/12/neutras-1024x508.png" alt="" width="500" height="248" srcset="http://blogs.harvard.edu/doc/files/2019/12/neutras-1024x508.png 1024w, http://blogs.harvard.edu/doc/files/2019/12/neutras-300x149.png 300w, http://blogs.harvard.edu/doc/files/2019/12/neutras-768x381.png 768w, http://blogs.harvard.edu/doc/files/2019/12/neutras-500x248.png 500w" sizes="(max-width: 500px) 100vw, 500px" /></p>
<p>The Los Angeles in your head is a <a href="http://neutra.org">Neutra</a> house. You&#8217;ve seen <a href="https://www.google.com/search?q=neutra+houses+in+movies">many of them in movies</a>, and <a href="https://en.wikipedia.org/wiki/Lovell_House">some of them in many movies</a>. Some of those are now <a href="http://blogs.harvard.edu/doc/2019/10/31/about-face/">gone</a>, alas, as is the architect and preservationist who also designed, or helped design, many of the buildings that bear his surname. <a href="https://en.wikipedia.org/wiki/Dion_Neutra">Dion Neutra</a> died last week, at 93 years of work more than of age. <a href="https://www.google.com/search?q=dion+neutra+architect+obituary">Here is a Google search for his obituary</a>, which brings up a great many entries.</p>
<p>Dion was a good man and a good friend. Here he is in our Santa Barbara back yard a few years ago:</p>
<p><img class="aligncenter size-large wp-image-12362" src="http://blogs.harvard.edu/doc/files/2019/12/dion004-1024x768.jpg" alt="" width="500" height="375" srcset="http://blogs.harvard.edu/doc/files/2019/12/dion004-1024x768.jpg 1024w, http://blogs.harvard.edu/doc/files/2019/12/dion004-300x225.jpg 300w, http://blogs.harvard.edu/doc/files/2019/12/dion004-768x576.jpg 768w, http://blogs.harvard.edu/doc/files/2019/12/dion004-400x300.jpg 400w, http://blogs.harvard.edu/doc/files/2019/12/dion004.jpg 1152w" sizes="(max-width: 500px) 100vw, 500px" /></p>
<p>If you read Dion&#8217;s obituaries (of which <a href="https://www.latimes.com/obituaries/story/2019-11-25/dion-neutra-architect-dead">the longest and best is the LA Times&#8217;</a>), you&#8217;ll learn much about his life, work and legacy. But I know some things that don&#8217;t quite make it through those channels, so I&#8217;ll fill in a couple of those details.</p>
<p>One is that Dion was a peripatetic correspondent, mostly by email, especially via his White Light newsletter, which he sent out on a schedule that rounded to always. &#8220;White Light&#8221; meant healing energy, which was directed by Dion and his readers toward friends who might need some. There were many other topics in their midst (he could hold forth at great length on you-name-it), but health was perhaps the biggest one. Over the last few months, Dion&#8217;s letter increasingly reported on his own decline (which seemed radically at odds with his high lifelong energy level, which was invested in a great deal of golf, among other physical activities), but always also about what others were up to. The last words of his last letter, on October 24, were &#8220;Lots of love to everybody. Bye!&#8221;</p>
<p>The other is that Dion was eager to jump on the Internet, starting in the last millennium. I know this because I was the guy he asked for help putting up his first website. Which I did, at <a href="http://Neutra.org">Neutra.org</a>: a domain name I also helped him acquire. <a href="http://blogs.harvard.edu/doc/2016/05/14/help-why-dont-images-load-in-https/">Here is the first capture of it</a>, by the Internet Archive, 21 years and 1 day ago. I remember arguing with Dion about making the whole site a constant appeal to save one Neutra building or another, but that turned out to be his main work, from that point onward. He failed in some efforts, but succeeded in others. Thanks to that work, Neutra architecture and all it stands for live on.</p>
<p>Lots of love to you and what you&#8217;ve done for us all, old friend.</p>
]]></content:encoded>
				<creativeCommons:license>https://creativecommons.org/licenses/by/4.0/</creativeCommons:license>
<post-id xmlns="com-wordpress:feed-additions:1">12360</post-id>	</item>
		<item>
		<title>Here&#8217;s hoping our Age of Ageism is a brief one</title>
		<link>http://blogs.harvard.edu/doc/2019/12/03/ageism/</link>
		<pubDate>Tue, 03 Dec 2019 23:17:10 +0000</pubDate>
		<dc:creator><![CDATA[Doc Searls]]></dc:creator>
				<category><![CDATA[Digital Life]]></category>
		<category><![CDATA[Social]]></category>

		<guid isPermaLink="false">http://blogs.harvard.edu/doc/?p=12349</guid>
		<description><![CDATA[A few days ago a Twitter exchange contained an &#8220;OK Boomer&#8221; response to one of my tweets. At the time I laughed it off, tweeting back a pointer to Report: Burying, Cremating Baby Boomers To Generate $200 Trillion In GDP, which ran five years ago in The Onion. But it got me thinking that &#8220;OK [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>A few days ago a Twitter exchange contained an &#8220;OK Boomer&#8221; response to one of my tweets. At the time I laughed it off, tweeting back a pointer to <a href="https://www.theonion.com/report-burying-cremating-baby-boomers-to-generate-20-1819576216">Report: Burying, Cremating Baby Boomers To Generate $200 Trillion In GDP</a>, which ran five years ago in <em>The Onion</em>.</p>
<p>But it got me thinking that &#8220;OK Boomer&#8221; might be more—and worse—than a mere <a href="https://www.google.com/search?q=%22ok+boomer%22">meme</a>. Still, I wasn&#8217;t moved to say anything, because I had better stuff to do.</p>
<p>Then today I followed a link to <a href="https://medium.com/pulpmag/not-so-ok-boomers-86d51b7d20">Not So OK, Boomers</a>, on <em>Pulp</em>. Illustrated by Goya&#8217;s horrifying <a href="https://www.google.com/search?q=goya+saturn+devouring+his+son">Saturn Devouring His Son</a>, it ends with this:</p>
<blockquote><p>Goya’s Saturn does not swallow his children whole, but has taken chunks out of the body, chewing off the head and the limbs.</p>
<p>The cannibalism Boomers are inflicting on us appears to be closer to Goya’s vision: deranged, irreversible, and violent. Unwilling to accept a world that goes on without them, they are gluttonously consuming resources.</p>
<p>Their own lives have been extended, but without any appreciable gains in quality of life, and so in their rage, their confusion, they poison the air and water, they raise our cortisol levels.</p>
<p>What do we do with the knowledge that our parents are actively trying to harm us but are incapable of accepting the suffering they’re inflicting?</p>
<p>Our response is going to have to be better than depression memes and the odd glib, ‘OK Boomer,’ if we’re going to survive.</p></blockquote>
<p>That got 2,200 claps. So far.</p>
<p>So this time I responded, with <a href="https://medium.com/@dsearls/i-like-pulp-perhaps-because-ive-been-young-a-long-time-854ace896f3">this</a>:</p>
<blockquote><p>I like <em>Pulp</em>, perhaps because I’ve been young a long time. But this piece is worse than wrong. It’s cruel and inflammatory.</p>
<p>To see how, answer this: Is there moral difference between prejudice against a race, a gender, an ethnicity, a nationality—and a demographic? If there is, it’s one of degree, not one of kind.</p>
<p>As soon as you otherize any human category as a <em>them</em> vs. an <em>us</em>, you’re practicing the same kind of prejudice—and, at its worst, bigotry.</p>
<p>Try substituting the words “women” or “blacks” for the word “Boomers” in this piece, and you get the point.</p>
<p>Ageism may not be worse than sexism or racism, but it’s still an <em>ism</em>, good only for amplifying itself, which seems to be the purpose of this piece.</p>
<p>Read the closing paragraphs again and ask what kind of action the author calls for that would be proportional to the cannibalism he accuses Boomers of inflicting on his generation.</p>
<p>And then hope it doesn’t happen.</p></blockquote>
<p>That got 10 claps. So far.</p>
<p>But what the hell, I&#8217;ll continue.</p>
<p>If young people want to understand old people (which Boomers are, or soon will be) I suggest this: imagine that if a fifth, then a quarter, then a third, then half, and then most of the people you grew up or worked with in your life—friends, cousins, co-workers, classmates—are now dead. And that meanwhile you&#8217;re putting your useful experience and wisdom to work as best you can while you&#8217;re still able, knowing that, too soon at any age, you&#8217;ll be gone too.</p>
<p>There&#8217;s no shit you can give a person like that, sitting on the short end of life&#8217;s death row, that can measure up to their intimate familiarity with mortality, and with the work they still face, most of which they&#8217;ll never finish. So an &#8220;OK Boomer&#8221; put-down isn&#8217;t going to bother most of them.</p>
<p>But it&#8217;s still shit. Or worse.</p>
<p>We can all do better than that.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
				<creativeCommons:license>https://creativecommons.org/licenses/by/4.0/</creativeCommons:license>
<post-id xmlns="com-wordpress:feed-additions:1">12349</post-id>	</item>
		<item>
		<title>At Root an Evanescence</title>
		<link>http://blogs.harvard.edu/doc/2019/11/17/at-root-an-evanescence/</link>
		<pubDate>Sun, 17 Nov 2019 20:08:47 +0000</pubDate>
		<dc:creator><![CDATA[Doc Searls]]></dc:creator>
				<category><![CDATA[Digital Life]]></category>
		<category><![CDATA[Ideas]]></category>
		<category><![CDATA[infrastructure]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[problems]]></category>

		<guid isPermaLink="false">http://blogs.harvard.edu/doc/?p=12334</guid>
		<description><![CDATA[A Route of Evanescence, With a revolving Wheel – A Resonance of Emerald A Rush of Cochineal – And every Blossom on the Bush Adjusts it’s tumbled Head – The Mail from Tunis – probably, An easy Morning’s Ride – —Emily Dickinson (via The Poetry Foundation) While that poem is apparently about a hummingbird, it&#8217;s the [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><em><img class="alignleft size-full wp-image-12336" src="http://blogs.harvard.edu/doc/files/2019/11/emily_200x283_72dpi.png" alt="" width="200" height="283" />A Route of Evanescence,</em><br />
<em>With a revolving Wheel –</em><br />
<em>A Resonance of Emerald</em><br />
<em>A Rush of Cochineal –</em><br />
<em>And every Blossom on the Bush</em><br />
<em>Adjusts it’s tumbled Head –</em><br />
<em>The Mail from Tunis – probably,</em><br />
<em>An easy Morning’s Ride –</em></p>
<p>—Emily Dickinson<br />
(<a href="https://www.poetryfoundation.org/poems/52133/a-route-of-evanescence-1489">via <em>The Poetry Foundation</em>)</a></p>
<p>While that poem is <a href="https://www.shmoop.com/route-of-evanescence/">apparently about a hummingbird</a>, it&#8217;s the one that comes first to my mind when I contemplate the form of evanescence that&#8217;s rooted in the nature of the Internet, where all of us are here right now, as I&#8217;m writing and you&#8217;re reading this.</p>
<p>Because, let&#8217;s face it: the Internet is no more about anything &#8220;on&#8221; it than air is about noise, speech or anything at all. Like air, sunlight, gravity and other useful graces of nature, the Internet is good for whatever can be done with it.</p>
<p>Same with the Web. While the Web was born as a way to share documents at a distance (via the Internet), it was never a library, even though we borrowed the language of real estate and publishing (<em>domains</em> and <em>sites</em> with <em>pages</em> one could <em>author</em>, <em>edit</em>, <em>publish</em>, <em>syndicate</em>, <em>visit</em> and <em>browse</em>) to describe it. While the metaphorical framing in all those words suggests durability and permanence, they belie the inherently evanescent nature of all we call <em>content</em>.</p>
<p>Think about the words <em>memory</em>, <em>storage</em>, <em>upload</em>, and <em>download</em>. All suggest that <em>content </em>in digital form has substance at least resembling the physical kind. But it doesn&#8217;t. It&#8217;s a representation, in a pattern of ones and zeros, recorded on a medium for as long the responsible party wishes to keep it there, or the medium survives. All those states are volatile, and none guarantee that those ones and zeroes will last.</p>
<p>I&#8217;ve been producing digital content for the Web <a href="http://searls.com/r2.html">since the early 90s</a>, and for much of that time I was lulled into thinking of the digital tech as something at least possibly permanent. But then my son Allen pointed out a distinction between the <em>static Web</em> of purposefully durable content and <a href="https://www.google.com/search?q=doc+searls+%22the+live+web%22">what he called <em>the live Web</em></a>. That was in 2003, when blogs were just beginning to become a thing. Since then the live Web has become the main Web, and people have come to see content as writing or projections on a <a href="http://doc.blog/2019/11/10/worldWideWhiteboard.html">World Wide Whiteboard</a>. Tweets, shares, shots and posts are mostly of momentary value. Snapchat succeeded as a whiteboard where people could share &#8220;moments&#8221; that erased themselves after one view. (It does much more now, but evanescence remains its root.)</p>
<p>But, being both (relatively) old and (seriously) old-school about saving stuff that matters, I&#8217;ve been especially concerned with how we can archive, curate and preserve as much as possible of what&#8217;s produced for the digital world.</p>
<p>Last week, for example, I was involved in the effort to return <a href="http://linuxjournal.com"><em>Linux Journal</em></a> to the Web&#8217;s shelves. (The magazine and site, which lived from April 1994 to August 2019, was briefly down, and with it all my own writing there, going back to 1996. That corpus is about a third of my writing in the published world.) Earlier, when it looked like Flickr might go down, I <a href="https://medium.com/swlh/dear-adobe-please-buy-flickr-4f88dcd16ee0">worried aloud</a> about what would become of my many-dozen-thousand photos there. <a href="https://techcrunch.com/2018/04/20/smugmug-acquires-flickr/">SmugMug saved it</a> (Yay!); but there is no guarantee that<em> any</em> Website will persist forever, in any form. In fact, the way to bet is on the mortality of everything there. (Perspective: earlier today, over at <a href="http://doc.blog/">doc.blog</a>, I <a href="http://doc.blog/2019/11/17/theUniverseIsStillJustAStartup.html">posted a brief think piece about the mortality of our planet, and the youth of the Universe</a>.)</p>
<p>But the evanescent nature of digital memory shouldn&#8217;t stop us from thinking about how to take better care of what of the Net and the Web we wish to see remembered for the world. This is why it&#8217;s good to be in conversation on the topic with <a href="https://en.wikipedia.org/wiki/Brewster_Kahle">Brewster Kahle</a> (of <a href="https://archive.org">archive.org</a>), <a href="http://scripting.com">Dave Winer</a> and other like-minded folk. I welcome your thoughts as well.</p>
]]></content:encoded>
				<creativeCommons:license>https://creativecommons.org/licenses/by/4.0/</creativeCommons:license>
<post-id xmlns="com-wordpress:feed-additions:1">12334</post-id>	</item>
		<item>
		<title>About face</title>
		<link>http://blogs.harvard.edu/doc/2019/10/31/about-face/</link>
		<pubDate>Thu, 31 Oct 2019 14:28:28 +0000</pubDate>
		<dc:creator><![CDATA[Doc Searls]]></dc:creator>
				<category><![CDATA[Identity]]></category>
		<category><![CDATA[language]]></category>
		<category><![CDATA[Law]]></category>
		<category><![CDATA[Life]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[problems]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Science]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://blogs.harvard.edu/doc/?p=12276</guid>
		<description><![CDATA[We know more than we can tell. That one-liner from Michael Polanyi has been waiting half a century for a proper controversy, which it now has with facial recognition. Here&#8217;s how he explains it in The Tacit Dimension: This fact seems obvious enough; but it is not easy to say exactly what it means. Take an example. We know [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><em><img class="alignleft size-full wp-image-12311" src="http://blogs.harvard.edu/doc/files/2019/10/mpolanyi.jpg" alt="" width="171" height="220" />We know more than we can tell.</em></p>
<p>That one-liner from <a href="https://en.wikipedia.org/wiki/Michael_Polanyi">Michael Polanyi</a> has been waiting half a century for a proper controversy, which it <a href="https://en.wikipedia.org/wiki/Facial_recognition_system#Controversies">now has</a> with <em><a href="https://en.wikipedia.org/wiki/Facial_recognition_system">facial recognition</a></em>. Here&#8217;s how he explains it in <em>The Tacit Dimension</em>:</p>
<blockquote><p>This fact seems obvious enough; but it is not easy to say exactly what it means. Take an example. We know a person&#8217;s face, and can recognize it among a thousand others, indeed among a million. Yet we usually cannot tell how we recognize a face we know. So most of this knowledge cannot be put into words.</p></blockquote>
<p>Polanyi calls that kind of knowledge <em>tacit</em>. The kind we can put into words he calls <em>explicit</em>.</p>
<p>For an example of both at work, consider how, generally, we  don&#8217;t know how we will end the sentences we begin, or how we began the sentences we are ending—and how the same is true of what we hear or read from other people whose sentences we find meaningful. The explicit survives only as fragments, but the meaning of what was said persists in tacit form.</p>
<p>Likewise, if we are asked to recall and repeat, <em>verbatim</em>, a paragraph of words we have just said or heard, we will find it difficult or impossible to do so, even if we have no trouble saying exactly what was meant. This is because tacit knowing, whether kept to one&#8217;s self or told to others, survives the natural human tendency to forget particulars after a few seconds, even when we very clearly understand what we have just said or heard.</p>
<p>Tacit knowledge and <a href="https://en.wikipedia.org/wiki/Short-term_memory">short term memory</a> are both features of human knowing and communication, not bugs. Even for people with extreme gifts of memorization (e.g. actors who can learn a whole script in one pass, or mathematicians who can learn <em><span class="texhtml">pi</span></em> to 4000 decimals), what matters more than the words or the numbers are their meaning. And that meaning is both more and other than what can be said. It is deeply tacit.</p>
<p>On the other hand—the digital hand—computer knowledge is <em>only</em> explicit, meaning a computer can know <em>only</em> what it can tell. At both knowing and telling, a computer can be far more complete and detailed than a human could ever be. And the more a computer knows, the better it can tell. (To be clear, a computer doesn&#8217;t <em>know</em> a damn thing. But it does <em>remember</em>—meaning it <em>retrieves</em>—what&#8217;s in its databases, and it does <em>process</em> what it retrieves. At all those activities it is inhumanly capable.)</p>
<p>So, the more a computer learns of explicit facial details, the better it can infer conclusions about that face, including ethnicity, age, emotion, wellness (or lack of it) and much else. Given a base of data about individual faces, and of names associated with those faces, a computer programmed to be adept at facial recognition can also connect faces to names, and say &#8220;This is (whomever).&#8221;</p>
<p>For all those reasons, computers doing facial recognition are proving useful for countless purposes: unlocking phones, finding missing persons and criminals, aiding investigations, shortening queues at passport portals, reducing fraud (for example at casinos), confirming age (saying somebody is too old or not old enough), finding lost pets (which also have faces). The list is long and getting longer.</p>
<p>Yet many (or perhaps all) of those purposes are at odds with the sense of personal privacy that derives from the tacit ways we know faces, our reliance on short term memory, and our natural anonymity (literally, namelessness) among strangers. All of those are graces of civilized life in the physical world, and they are threatened by the increasingly widespread use—and uses—of facial recognition by governments, businesses, schools and each other.</p>
<p>Louis Brandeis and Samuel Warren visited the same problem more than a century ago, when they became alarmed at the implications of recording and reporting technologies that were far more primitive than the kind we have today. In response to those technologies, they wrote a landmark <em>Harvard Law Review</em> paper titled <a href="https://faculty.uml.edu/sgallagher/Brandeisprivacy.htm">The Right to Privacy</a>, which has served as a pole star of good sense ever since. Here&#8217;s an excerpt:</p>
<blockquote><p>Recent inventions and business methods call attention to the next step which must be taken for the protection of the person, and for securing to the individual what Judge Cooley calls the right &#8220;to be let alone&#8221; <a href="http://faculty.purduenc.edu/bbk/privfoot.html#10" name="10"><sup>10</sup></a> Instantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic life ; and numerous mechanical devices threaten to make good the prediction that &#8220;what is whispered in the closet shall be proclaimed from the house-tops.&#8221; For years there has been a feeling that the law must afford some remedy for the unauthorized circulation of portraits of private persons ;<a href="http://faculty.purduenc.edu/bbk/privfoot.html#11" name="11"><sup>11</sup></a> and the evil of invasion of privacy by the newspapers, long keenly felt, has been but recently discussed by an able writer.<a href="http://faculty.purduenc.edu/bbk/privfoot.html#12" name="12"><sup>12</sup></a> The alleged facts of a somewhat notorious case brought before an inferior tribunal in New York a few months ago, <a href="http://faculty.purduenc.edu/bbk/privfoot.html#13" name="13"><sup>13</sup></a> directly involved the consideration of the right of circulating portraits ; and the question whether our law will recognize and protect the right to privacy in this and in other respects must soon come before out courts for consideration.</p></blockquote>
<p>They also say the &#8220;right of the individual to be let alone&#8230;is like the right not be assaulted or beaten, the right not be imprisoned, the right not to be maliciously prosecuted, the right not to be defamed.&#8221;</p>
<p>To that list today we might also add, &#8220;the right not to be reduced to bits&#8221; or &#8220;the right not to be tracked like an animal.&#8221;</p>
<p>But it’s hard to argue for those rights in the digital world, where computers can see, hear, draw and paint exact portraits of everything: every photo we take, every word we write, every spreadsheet we assemble, every database accumulating in our hard drives—plus those of every institution we interact with, and countless ones we don’t (or do without knowing the interaction is there).</p>
<p>Facial recognition by computers is a genie that is not going back in the bottle. And there is no limit to wishes the facial recognition genie can grant the organizations that want to use it, which is why pretty much everything is being done with it. A few examples:</p>
<ul>
<li>Facebook&#8217;s <a href="https://deepface.ir/">Deep Face</a> sells facial recognition for many purposes to corporate customers. Examples from that link: &#8220;Face Detection &amp; Landmarks&#8230;Facial Analysis &amp; Attributes&#8230;Facial Expressions &amp; Emotion&#8230; Verification, Similarity &amp; Search.&#8221; This is non-trivial stuff. <a href="http://multiverseaccordingtoben.blogspot.com/2014/03/lessons-from-deep-mind-vicarious.html">Writes Ben Goertze</a>l, &#8220;Facebook has now pretty convincingly solved face recognition, via a simple convolutional neural net, dramatically scaled.&#8221;</li>
<li><a href="https://apps.apple.com/us/app/faceapp-ai-face-editor/id1180884341">FaceApp</a> can make a face look older, younger, whatever. It can even swap genders.</li>
<li>The FBI&#8217;s <a href="https://en.wikipedia.org/wiki/Next_Generation_Identification">Next Generation Identification (NGI)</a>, involves (says Wikipedia) eleven companies and the <a title="National Center for State Courts" href="https://en.wikipedia.org/wiki/National_Center_for_State_Courts">National Center for State Courts</a> (NCSC).</li>
<li>Snap has <a href="https://patents.google.com/patent/US9396354B1/en">a paten</a>t for reading emotions in faces.</li>
<li>The <a href="http://www.metadolce.com/bi2technologies-moris.html">MORIS™ Multi-Biometric Identification System</a> is &#8220;a portable handheld device and identification database system that can scan, recognize and identify individuals based on iris, facial and fingerprint recognition,&#8221; and is typically used law enforcement organizations.</li>
<li><a href="https://www.cbc.ca/news/canada/ottawa/facial-recognition-set-up-at-rideau-carleton-slots-1.1052967">Casinos in Canada are using facial recognition</a> to &#8220;help addicts bar themselves from gaming facilities.&#8221; It&#8217;s opt-in: &#8220;<u>The technology</u> relies on a method of &#8220;self-exclusion,&#8221; whereby compulsive gamblers volunteer in advance to have their photos banked in the system&#8217;s database, in case they ever get the urge to try their luck at a casino again. If that person returns in the future and the facial-recognition software detects them, security will be dispatched to ask the gambler to leave.&#8221;</li>
<li><a href="https://qz.com/1623799/facial-recognition-is-coming-to-cruise-ships/">Cruise ships are boarding passengers faster</a> using facial recognition by computers.</li>
<li><a href="https://www.nytimes.com/2019/10/29/world/australia/pornography-facial-recognition.html">Australia proposes scanning faces to see if viewers are old enough to look at porn</a>.</li>
</ul>
<p>And facial recognition systems are getting better and better at what they do. <a href="https://nvlpubs.nist.gov/nistpubs/ir/2018/NIST.IR.8238.pdf">A November 2018 NIST report on a massive study of facial recognition systems</a> begins,</p>
<blockquote><p>This report documents performance of face recognition algorithms submitted for evaluation on image datasets maintained at NIST. The algorithms implement one-to-many identification of faces appearing in two-dimensional images.</p>
<p>The primary dataset is comprised of 26.6 million reasonably well-controlled live portrait photos of 12.3 million individuals. Three smaller datasets containing more unconstrained photos are also used: 3.2 million webcam images; 2.5 million photojournalism and amateur photographer photos; and 90 thousand faces cropped from surveillance-style video clips. The report will be useful for comparison of face recognition algorithms, and assessment of absolute capability. The report details recognition accuracy for 127 algorithms from 45 developers, associating performance with participant names. The algorithms are prototypes, submitted in February and June 2018 by research and development laboratories of commercial face recognition suppliers and one university&#8230;</p>
<p>The major result of the evaluation is that massive gains in accuracy have been achieved in the last five years (2013-2018) and these far exceed improvements made in the prior period (2010-2013). While the industry gains are broad — at least 28 developers’ algorithms now outperform the most accurate algorithm from late 2013 — there remains a wide range of capabilities. With good quality portrait photos, the most accurate algorithms will find matching entries, when present, in galleries containing 12 million individuals, with error rates below 0.2%</p></blockquote>
<p>Privacy freaks (me included) would like everyone to be creeped out by this. Yet many people are cool with it to some degree, and perhaps not just because they’re acquiescing to the inevitable.</p>
<p>For example, in Barcelona, CaixaBank is rolling out facial recognition at its ATMs, <a href="https://www.finextra.com/newsarticle/33388/caixabank-rolls-out-facial-recognition-at-the-atm">claiming</a> that 70% of surveyed customers are ready to use it as an alternative to keying in a PIN, and that &#8220;66% of respondents highlighted the sense of security that comes with facial recognition.&#8221; That the bank&#8217;s facial recognition system &#8220;has the capability of capturing up to 16,000 definable points when the user&#8217;s face is presented at the screen&#8221; is presumably of little or no concern. Nor, also presumably, is the risk of  what might get done with facial data if the bank gets hacked, or changes its privacy policy, or if it gets sold and the new owner can&#8217;t resist selling or sharing facial data with others who want it, or if government bodies require it.</p>
<p>A predictable pattern for every new technology is that <em>what can be done will be done—until we see how it goes wrong and try to stop doing tha</em>t. This has been true of every technology from stone tools to nuclear power and beyond. Unlike many other new technologies, however, it is not hard to imagine ways facial recognition by computers can go wrong, especially when it already has.</p>
<p>Two examples:</p>
<ol>
<li>In June, <a href="https://www.cbp.gov/">U.S. Customs and Border Protection</a>, which relies on facial recognition and other <a href="https://en.wikipedia.org/wiki/Biometrics">biometrics</a>, revealed that <a href="https://www.washingtonpost.com/technology/2019/06/10/us-customs-border-protection-says-photos-travelers-into-out-country-were-recently-taken-data-breach/">photos of people were compromised by a cyberattack</a> on a federal subcontractor.</li>
<li>In August, researchers at <em>vpnMentor</em> <a href="https://www.vpnmentor.com/blog/report-biostar2-leak/">reported a massive data leak in BioStar 2</a>, a widely used &#8220;Web-based biometric security smart lock platform&#8221; that uses facial recognition and fingerprinting technology to identify users, was compromised. Notes the report, &#8220;Once stolen, fingerprint and facial recognition information cannot be retrieved. An individual will potentially be affected for the rest of their lives.&#8221; <em>vpnMentor</em> also had a hard time getting thrugh to company officials, so they could fix the leak.</li>
</ol>
<p>As organizations should know (but in many cases have trouble learning), the highest risks of data exposure and damage are to—</p>
<ul>
<li>the largest data sets,</li>
<li>the most complex organizations and relationships, and</li>
<li>the largest variety of existing and imaginable ways that security can be breached</li>
</ul>
<p>And let&#8217;s not discount the scary potentials at the (not very) far ends of technological progress and bad intent. <a href="https://www.youtube.com/watch?v=TlO2gcs1YvM">Killer microdrones targeted at faces, anyone</a>?</p>
<p>So it is not surprising that some large companies doing facial recognition go out of their way to keep personal data out of their systems. For example, by making facial recognition work for the company&#8217;s customers, but not for the company itself.</p>
<p>Such is the case with Apple&#8217;s late model iPhones, which feature <a href="https://en.wikipedia.org/wiki/Face_ID">FaceID</a>: a personal facial recognition system that lets a person unlock their phone with a glance. <a href="https://support.apple.com/en-us/HT208108">Says Apple</a>, &#8220;Face ID data doesn’t leave your device and is never backed up to iCloud or anywhere else.&#8221;</p>
<p>But special cases such as that one haven&#8217;t stopped push-back against <em>all</em> facial recognition. Some examples—</p>
<ul>
<li><a href="https://thepublicvoice.org/ban-facial-recognition/">The Public Voice</a>: &#8220;We the undersigned call for a moratorium on the use of facial recognition technology that enables mass surveillance.&#8221;</li>
<li><a href="https://www.fightforthefuture.org/">Fight for the Future</a>: <a href="https://www.banfacialrecognition.com/">BanFacialRecognition</a>. Self-explanatory, and with lots of organizational signatories.</li>
<li><a href="https://www.nytimes.com/2019/05/14/us/facial-recognition-ban-san-francisco.html"><em>New York Times</em></a>: &#8220;San Francisco, long at the heart of the technology revolution, took a stand against potential abuse on Tuesday by banning the use of facial recognition software by the police and other agencies. The action, which came in an 8-to-1 vote by the Board of Supervisors, makes San Francisco the first major American city to block a tool that many police forces are turning to in the search for both small-time criminal suspects and perpetrators of mass carnage.&#8221;</li>
<li>Also in the <em>Times</em>, Evan Sellinger and Woodrow Hartzhog <a href="https://www.nytimes.com/2019/10/17/opinion/facial-recognition-ban.html">write</a>, &#8220;Stopping this technology from being procured — and its attendant databases from being created — is necessary for protecting civil rights and privacy. But limiting government procurement won’t be enough. We must ban facial recognition in both public and private sectors, before we grow so dependent on it that we accept its inevitable harms as necessary for “progress.” Perhaps over time appropriate policies can be enacted that justify lifting a ban. But we doubt it.&#8221;</li>
<li><a href="https://boingboing.net/author/cory_doctorow_1">Cory Doctorow</a>&#8216;s <a href="https://boingboing.net/2019/10/20/2-out-of-3.html">Why we should ban facial recognition technology everywhere</a> is an &#8220;amen&#8221; to the Selinger &amp; Hartzhog piece.</li>
<li><a href="https://www.banfacialrecognition.com/">BanFacialRecognition.com</a> lists 37 participating organizations, including EPIC (Electronic Privacy Information Center), Daily Kos, Fight for the Future,&nbsp;<a href="http://MoveOn.org" title="http://MoveOn. " target="_blank">MoveOn.org</a>, National Lawyers Guild, Greenpeace and Tor.</li>
<li><a href="https://www.technologyreview.com/s/614362/a-facial-recognition-ban-is-coming-to-the-us-says-ai-policy-advisor/"><em>MIT Technology Revew</em> says bans are spreading in in the U.S.</a>: <span class="jsx-671803276">&#8220;<a href="https://www.technologyreview.com/s/613536/facial-recognition-ban-san-francisco-surveillance-privacy-private-corporate-interests/" target="_blank" rel="noopener">San Francisco</a> and <a href="https://www.zdnet.com/article/oakland-city-follows-san-franciscos-lead-in-banning-facial-recognition-tech/" target="_blank" rel="noopener">Oakland</a>, California, and <a href="https://www.bostonglobe.com/metro/2019/06/27/somerville-city-council-passes-facial-recognition-ban/SfaqQ7mG3DGulXonBHSCYK/story.html" target="_blank" rel="noopener">Somerville,</a> Massachusetts, have outlawed certain uses of facial recognition technology, with <a href="https://komonews.com/news/local/portland-city-council-considers-ban-on-facial-recognition-technology" target="_blank" rel="noopener">Portland</a>, Oregon, potentially soon to follow. </span><span class="jsx-671803276">That’s just the beginning, according to <a href="https://datasociety.net/people/nkonde-mutale/" target="_blank" rel="noopener">Mutale Nkonde</a>, a Harvard fellow and AI policy advisor. That trend will soon spread to states, and there will eventually be a federal ban on some uses of the technology, she said at MIT Technology Review’s <a href="https://events.technologyreview.com/emtech/" target="_blank" rel="noopener">EmTech</a> conference.&#8221;<br />
</span></li>
<li>Ban Facial Recognition</li>
</ul>
<p><span class="jsx-671803276">Irony alert: the black banner atop that last story says, &#8220;We use cookies to offer you a better browsing experience, analyze site traffic, personalize content, and serve targeted advertisements.&#8221; <a href="https://www.nytimes.com/2019/10/22/opinion/trump-privacy-2020.html">Notes</a> the <em>Times</em>&#8216; <a href="https://www.nytimes.com/by/charlie-warzel">Charlie Warzel</a>, &#8220;Devoted readers of the <a href="https://www.nytimes.com/series/new-york-times-privacy-project">Privacy Project</a> will remember mobile advertising IDs as an easy way to de-anonymize extremely personal information, such as <span class="glossary-wrapper"><span class="glossary-text">location data.&#8221; Well, advertising IDs are among the many trackers that both <em>MIT Technology Review</em> and <em>The New York Times</em> inject in readers&#8217; browsers with every visit. (<a href="http://blogs.harvard.edu/doc/the-adblock-war/">Bonus link</a>.)</span></span></span></p>
<p>My own position on all this is provisional, because I’m still learning and there’s a lot to take in. But here goes:</p>
<div>
<p><i>The only entities that should be able to recognize people’s faces are other people. And maybe their pets. But not machines.</i></p>
<p>However, given the unlkelihood that the facial recognition genie will ever go back in its bottle, I&#8217;ll suggest a few rules for entities using computers to do facial recognition. All these are provisional as well:</p>
</div>
<ol>
<li>People should have their own forms of facial recognition, for example to unlock phones or to sort through old photos<em>. But, </em>the data they gather should not be shared with the company providing the facial recognition software (unless it&#8217;s just of their own face, and then only for the safest possible diagnostic or service improvement purposes).</li>
<li>Facial recognition used to detect changing facial characteristics (such as emotions, age or wellness) should be required to forget what they see, right after the job is done, and not use the data gathered for any purpose other than diagnostics or performance improvement.</li>
<li>For persons having their faces recognized, sharing data for diagnostic or performance improvement purposes should be opt-in, with data anonymized and made as auditable as possible, by individuals and/or their intermediaries.</li>
<li>For enterprises with systems that know individuals&#8217; (customers&#8217; or consumers&#8217;) faces, don&#8217;t use those faces to track or find those individuals elsewhere in the online or offline worlds—again, unless those individuals have opted in to the practice.</li>
</ol>
<p>I suspect that Polanyi would agree with those.</p>
<p>But my heart is with Walt Whitman, whose <em>Song of Myself</em> argued against the dehumanizing nature of mechanization at the dawn of the industrial age. <a href="http://searls.com/whitman.html">Wrote Walt</a>,</p>
<blockquote><p>Encompass worlds but never try to encompass me.<br />
I crowd your noisiest talk by looking toward you.</p>
<p>Writing and talk do not prove me.I carry the plenum of proof and everything else in my face.<br />
With the hush of my lips I confound the topmost skeptic&#8230;</p>
<p>Do I contradict myself?<br />
Very well then. I contradict myself.<br />
I am large. I contain multitudes.</p>
<p>The spotted hawk swoops by and accuses me.<br />
He complains of my gab and my loitering.</p>
<p>I too am not a bit tamed. I too am untranslatable.<br />
I sound my barbaric yawp over the roofs of the world.</p></blockquote>
<p>The barbaric yawps by human hawks say five words, very explicitly:</p>
<p><em>Get out of my face.</em></p>
<p>And they yawp those words in spite of the sad fact that obeying them may prove impossible.</p>
<p>[Later bonus links&#8230;]</p>
<ul>
<li><a href="https://www.washingtonpost.com/technology/2019/06/10/your-face-is-now-your-boarding-pass-thats-problem/">Your face is now your boarding pass, and that&#8217;s a problem</a>. (<em>Washington Post)</em></li>
</ul>
<p>&nbsp;</p>
]]></content:encoded>
				<creativeCommons:license>https://creativecommons.org/licenses/by/4.0/</creativeCommons:license>
<post-id xmlns="com-wordpress:feed-additions:1">12276</post-id>	</item>
		<item>
		<title>Coming up on 21 years of Cluetrain</title>
		<link>http://blogs.harvard.edu/doc/2019/10/16/on-21-years-of-cluetrain/</link>
		<pubDate>Thu, 17 Oct 2019 01:33:19 +0000</pubDate>
		<dc:creator><![CDATA[Doc Searls]]></dc:creator>
				<category><![CDATA[Cluetrain]]></category>

		<guid isPermaLink="false">http://blogs.harvard.edu/doc/?p=12267</guid>
		<description><![CDATA[I posted this Cluetrain retrospective at doc.blog last year. I&#8217;m putting it here now because it&#8217;s timely again. Dig: 1) The original site and book are online in full at http://cluetrain.com and http://cluetrain.com/book 2) The 10th anniversary edition has new chapters by the four original authors, plus additional ones by JP Rangaswami, Dan Gillmor and Jake McKee. 3) David Weinberger and I posted an addendum to [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>I posted this <a href="https://en.wikipedia.org/wiki/The_Cluetrain_Manifesto">Cluetrain</a> retrospective at <a href="http://doc.blog">doc.blog</a> last year. I&#8217;m putting it here now because it&#8217;s timely again. <a href="http://cluetrain.com"><img src="http://blogs.harvard.edu/doc/files/2019/03/cluetrain-778476.jpg" alt="cluetrain cover" width="30%" height="image" align="right" /></a>Dig:</p>
<p>1) The original site and book are online in full at <a href="http://cluetrain.com/">http://cluetrain.com</a> and <a href="http://cluetrain.com/book">http://cluetrain.com/book</a></p>
<p>2) The <a href="https://www.amazon.com/Cluetrain-Manifesto-10th-Anniversary/dp/0465024092/">10th anniversary edition</a> has new chapters by the four original authors, plus additional ones by <a href="https://twitter.com/jobsworth">JP Rangaswami</a>, <a href="http://dangillmor.com/">Dan Gillmor</a> and <a href="http://communityguy.com/">Jake McKee</a>.</p>
<p>3) <a href="https://twitter.com/dweinberger?">David Weinberger</a> and I posted an addendum to Cluetrain in 2015 called New Clues: <a href="http://cluetrain.com/newclues">http://cluetrain.com/newclues</a></p>
<p>4) The word &#8220;cluetrain&#8221; is more or less constantly mentioned on Twitter: <a href="https://twitter.com/search?q=cluetrain">https://twitter.com/search?q=cluetrain</a></p>
<p>5) A search in Google books <a href="https://www.google.com/search?tbm=bks&amp;q=cluetrain">https://www.google.com/search?tbm=bks&amp;q=cluetrain</a> brings up more than 13,000 results, almost nineteen years after the original was published.</p>
<p>6) A search in Google Scholar <a href="https://scholar.google.com/scholar?en&amp;q=cluetrain">https://scholar.google.com/scholar?en&amp;q=cluetrain</a> brings up more than 4,000 results.</p>
<p>7) A dig through old emails just turned up the earliest evidence  (at least to me) of Cluetrain&#8217;s inception: a draft of a joint JOHO (David Weinberger&#8217;s email list) and EGR (Chris Locke&#8217;s list) posting, vetted for input by yours truly. This was when the three of us were first sharing the co-thinkings that became Cluetrain in early 1999. That email is dated 30 October 1998, meaning that more than two decades have passed since this thing started.</p>
]]></content:encoded>
				<creativeCommons:license>https://creativecommons.org/licenses/by/4.0/</creativeCommons:license>
<post-id xmlns="com-wordpress:feed-additions:1">12267</post-id>	</item>
		<item>
		<title>Lost and found stories</title>
		<link>http://blogs.harvard.edu/doc/2019/09/24/lost/</link>
		<comments>http://blogs.harvard.edu/doc/2019/09/24/lost/#comments</comments>
		<pubDate>Tue, 24 Sep 2019 14:04:55 +0000</pubDate>
		<dc:creator><![CDATA[Doc Searls]]></dc:creator>
				<category><![CDATA[Journalism]]></category>

		<guid isPermaLink="false">http://blogs.harvard.edu/doc/?p=12242</guid>
		<description><![CDATA[A few weeks ago, in Where journalism fails, I wrote about how journalism, for all its high-minded (and essential) purposes, is still interested only in stories. I explained that stories have just three requirements—character, problem, and movement—and that, by focusing on those three requirements alone, journalism excludes a boundless volume of facts, many of which actually matter. [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><a href="https://www.flickr.com/photos/docsearls/5212424474/in/album-72157647843130781/"><img class="aligncenter size-full wp-image-12419" src="http://blogs.harvard.edu/doc/files/2019/09/HenryEnglert-daughters.jpg" alt="" width="640" height="633" srcset="http://blogs.harvard.edu/doc/files/2019/09/HenryEnglert-daughters.jpg 640w, http://blogs.harvard.edu/doc/files/2019/09/HenryEnglert-daughters-300x297.jpg 300w, http://blogs.harvard.edu/doc/files/2019/09/HenryEnglert-daughters-303x300.jpg 303w" sizes="(max-width: 640px) 100vw, 640px" /></a></p>
<p>A few weeks ago, in <a href="https://blogs.harvard.edu/doc/2019/07/23/where-journalism-fails/">Where journalism fails</a>, I wrote about how journalism, for all its high-minded (and essential) purposes, is still interested only in stories. I explained that stories have just three requirements—<em>character</em>, <em>problem</em>, and <em>movement—</em>and that, by focusing on those three requirements alone, journalism excludes a boundless volume of facts, many of which actually matter. I also point out that story-telling is vulnerable to manipulation by experts at feeding journalism&#8217;s appetites.</p>
<p>In this post my focus is on the near-infinite abundance of stories that have never been told, have been forgotten, or both, but some of which might still matter to somebody, or to the world.</p>
<p>You&#8217;ll find pointers to billions of those in cemeteries. Every headstone marks the absence of countless stories as lost and buried as the graves&#8217; occupants. All the long-buried were characters in their own lives&#8217; stories, and within each of those lives were countless other stories. But the characters in those stories are gone, their problems are over, and movement has ceased. All have been, or will soon be, erased by time and growing disinterests of the living—even of surviving friends and heirs.</p>
<p>So I want to surface a few stories of deceased ancestors and relatives of my own, whose bodies are among the 300,000+ occupants of just one cemetery: <a href="https://en.wikipedia.org/wiki/Woodlawn_Cemetery_(Bronx,_New_York)">Woodlawn</a>, in The Bronx, New York. We&#8217;ll start with my great-grandfather, <a href="https://www.flickr.com/photos/docsearls/424049669/in/album-72157647843130781/">Henry Roman Englert</a>. <span style="font-size: 18.24px">That&#8217;s him with his first four daughters, above. Clockwise from top left are Loretto (&#8220;Loretta&#8221;), Regina (&#8220;Gene&#8221;), Ethel (my grandma Searls), and Florence. Here&#8217;s Henry as a younger man:</span></p>
<p><a href="https://www.flickr.com/photos/docsearls/424061453/in/album-72157647843130781/"><img class="aligncenter size-full wp-image-12111" src="http://blogs.harvard.edu/doc/files/2019/07/424061453_d020dca123_z.jpg" alt="" width="457" height="640" srcset="http://blogs.harvard.edu/doc/files/2019/07/424061453_d020dca123_z.jpg 457w, http://blogs.harvard.edu/doc/files/2019/07/424061453_d020dca123_z-214x300.jpg 214w" sizes="(max-width: 457px) 100vw, 457px" /></a></p>
<p>Here are the same four girls in the top picture, at the Jersey shore in 1953, ten years after Henry died:</p>
<p><a href="https://www.flickr.com/photos/docsearls/5212836913/in/album-72157625369496438/"><img class="aligncenter size-full wp-image-12425" src="http://blogs.harvard.edu/doc/files/2019/09/5212836913_d34a32ef94_z.jpg" alt="" width="640" height="403" srcset="http://blogs.harvard.edu/doc/files/2019/09/5212836913_d34a32ef94_z.jpg 640w, http://blogs.harvard.edu/doc/files/2019/09/5212836913_d34a32ef94_z-300x189.jpg 300w, http://blogs.harvard.edu/doc/files/2019/09/5212836913_d34a32ef94_z-476x300.jpg 476w" sizes="(max-width: 640px) 100vw, 640px" /></a></p>
<p>All those ladies lived long full lives. The longest was Grandma (second from right), who made it to a few days short of 108.</p>
<p>Here&#8217;s henry his granddaughter, Grace (née Searls) Apgar, my father&#8217;s sister, ten years before that:</p>
<p><a href="https://www.flickr.com/photos/docsearls/5219445439/in/album-72157647843130781/"><img class="aligncenter size-full wp-image-12420" src="http://blogs.harvard.edu/doc/files/2019/09/5219445439_bab20114e2_c.jpg" alt="" width="577" height="800" srcset="http://blogs.harvard.edu/doc/files/2019/09/5219445439_bab20114e2_c.jpg 577w, http://blogs.harvard.edu/doc/files/2019/09/5219445439_bab20114e2_c-216x300.jpg 216w" sizes="(max-width: 577px) 100vw, 577px" /></a></p>
<p><span style="font-size: 18.24px">And here is his headstone, placed ten years after the shot above:</span></p>
<p><a href="https://www.flickr.com/photos/docsearls/424049669/in/album-72157647843130781/"><img class="aligncenter size-full wp-image-12104" src="http://blogs.harvard.edu/doc/files/2019/07/hre.jpg" alt="Henry R. Englert headstone" width="70%" height="image" srcset="http://blogs.harvard.edu/doc/files/2019/07/hre.jpg 638w, http://blogs.harvard.edu/doc/files/2019/07/hre-300x171.jpg 300w, http://blogs.harvard.edu/doc/files/2019/07/hre-500x285.jpg 500w" sizes="(max-width: 638px) 100vw, 638px" /></a></p>
<p><a href="https://blogs.harvard.edu/doc/2014/01/13/close-to-home/">Some biography</a>:</p>
<blockquote><p>Henry was a fastidious dude, meaning highly disciplinary as well as disciplined. Grandma told a story about how her father, on arriving home from work, would summon <a href="http://www.flickr.com/photos/docsearls/5212424474/in/set-72157625369496438">his four daughters</a> (of which she was one) to appear and stand in a row&#8230; He would then run his white glove over some horizontal surface and wipe it on a white shoulder of a daughter’s dress, expecting no dust to leave a mark on either glove or girl.</p>
<p>Henry was the son of German immigrants: <a href="http://www.flickr.com/photos/docsearls/179573983/in/set-72157625369496438">Christian Englert and Jacobina Rung</a>, both of Alsace, then of Bavaria and now part of France. They were brewers, and had a tavern on the east side of Manhattan on 110th Street. (Though <a href="https://www.flickr.com/photos/docsearls/15117926380/in/album-72157647834282691/">an 1870 census page</a> calls Christian a &#8220;laborer.&#8221;) Jacobina was a <a href="http://en.wikipedia.org/wiki/Secular_Order_of_Discalced_Carmelites">Third Order Carmelite</a> nun, and was buried in its brown robes. Both were born in 1825. Christian is said to have died in 1886 while picking hops in Utica. Jacobina died in 1904.</p></blockquote>
<p>Here&#8217;s more:</p>
<ol>
<li>Henry was sometimes called &#8220;HRE.&#8221;</li>
<li>He headed (or was said to have headed) the Steel and Copper Plate Engravers Union in New York—and was put out of business by mechanization, like many others in his trade. I don&#8217;t know what else he did after that. Perhaps he lived off savings.</li>
<li>He was what his daughter (<a href="https://www.flickr.com/photos/docsearls/5220039836/in/album-72157628006153691/">my grandma</a>) called a &#8220;good socialist.&#8221;</li>
<li>He had at least seven daughters and one son (<a href="https://www.flickr.com/photos/docsearls/424060717/in/album-72157647843130781/">Henry Jr., known as Harry</a>, who died at age four).</li>
<li>He was married twice, and outlived both his wives and three of his kids, all by long margins.</li>
<li>His second wife, Teresa, was (again, by lore) both an alcoholic and kinda crazy. Still, she produced several children.</li>
<li>It was said that he died after having his first dentistry—a tooth pulled, at age 87. I don&#8217;t know if that was correct, but it&#8217;s one story about him.</li>
<li>He rarely visited the families of children by his first wife: the Knoebels (by daughter Regina, known as Gene), the Searls (by daughter Ethel, my grandma) or the Dwyers (by daughter Florence), though there seem to be plenty of pictures of him with those families.</li>
<li>Nobody alive can say why the graves of the wives and kids buried with him are unmarked, or why Henry&#8217;s is the only headstone. Here&#8217;s some detail on who lies where in his plot:</li>
</ol>
<p><a href="https://www.flickr.com/photos/docsearls/15095589240/in/album-72157647843130781/"><img class="aligncenter size-full wp-image-12105" src="http://blogs.harvard.edu/doc/files/2019/07/hre-wife-kids.jpg" alt="Henry Roman Englert, wives and kids" width="70%" height="image" srcset="http://blogs.harvard.edu/doc/files/2019/07/hre-wife-kids.jpg 800w, http://blogs.harvard.edu/doc/files/2019/07/hre-wife-kids-300x135.jpg 300w, http://blogs.harvard.edu/doc/files/2019/07/hre-wife-kids-768x345.jpg 768w, http://blogs.harvard.edu/doc/files/2019/07/hre-wife-kids-500x224.jpg 500w" sizes="(max-width: 800px) 100vw, 800px" /></a></p>
<p>My grandmother and her sisters used to take their families on picnic trips to this plot when it was unmarked. Why did they not mark it before Henry died? Nobody who knew is alive to say.</p>
<p>About 80 feet away is an older three-grave plot occupied by Henry&#8217;s parents, plus one of his brothers and three cousins and in-laws named Fehn*<span style="font-size: 18.24px">:</span></p>
<p><a href="https://www.flickr.com/photos/docsearls/15281901832/in/album-72157647834282691/"><img class="aligncenter size-full wp-image-12408" src="http://blogs.harvard.edu/doc/files/2019/09/15281901832_1bb39aae72_o.jpg" alt="" width="640" height="642" srcset="http://blogs.harvard.edu/doc/files/2019/09/15281901832_1bb39aae72_o.jpg 640w, http://blogs.harvard.edu/doc/files/2019/09/15281901832_1bb39aae72_o-150x150.jpg 150w, http://blogs.harvard.edu/doc/files/2019/09/15281901832_1bb39aae72_o-300x300.jpg 300w, http://blogs.harvard.edu/doc/files/2019/09/15281901832_1bb39aae72_o-299x300.jpg 299w" sizes="(max-width: 640px) 100vw, 640px" /></a></p>
<p>Woodlawn&#8217;s own records say this about the distribution of the graves and their occupants</p>
<p>Left:</p>
<ol>
<li>Theresa M. Fen, 10 mos 8/2/1887</li>
<li>Agnes Fen, 1 yr</li>
</ol>
<p>Center:</p>
<ol>
<li>Annie T. Englert, 29 yrs, 4/12/1881 Bellview Hosp. NYC</li>
<li>Christian Englert, 60 yrs, 10/4/1886, 16 Devereux St. Utica, NY</li>
<li>Jacobina Englert, 78 yrs &amp; 7&#8242; deep, 3/1/04 110 e. 106th St. NYC</li>
</ol>
<p>Right:</p>
<ol>
<li>Christian P. Englert, 33 yrs 4/12/1891 Bellview Hosp. NYC</li>
<li>Henry W. Fehn, 85 yrs 10/23/1948 Am Vet</li>
</ol>
<p>A <em>hmm</em> here: to bury Jacobina 7 feet deep,  they surely would have had to dig past her husband (dead 18 years) and daughter (dead 23 years), and to have encountered bones along the way. I can say that, because I&#8217;ve <a href="https://www.flickr.com/photos/docsearls/albums/72157712497604518">seen evidence</a>—</p>
<p><a href="https://www.flickr.com/photos/docsearls/albums/72157712497604518"><img class="aligncenter size-full wp-image-12436" src="http://blogs.harvard.edu/doc/files/2019/09/49323193936_51df71ec0c_z.jpg" alt="" width="640" height="427" srcset="http://blogs.harvard.edu/doc/files/2019/09/49323193936_51df71ec0c_z.jpg 640w, http://blogs.harvard.edu/doc/files/2019/09/49323193936_51df71ec0c_z-300x200.jpg 300w, http://blogs.harvard.edu/doc/files/2019/09/49323193936_51df71ec0c_z-450x300.jpg 450w" sizes="(max-width: 640px) 100vw, 640px" /></a></p>
<p>—that bones survive well in glacial till (about which more later). So I suspect that this three-person grave is seven feet deep, with the final occupant stacked on top.</p>
<p>Also, since Jacobina was a Carmelite nun, I call her &#8220;Nun of the Below.&#8221;</p>
<p>Further digging of the research kind, done my my aunt Katherine (née Dwyer) Burns (daughter of Florence Englert), turns up an 1870 census page that says this about the Englert family at that time:</p>
<ol>
<li>Christian, from Bavaria, a laborer, age 45</li>
<li>Jacobina, from Bavaria, &#8220;keeps houses,&#8221; age 45</li>
<li>Henry, &#8220;(illegible) engraver,&#8221; age 15</li>
<li>Christian, age 12</li>
<li>Annie, age 9</li>
<li>Mary, age 7*</li>
<li>Andrew, age 4</li>
</ol>
<p>*Mary, I gather, married a Fehn. <a href="https://www.flickr.com/photos/docsearls/424057605/in/album-72157625369496438/">Here&#8217;s a clue</a>. [Later&#8230;] Ah! I found <a href="https://www.myheritage.com/names/mary_englert">a better one</a>:</p>
<h3><em>Mary A Fehn (born Englert), 1863 &#8211; 1957</em></h3>
<ul>
<li><em>Mary, A Fehn was born on <a href="https://www.myheritage.com/names/mary_englert#">month</a> <a href="https://www.myheritage.com/names/mary_englert#">day</a> 1863, at <a href="https://www.myheritage.com/names/mary_englert#">birth place</a>, New York, to Christian Englert and Jacobina Englert</em></li>
<li><em>Mary had 4 siblings: Henry Roman Englert and <a href="https://www.myheritage.com/names/mary_englert#">3 other siblings</a>.</em></li>
<li><em>Mary married Henry Fehn circa 1885, at age 21 at <a href="https://www.myheritage.com/names/mary_englert#">marriage place</a>, New York.</em></li>
<li><em>They had 5 children: Agnes Fehn, Therese Fehn and <a href="https://www.myheritage.com/names/mary_englert#">3 other children</a>.</em></li>
<li><em>Mary passed away on <a href="https://www.myheritage.com/names/mary_englert#">month</a> <a href="https://www.myheritage.com/names/mary_englert#">day</a> 1957, at age 94 at <a href="https://www.myheritage.com/names/mary_englert#">death place</a>, New York.</em></li>
</ul>
<p>(This is from&nbsp;<a href="http://Geni.com" title="http://Geni. " target="_blank">Geni.com</a>, which wants money to reveal details at those links.)</p>
<p>Mostly I&#8217;m impressed that, among Christian and Jacobina&#8217;s kids, Mary and Henry alone lived long lives.</p>
<p>Here are <a href="https://www.flickr.com/photos/docsearls/179573983/in/set-72157625369496438">Christian and Jacobina</a>, in life, perhaps around the time of the 1870 census:</p>
<p><a href="https://www.flickr.com/photos/docsearls/179573983/in/album-72157647843130781/"><img class="aligncenter size-full wp-image-12421" src="http://blogs.harvard.edu/doc/files/2019/09/179573983_89b97a065c_o.jpg" alt="" width="347" height="524" srcset="http://blogs.harvard.edu/doc/files/2019/09/179573983_89b97a065c_o.jpg 347w, http://blogs.harvard.edu/doc/files/2019/09/179573983_89b97a065c_o-199x300.jpg 199w" sizes="(max-width: 347px) 100vw, 347px" /></a></p>
<p>And here are their three sons, with Henry&#8217;s first three daughters, the future Grandma Searls on the right:</p>
<p><a href="https://www.flickr.com/photos/docsearls/3503903269/in/album-72157647843130781/"><img class="aligncenter size-large wp-image-12423" src="http://blogs.harvard.edu/doc/files/2019/09/3503903269_4e62be83e3_b-1024x914.jpg" alt="" width="500" height="446" srcset="http://blogs.harvard.edu/doc/files/2019/09/3503903269_4e62be83e3_b.jpg 1024w, http://blogs.harvard.edu/doc/files/2019/09/3503903269_4e62be83e3_b-300x268.jpg 300w, http://blogs.harvard.edu/doc/files/2019/09/3503903269_4e62be83e3_b-768x686.jpg 768w, http://blogs.harvard.edu/doc/files/2019/09/3503903269_4e62be83e3_b-336x300.jpg 336w" sizes="(max-width: 500px) 100vw, 500px" /></a></p>
<p>There are differences between the caption I wrote under <a href="https://www.flickr.com/photos/docsearls/3503903269/in/album-72157647843130781/">that photo</a> eight years ago (based on what I knew, or thought I knew, at the time), Grace&#8217;s comment below it, posted when she was 100 years old. (Grace rocked. <a href="https://www.flickr.com/photos/docsearls/albums/72157638427867624">Here&#8217;s her 100th birthday party</a>, in Maine.) In that comment, Grace says she thinks the one on the left is Andrew, and the one in the middle is Christopher, by which I&#8217;m sure she means Christian (the younger). Both died not long after this photo was taken. Not clear whether Christian or Andrew was the one who died of a terminal cold acquired while working in a frozen food warehouse or something.</p>
<p>While he&#8217;s not in the Englert plot above, he <em>is</em> in an unmarked one nearby, which Woodlawn identifies <a href="https://www.flickr.com/photos/docsearls/15117926010">thus</a>:</p>
<ol>
<li>Andrew J. Englert, 35 yrs, 5/29/1901</li>
<li>Annie C. Englert, 67 yrs, 11/17/1935</li>
</ol>
<p>I suppose, since his sister Annie (named Anna) is buried with her parents and brother Christian (among various Fehns), that she was Andrew&#8217;s wife. <a href="https://www.flickr.com/photos/docsearls/31075883801">Here is a shot of that grave</a>.</p>
<p>And <a href="https://www.flickr.com/photos/docsearls/31189952845">here</a> is a Google Earth GPS trace of a visit to all three gravesites: Henry at B, his parents Christian and Jacobina + sibs Anna (Annie) and Christian at A, and Andrew + (wife?) Annie at C:</p>
<p><a href="https://www.flickr.com/photos/docsearls/31189952845"><img class="aligncenter size-full wp-image-12429" src="http://blogs.harvard.edu/doc/files/2019/09/31189952845_bebba95aed.jpg" alt="" width="500" height="373" srcset="http://blogs.harvard.edu/doc/files/2019/09/31189952845_bebba95aed.jpg 500w, http://blogs.harvard.edu/doc/files/2019/09/31189952845_bebba95aed-300x224.jpg 300w, http://blogs.harvard.edu/doc/files/2019/09/31189952845_bebba95aed-402x300.jpg 402w" sizes="(max-width: 500px) 100vw, 500px" /></a></p>
<p>At D in that shot is a <a href="https://www.flickr.com/photos/docsearls/30382997943/in/album-72157676969158235/">collection of headstones</a> for New York&#8217;s <a href="Association for the Relief of Respectable, Aged and Indigent Females" rel="noreferrer nofollow">Association for the Relief of Respectable Aged Indigent Females</a>, which occupied a beautiful Victorian gothic building in Harlem that is now home to a youth hostel. The Wikipedia entry at the last link fails to mention the cemetery. (I should correct that.)</p>
<p>Last is the <a href="https://www.flickr.com/photos/docsearls/albums/72157712639379466">Knoebel plot</a>, nearby. Bigger than any of the Englert plots, it is first in a way, because Regina Knoebel was the Eldest of Henry Englert&#8217;s many children. It looks like this:</p>
<p><a href="https://www.flickr.com/photos/docsearls/albums/72157712639379466"><img class="aligncenter size-full wp-image-12438" src="http://blogs.harvard.edu/doc/files/2019/09/knoebel-plot.jpg" alt="" width="640" height="427" srcset="http://blogs.harvard.edu/doc/files/2019/09/knoebel-plot.jpg 640w, http://blogs.harvard.edu/doc/files/2019/09/knoebel-plot-300x200.jpg 300w, http://blogs.harvard.edu/doc/files/2019/09/knoebel-plot-450x300.jpg 450w" sizes="(max-width: 640px) 100vw, 640px" /></a></p>
<p>From the caption under that photo:</p>
<blockquote><p>The six-grave, twelve-body Knoebel plot is described by Woodlawn Cemetery <a href="https://www.flickr.com/photos/docsearls/15304278162/in/album-72157647834282691/">here</a>. Since the descriptions of those graves that don&#8217;t quite agree with some of the headstones (for example, with spellings), I&#8217;ve combined the two in the description below.</p>
<p>First, behind the main monument are three graves. Left to right, they are—</p>
<p>1<br />
Lillian (Lillie) Raichle, 1876-3/3/1958, 81 years<br />
Lillian W. Raichle, 1902-1907, 5 years<br />
Herman Raichle, 1877-1933</p>
<p>2<br />
Sarah Bladen, 1864 to 1926, 61 years</p>
<p>3<br />
Henry Vier, 8 years<br />
Rita P. Knoebel, 81 years, 2/15/92</p>
<p>All three have headstones.</p>
<p>In front of the monument are three more graves, left to right, those are:</p>
<p>4<br />
John E. Knoebel, 78 years 9/4/50<br />
John E. Knoebel, 84 years, 12/25/2000<br />
Regina Knoebel, 80 years, 1/6/1960, exhumed on 10/7/70 and reburied in Fairview Cemetery in New Jersey</p>
<p>5<br />
John E. Knoebel, 61 years</p>
<p>6<br />
Louis F. Knoebel, 50 years, 11/11/2013<br />
Anastasia Knoebel, 60 years</p>
<p>Note that grave 4 is a bit sunken. This is the one from which Regina (née Englert) Knoebel (Aunt Gene), who was married to one of the John E. (&#8220;Johnny&#8221;) Knoebels, and whose son John E. was, apparently, buried in her stead.</p>
<p>A story I recall about Aunt Gene is almost certainly apocryphal, but still interesting, is that she once climbed a spire of rock in New Jersey&#8217;s Palisades and carved her initials, &#8220;RE,&#8221; near the top—and that these were later visible from the George Washington Bridge, because it was built right next to the spire. (On the North side.)</p>
<p>Lending credence to this story is an absent fear of heights that runs in my father&#8217;s family (his mom was Gene&#8217;s younger sister Ethel). Pop also grew up on the Palisades and was a cable rigger working on the Bridge itself. (<a href="https://www.flickr.com/photos/docsearls/2676599606">Here he is</a>.) And I do at least recall Aunt Gene as the most alpha (being the eldest) of the four Englert sisters; so it kinda seemed in character that she might do such a thing. But &#8230; I have no idea. I&#8217;ve been by there many times since then, and the whole face of the Palisades is so overrun with greenery now that it&#8217;s hard to tell if a spire is even there. I do recall that there was one, though.</p></blockquote>
<p>Yet the sad but true summary of all this is that today none of these people matter much to anybody, even though most or all of them mattered to others a great deal when they were alive. Living relatives, including me, are all way too busy with stories of their own, and long since past caring much, if at all, about any of the departed here.</p>
<p>A measure of caring about the preservation of graves at Woodlawn is whether or not the headstone is &#8220;endowed,&#8221; meaning maintained in its original upright and above-ground condition. The elder Englerts&#8217; stone, as we see in the shot above, is endowed. Henry&#8217;s, I suppose, is not, but appears to be holding up. So far.</p>
<p><span style="font-size: 18.24px">Many of those not endowed are sinking into the Earth. See the examples </span><a style="font-size: 18.24px" href="https://www.flickr.com/photos/docsearls/15117871729/in/album-72157647834282691/">here</a><span style="font-size: 18.24px">, </span><a style="font-size: 18.24px" href="https://www.flickr.com/photos/docsearls/15117869609/in/album-72157647834282691/">here</a><span style="font-size: 18.24px"> and </span><a style="font-size: 18.24px" href="https://www.flickr.com/photos/docsearls/15301491541/in/album-72157647834282691/">here</a><span style="font-size: 18.24px">. The last of those is this:</span></p>
<p><img class="aligncenter size-full wp-image-12409" src="http://blogs.harvard.edu/doc/files/2019/09/15301491541_282482b424_w.jpg" alt="" width="400" height="267" srcset="http://blogs.harvard.edu/doc/files/2019/09/15301491541_282482b424_w.jpg 400w, http://blogs.harvard.edu/doc/files/2019/09/15301491541_282482b424_w-300x200.jpg 300w" sizes="(max-width: 400px) 100vw, 400px" /></p>
<p>The gravestone business calls its products <a href="https://www.usnews.com/news/best-states/articles/2018-05-17/a-dying-industry-memorial-makers-want-to-avoid-that">memorials</a>, <a href="https://www.google.com/search?&amp;q=memorial+definition">defined</a> as &#8220;something, especially a structure, established to remind people of a person or event.&#8221; The headstone above may have reminded some people a century ago of Henry Kremer and his infant namesake, but today I find nothing about either online. And soon this stone, like so many others around it, will be buried no less than the graves they once marked, simply because most of Woodlawn, like much of New York City itself, is barely settled glacial till, and so soft you can dig it with a spoon. (In fact, <a href="https://www.nytimes.com/2018/06/05/science/how-the-ice-age-shaped-new-york.html">New York&#8217;s glacial history</a> is far more interesting today than the lives of nearly all the inhabitants of its cemeteries. That&#8217;s why it makes the great story at that last link.)</p>
<p><a href="https://www.google.com/search?q=archeology">Archeology</a> is &#8220;the study of human history and prehistory through the excavation of sites and the analysis of artifacts and other physical remains.&#8221; These days we do much of that online, in digital space. It&#8217;s what I&#8217;m doing here, in some faith that at least a few small bits of what I tossed out in the paragraphs above will prove useful to story-tellers among the living.</p>
<p>And I suggest that this, and not just telling the usual stories, needs to be a bigger part of journalism&#8217;s calling in our time.</p>
]]></content:encoded>
			<wfw:commentRss>http://blogs.harvard.edu/doc/2019/09/24/lost/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
			<creativeCommons:license>https://creativecommons.org/licenses/by/4.0/</creativeCommons:license>
<post-id xmlns="com-wordpress:feed-additions:1">12242</post-id>	</item>
		<item>
		<title>Thoughts at #ID2020</title>
		<link>http://blogs.harvard.edu/doc/2019/09/19/id2020/</link>
		<pubDate>Thu, 19 Sep 2019 14:02:43 +0000</pubDate>
		<dc:creator><![CDATA[Doc Searls]]></dc:creator>
				<category><![CDATA[Identity]]></category>
		<category><![CDATA[VRM]]></category>

		<guid isPermaLink="false">http://blogs.harvard.edu/doc/?p=12213</guid>
		<description><![CDATA[I&#8217;m at the ID2020 (@ID2020) Summit in New York. The theme is &#8220;Rising to the Good ID Challenge.&#8221; My notes here are accumulating at the bottom, not the top. Okay, here goes&#8230; At that last link it says, &#8220;The ID2020 Alliance is setting the course of digital ID through a multi-stakeholder partnership, ensuring digital ID is responsibly implemented and [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><img class="aligncenter wp-image-12234 size-full" src="http://blogs.harvard.edu/doc/files/2019/09/1_gEs17Zemyep3sZTZF9LgNA.jpg" alt="" width="550" height="334" srcset="http://blogs.harvard.edu/doc/files/2019/09/1_gEs17Zemyep3sZTZF9LgNA.jpg 550w, http://blogs.harvard.edu/doc/files/2019/09/1_gEs17Zemyep3sZTZF9LgNA-300x182.jpg 300w, http://blogs.harvard.edu/doc/files/2019/09/1_gEs17Zemyep3sZTZF9LgNA-494x300.jpg 494w" sizes="(max-width: 550px) 100vw, 550px" /></p>
<p>I&#8217;m at the <a href="https://id2020.org/">ID2020</a> (<a href="https://twitter.com/ID2020">@ID2020</a>) Summit in New York. The theme is &#8220;Rising to the Good ID Challenge.&#8221; My notes here are accumulating at the bottom, not the top. Okay, here goes&#8230;</p>
<p>At that last link it says, &#8220;The <strong>ID2020 Alliance</strong> is setting the course of digital ID through a multi-stakeholder partnership, ensuring digital ID is responsibly implemented and widely accessible.&#8221;</p>
<p>I find myself wondering if individuals are among the stakeholders. Also this:</p>
<p><img class="aligncenter size-full wp-image-12215" src="http://blogs.harvard.edu/doc/files/2019/09/stakeholder.png" alt="" width="565" height="437" srcset="http://blogs.harvard.edu/doc/files/2019/09/stakeholder.png 565w, http://blogs.harvard.edu/doc/files/2019/09/stakeholder-300x232.png 300w, http://blogs.harvard.edu/doc/files/2019/09/stakeholder-388x300.png 388w" sizes="(max-width: 565px) 100vw, 565px" /></p>
<p>There is also a <a href="https://id2020.org/manifesto">manifesto</a>. It says, among other things, &#8220;The ability to prove one’s identity is a fundamental and universal human right.&#8221; and &#8220;We live in a digital era. Individuals need a trusted, verifiable way to prove who they are, both in the physical world and online.&#8221;</p>
<p>That&#8217;s good. I&#8217;d also want more than one way, which may be the implication here.</p>
<p>The first speaker is from <a href="https://www.cariboudigital.net/">Caribou Digital</a>. What follows is from her talk.</p>
<p>&#8220;1. It&#8217;s about the user, not just the use case.&#8221;</p>
<p>Hmm&#8230; I believe identity needs to be about independent human beings, not just &#8220;users&#8221; of systems.</p>
<p>&#8220;2. Intermediaries are still critical.&#8221;</p>
<p>The focus here is on family and institutional intermediaries, especially in the less developed world. Which is fine; but people should not <em>need</em> intermediaries in all cases. If you tell someone your name, or give them a business card no intermediary is involved. That same convention should be available online.</p>
<p>&#8220;3. It&#8217;s not just about an &#8216;ID.&#8217; It&#8217;s not even about an identity <em>system. </em>It&#8217;s about an identification <em>ecosystem</em>.&#8221;</p>
<p>This is fine, but <em>identification</em> is about what systems do, not about what individuals do or have; and by itself tends to exclude self-sovereign identity. <a href="https://www.linuxjournal.com/content/new-hope-digital-identity">Self-sovereign</a> is how identity works in the physical world. Here we are nameless (literally, anonymous) to most others, and reveal information about who we are (business cards, student ID, drivers license) on an as-needed basis that obeys <a href="https://www.identityblog.com/?p=1065">Kim Cameron&#8217;s Laws of Identity</a>, notably &#8220;minimum disclosure for a constrained use,&#8221; &#8220;justifiable parties&#8221; and &#8220;personal control and consent.&#8221;</p>
<p>4. &#8220;A human-centered, inclusive, respectful vision for the next stage of identification in a digital age.&#8221;</p>
<p>We need human-<em>driven</em>. Explained long ago <a href="http://web.archive.org/web/20080503113249/http://www.mediainfluencer.net/2008/04/two-tales-of-user-centricities/">here</a> and <a href="http://blogs.harvard.edu/vrm/2008/04/28/vrm-is-user-driven/">here</a>.</p>
<p>That&#8217;s over and the first panel is on now. Most of it is inaudible where I sit. The topic now is self-sovereign and decentralized. The audience seems to be pushing that. <a href="https://medium.com/@matthewdavie">@MatthewDavie</a> just said something sensible, I think, but don&#8217;t have a quote.</p>
<p><a href="https://twitter.com/hackylawyER/status/1174680000525742082">This</a>:</p>
<blockquote class="twitter-tweet" data-width="500">
<p lang="en" dir="ltr">“About 80% of the people we’re talking about are women and children. The gender dimension is crucial.” -Richard Towle of <a href="https://twitter.com/Refugees?ref_src=twsrc%5Etfw">@Refugees</a> <a href="https://twitter.com/ID2020?ref_src=twsrc%5Etfw">@ID2020</a> <a href="https://twitter.com/hashtag/ID2020summit?src=hash&amp;ref_src=twsrc%5Etfw">#ID2020summit</a> <a href="https://t.co/p9ND9VcsXe">pic.twitter.com/p9ND9VcsXe</a></p>
<p>&mdash; Elizabeth M. (@hackylawyER) <a href="https://twitter.com/hackylawyER/status/1174680000525742082?ref_src=twsrc%5Etfw">September 19, 2019</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<p>And <a href="https://twitter.com/IdentityWoman/status/1174674901137051648">this</a>. Read the thread that follows. There are disagreements and explanations.</p>
<p><a href="https://twitter.com/search?q=id2020">Here&#8217;s the ID2020 search</a> on Twitter.</p>
<p>Background, at least on where I&#8217;m coming from: <a href="https://www.google.com/search?q=&quot;doc+searls&quot;+identity">https://www.google.com/search?q=&#8221;doc+searls&#8221;+identity</a>.</p>
<p>For the interested, <a href="https://twitter.com/@identitywoman">@identitywoman</a>, <a href="https://twitter.com/windley">@windley</a> and I (<a href="https://twitter.com/dsearls">@dsearls</a>) put on the <a href="http://idworkshop.org">Internet Identity Workshop</a>, October 1-3 at the Computer History Museum in Silicon Valley. This one will be our 29th. (The first was in 2005 and there are two per year.) It&#8217;s an unconference: no keynotes or panels, just breakouts on topics attendees choose and lead. It&#8217;s the most consequential conference I know.</p>
<p>@MatthewDavie: &#8220;If we do this, and it doesn&#8217;t work with the current power players, we&#8217;re going to end up with a second-class system.&#8221; I suspect this makes sense, but I&#8217;m not sure what &#8220;this&#8221; is.</p>
<p>&#8220;Sovereign ownership of data&#8221; just came up from the audience. I think it&#8217;s possible for individuals to act in a self-sovereign way in sharing identity data, but not that this data is exclusively own-able. <a href="https://medium.com/@hackylawyER/do-we-really-want-to-sell-ourselves-the-risks-of-a-property-law-paradigm-for-data-ownership-b217e42edffa">Some thoughts on that</a> from Elizabeth Renieris (<a href="https://twitter.com/@HackyLawyER">@HackyLawyER</a>). <a href="https://blogs.harvard.edu/doc/2018/09/18/data/">Mine agree</a>.</p>
<p>The second panel is on now. It&#8217;s mostly inauduble.</p>
<p>Now Dakota Gruener (<a href="https://twitter.com/dakotagruener">@DakotaGruener</a>), Executive Director of ID2020 is speaking. She&#8217;s telling a moving story about a homeless neighbor, Colin, who is denied services for lack of official ID(s).</p>
<p>New panel: Decentralization in National ID Programs.</p>
<p><a href="https://www.linkedin.com/in/identityblog/">Kim Cameron</a> is on the panel now: &#8220;I spent thirty years building the world&#8217;s identity systems.&#8221; There were gasps. I yelled &#8220;It&#8217;s true.&#8221; He continued: &#8220;I&#8217;m now trying to rile up the world&#8217;s populations&#8230;&#8221;</p>
<p><a href="https://www.linkedin.com/in/johnjordandigitaltrust/">John Jordan</a> just made a point about how logins are a screwed up way to do things online and don&#8217;t map to what we know well and do in the everyday world. (I think that&#8217;s close. The sound system is dim at this end of the room.)</p>
<p>Kim just sourced my wife (who is here and now deeper than I am in this identity stuff), adding that &#8220;people know something is wrong&#8221; when they mention shoes somewhere and then see ads for shoes online. &#8220;We have technology. We have consciousness. We have will. So let&#8217;s do something.&#8221;</p>
<p>John: &#8220;What we want is to be in control of our relationships. Those are ours. Those are decentralized&#8230; People are decentralized.&#8221;</p>
<p>Kim: &#8220;What it means is recognizing that identity is who we are. It begins with us. .. only we know the aggregate of these attributes. In daily life we reveal some of those attributes, but never the aggregate. We need a system that begins with the indi and recognizes that they are in control, and choose what they reveal separately. We don&#8217;t want aggregates of ourselves to be everywhere. We need systems that recognize that, and are based on control by the individual, consent of the individual.&#8221;</p>
<p>&#8220;We do need assertions from people other than ourselves. The government can provide useful claims about a person. So can a university, or a bank. I can say somebody is a great guy. The identity fabric is all these claims.&#8221; Not quite verbatim, but close.</p>
<p>John: &#8220;Personal data should never be presented in a non-cryptographic way.&#8221; Something like that.</p>
<p>Kim on the GDPR: &#8220;We have it because the population demanded it&#8230; what will happen is this vision of people in control of their identity, and the Internet becoming reliable and trustworthy and probabilistic (meaning you&#8217;re being guessed at) rather than fully useful. Let&#8217;s give people their own wallets, let them run their own lives, make up their own minds&#8230; the world of legislation will grow, and it will do that around the will of people. &#8230; they need an identity system based on individuals rather than institutions overstepping their bounds&#8230; and we will see conflicts around this, with both good and bad government interventions.&#8221;</p>
<p>John: &#8220;I&#8217;d like to see legislation that forbids companies from holding personal information they don&#8217;t have to.&#8221; (Not verbatim, but maybe close. Again, hard to hear.)</p>
<p>Kim: &#8220;The current identity systems of the world are collapsing&#8230; you will have major institutions switching over to these decentralized identity systems, not from altruism, but from liability.&#8221;</p>
<p>Elizabeth heard and <a href="https://twitter.com/hackylawyER/status/1174711465967783943">tweeted about</a> one of the thing that was inaudible to me at this end of the room: &#8220;<span class="css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0">Thank you </span><span class="r-18u37iz"><a class="css-4rbku5 css-18t94o4 css-901oao css-16my406 r-1n1174f r-1loqt21 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0" role="link" href="https://twitter.com/LudaBujoreanu">@LudaBujoreanu </a></span><span class="css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0">for addressing the deep disconnect between the reality on the ground of those without ID and the privileged POV from which many of these </span><span class="r-18u37iz"><a class="css-4rbku5 css-18t94o4 css-901oao css-16my406 r-1n1174f r-1loqt21 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0" role="link" href="https://twitter.com/hashtag/digitalid?src=hashtag_click">#digitalid</a></span><span class="css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0"> systems are built </span><span class="r-18u37iz"><a class="css-4rbku5 css-18t94o4 css-901oao css-16my406 r-1n1174f r-1loqt21 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0" role="link" href="https://twitter.com/ID2020">@ID2020</a></span><span class="css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0">’s </span><span class="r-18u37iz"><a class="css-4rbku5 css-18t94o4 css-901oao css-16my406 r-1n1174f r-1loqt21 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0" role="link" href="https://twitter.com/hashtag/id2020summit?src=hashtag_click">#id2020summit</a></span><span class="css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0"> cc </span><span class="r-18u37iz"><a class="css-4rbku5 css-18t94o4 css-901oao css-16my406 r-1n1174f r-1loqt21 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0" role="link" href="https://twitter.com/WomeninID">@WomeninID</a></span>&#8221;</p>
<p>Next panel: &#8220;Cities Driving Innovation in Good ID.&#8221;</p>
<p><a href="https://www.apl.washington.edu/people/profile.php?last_name=David&amp;first_name=Scott">Scott David</a> from the audience just talked about &#8220;Turning troubles into problems,&#8221; and the challenge of doing that for individuals in an identity context.&#8221;</p>
<p>This reminds me of <a href="https://qz.com/516536/the-gun-control-debate-is-not-a-debate-but-a-conflict-and-those-have-different-rules/">what Gideon Litchfield said</a> about the difference between debates and conflicts, and I expanded on a bit here. Our point was that there are some issues that become locked in conflict with no real debate between sides. Scott&#8217;s distinction is toward a way out. Interesting. I&#8217;d like to know more.</p>
<p>Ken Banks <a href="https://twitter.com/kiwanja/status/1174674895399215104">tweets</a>, &#8220;<span class="css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0">It&#8217;s an increasingly crowded space&#8230; </span><span class="r-18u37iz"><a class="css-4rbku5 css-18t94o4 css-901oao css-16my406 r-1n1174f r-1loqt21 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0" role="link" href="https://twitter.com/hashtag/digitalidentity?src=hashtag_click">#digitalidentity</a></span> <span class="r-18u37iz"><a class="css-4rbku5 css-18t94o4 css-901oao css-16my406 r-1n1174f r-1loqt21 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0" role="link" href="https://twitter.com/hashtag/ID2020?src=hashtag_click">#ID2020&#8243;</a></span>:</p>
<p><img src="https://pbs.twimg.com/media/EE1Ilw2X4AAVkGF?format=jpg&amp;name=medium" alt="Image" /><br />
He <a href="https://twitter.com/kiwanja/status/1174680209553022978">adds</a>, &#8220;<span class="css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0">Already lots of talk of putting people first. Hopefully the </span><span class="r-18u37iz"><a class="css-4rbku5 css-18t94o4 css-901oao css-16my406 r-1n1174f r-1loqt21 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0" role="link" href="https://twitter.com/hashtag/digitalidentity?src=hashtag_click">#digitalidentity</a></span><span class="css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0"> community will deliver, and not fall into the trap of saying one thing and doing another, a common issue with in the tech-for-development/</span><span class="r-18u37iz"><a class="css-4rbku5 css-18t94o4 css-901oao css-16my406 r-1n1174f r-1loqt21 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0" role="link" href="https://twitter.com/hashtag/ICT4D?src=hashtag_click">#ICT4D</a></span><span class="css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0"> sector. </span><span class="r-18u37iz"><a class="css-4rbku5 css-18t94o4 css-901oao css-16my406 r-1n1174f r-1loqt21 r-1qd0xha r-vw2c0b r-ad9z0x r-bcqeeo r-qvutc0" role="link" href="https://twitter.com/hashtag/ID2020?src=hashtag_click">#ID2020</a></span> <span class="r-18u37iz"><a class="css-4rbku5 css-18t94o4 css-901oao css-16my406 r-1n1174f r-1loqt21 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0" role="link" href="https://twitter.com/hashtag/GoodID?src=hashtag_click">#GoodID</a>&#8220;</span></p>
<div class="css-1dbjc4n r-117bsoe r-mvpalk r-156q2ks">
<p>Two tweets&#8230;</p>
<p><a href="https://twitter.com/@Gavi">@Gavi</a>: &#8220;<span class="css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0">Government representatives, tech experts &amp; civil society will gather at </span><span class="r-18u37iz"><a class="css-4rbku5 css-18t94o4 css-901oao css-16my406 r-1n1174f r-1loqt21 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0" role="link" href="https://twitter.com/hashtag/UNGA74?src=hashtag_click">#UNGA74</a></span><span class="css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0"> today to discuss the potential of </span><span class="r-18u37iz"><a class="css-4rbku5 css-18t94o4 css-901oao css-16my406 r-1n1174f r-1loqt21 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0" role="link" href="https://twitter.com/hashtag/DigitalID?src=hashtag_click">#DigitalID</a></span><span class="css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0">. Biometric ID data could help us better monitor which children need to be vaccinated and when. </span><span class="r-18u37iz"><a class="css-4rbku5 css-18t94o4 css-901oao css-16my406 r-1n1174f r-1loqt21 r-1qd0xha r-vw2c0b r-ad9z0x r-bcqeeo r-qvutc0" role="link" href="https://twitter.com/hashtag/ID2020?src=hashtag_click">#ID2020</a></span>&#8221;</p>
<div id="tweet-rich-content-label" class="css-1dbjc4n r-156q2ks">
<div class="css-1dbjc4n r-1udh08x">
<div class="css-1dbjc4n r-9x6qib r-t23y2h r-1phboty r-rs99b7 r-1udh08x">
<div class="css-1dbjc4n">
<div class="css-1dbjc4n r-1pi2tsx">
<div class="css-1dbjc4n r-1adg3ll r-1udh08x">
<div class="r-1p0dtai r-1pi2tsx r-1d2f490 r-u8s1d r-ipm5af r-13qz1uu">
<div class="css-1dbjc4n r-1p0dtai r-1mlwlqe r-1d2f490 r-11wrixw r-61z16t r-1udh08x r-u8s1d r-zchlnj r-ipm5af r-417010"><img class="css-9pa8cd" src="https://pbs.twimg.com/media/EE1Nk9YX4AIRIH_?format=jpg&amp;name=medium" alt="Image" /></div>
<p>&nbsp;</p>
<p>Now I can&#8217;t find the other one. It argued that there is a 2-3% error rate for biomentric.</p>
</div>
<p>For lunch David Carroll (<a href="https://twitter.com/ProfCarroll">@ProfCarroll</a>) of The New School (<a href="https://twitter.com/thenewschool">@thenewschool</a>) is talking. Title: A data quest: holding tech to account. He starred in <a href="https://www.netflix.com/title/80117542">The Great Hack</a>, on Netflix.</p>
<p>He&#8217;s sourcing <a href="https://ico.org.uk/media/2259369/democracy-disrupted-110718.pdf">Democracy Disrupted</a>, by the <a href="https://ico.org.uk/media/">UK ICO</a>. &#8220;the sortable, addressable&#8230; algorithmic democracy. &#8220;Couterveillance: advertisers get all the privacy. We get none.&#8221;</p>
<p>&#8220;Parable of the great hadk: data rights must externd to digital creditoship. Identity depends on it.&#8221;</p>
<p>200 million America has no access to data held about them, by, for istance, Acxiom.</p>
<p>&#8220;A simple bill of data rights. Creditorship, objection, control, knowledge.&#8221; (<a href="https://www.technologyreview.com/s/612588/its-time-for-a-bill-of-data-rights/">Here&#8217;s something</a> that&#8217;s not it, but interesting enough for me to flag for later reading.)</p>
<p>Now a panel moderated by <a href="https://en.wikipedia.org/wiki/Raffi_Krikorian">Raffi Kirkorian</a>. Also Cameron Birge of Microsoft and the <a href="https://en.wikipedia.org/wiki/Emerson_Collective">Emerson Collective</a>, Karen Ottoni, Demora Compari, Matthew Yarger and Christine Leong. (Again the sound is weak at this end of the room. Not picking up much here.)</p>
<p>Okay, that&#8217;s it. I&#8217;ll say more after I pull some pix together and complete these public notes&#8230;</p>
<p>Well, I have the pix, but the upload thing here in WordPress gives me an &#8220;http error&#8221; when I try to upload them. And now I&#8217;ve gotta drive to Boston, so that&#8217;ll have to wait.</p>
</div>
</div>
</div>
</div>
<div class="css-1dbjc4n r-9x6qib r-t23y2h r-1phboty r-rs99b7 r-1udh08x"></div>
</div>
</div>
</div>
]]></content:encoded>
				<creativeCommons:license>https://creativecommons.org/licenses/by/4.0/</creativeCommons:license>
<post-id xmlns="com-wordpress:feed-additions:1">12213</post-id>	</item>
		<item>
		<title>There are better ways to save journalism</title>
		<link>http://blogs.harvard.edu/doc/2019/09/01/journalism-2/</link>
		<pubDate>Sun, 01 Sep 2019 21:19:50 +0000</pubDate>
		<dc:creator><![CDATA[Doc Searls]]></dc:creator>
				<category><![CDATA[adtech]]></category>
		<category><![CDATA[advertising]]></category>
		<category><![CDATA[Blogging]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Journalism]]></category>
		<category><![CDATA[podcasting]]></category>
		<category><![CDATA[Technology]]></category>

		<guid isPermaLink="false">http://blogs.harvard.edu/doc/?p=12180</guid>
		<description><![CDATA[In a Columbia Journalism Review op-ed, Bernie Sanders presents a plan to save journalism that begins, WALTER CRONKITE ONCE SAID that “journalism is what we need to make democracy work.” He was absolutely right, which is why today’s assault on journalism by Wall Street, billionaire businessmen, Silicon Valley, and Donald Trump presents a crisis—and why we [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><img src="http://blogs.harvard.edu/doc/files/2014/02/120px-Newspaper_Cover.svg_.png" alt="newspaper" width="120" height="120" align="left" />In a <a href="https://www.cjr.org/opinion/bernie-sanders-media-silicon-valley.php"><em>Columbia Journalism Review</em> op-ed</a>, Bernie Sanders presents a plan to save journalism that begins,</p>
<blockquote><p>WALTER CRONKITE ONCE SAID that “journalism is what we need to make democracy work.” He was absolutely right, which is why today’s assault on journalism by Wall Street, billionaire businessmen, Silicon Valley, and Donald Trump presents a crisis—and why we must take concrete action.</p></blockquote>
<p>His prescriptive remedies run ten paragraphs long, and all involve heavy government intervention. <a href="https://www.mediapost.com/publications/author/7653/rob-williams/">Rob Williams</a> (<a href="http://@robwilliamsNY">@RobWilliamsNY</a>) of <i><a href="https://www.mediapost.com/publications/author/7653/rob-williams/">MediaPost</a></i> provides a brief summary in <a href="https://www.mediapost.com/publications/article/340047/bernie-sanders-has-misguided-plan-to-save-journali.html?c=163742#reply">Bernie Sanders Has Misguided Plan To Save Journalism</a>:</p>
<blockquote><p>Almost two weeks after walking back his criticism of <em>The Washington Post</em>, which he had suggested was a mouthpiece for owner Jeff Bezos, Sanders <a href="https://www.mediapost.com/publications/article/339344/democratic-candidates-take-aim-at-news-media.html">described a scheme</a> that would re-order the news business with taxes, cross-subsidies and trust-busting&#8230;</p>
<p>Sanders also proposes new taxes on online targeted ads, and using the proceeds to fund nonprofit civic-minded media. It’s highly doubtful that a government-funded news provider will be a better watchdog of local officials than an independent publisher. Also, a tax-funded news source will compete with local publishers that already face enough threats.</p></blockquote>
<p>Then Rob adds,</p>
<blockquote><p>Sanders needs to recognize that the news business is subject to market forces too big to tame with more government regulation. Consumers have found other sources for news, including pay-TV and a superabundance of digital publishers.</p></blockquote>
<p>Here&#8217;s a lightly edited copy of the comment I put up under Rob&#8217;s post:</p>
<blockquote><p>Journalism as we knew it—scarce and authoritative media resources on print and air—has boundless competition now from, well, everybody.</p>
<p>Because digital.</p>
<p>Meaning we are digital now. (Proof: try living without your computer and smartphone.) As digital beings we float in a sea of &#8220;content,&#8221; very little of which is curated, and much of which is both fake and funded by the same systems (Google, Facebook and the four-dimensional shell game called adtech) that today rewards publishers for bringing tracked eyeballs to robots so those eyeballs can be speared with &#8220;relevant&#8221; and &#8220;interactive&#8221; ads.</p>
<p>The systems urging those eyeballs toward advertising spears are algorithmically biased to fan emotional fires, much of which reduces to enmity toward &#8220;the other,&#8221; dividing worlds of people into opposing camps (each an &#8220;other&#8221; for the &#8220;other&#8221;). Because, hey, it&#8217;s good for the ad business, which includes everyone it pays, including what&#8217;s left of mainstream and wannabe mainstream journalism.</p>
<p>Meanwhile, the surviving authoritative sources in that mainstream have themselves become fat with opinion while carving away reporters, editors, bureaus and beats. Brand advertising, for a century the most reliable and generous source of funding for good journalism (admittedly, along with some bad), is now mostly self-quarantined to major broadcast media, while the eyeball-spearing &#8220;behavioral&#8221; kind of advertising rules online, despite attempts by regulators (especially in Europe) to stamp it out. (Because it is in fact totally rude.)</p>
<p>Then there&#8217;s the problem of news surfeit, which trivializes everything with its abundance, no matter how essential and important a given story may be. It&#8217;s all just too freaking much. (More about that <a href="http://blogs.harvard.edu/doc/2019/08/27/the-great-trivializer/">here</a>.)</p>
<p>And finally there&#8217;s the problem of &#8220;the story&#8221;—journalism&#8217;s stock-in-trade. Not everything that matters fits the story format (character, problem, movement). Worse, we&#8217;re living in a time when the most effective political leaders are giant characters who traffic in generating problems that attract news coverage like a black hole attracts everything nearby that might give light. (More about that <a href="http://blogs.harvard.edu/doc/2019/07/23/where-journalism-fails/">here</a>.)</p>
<p>Against all those developments at once, there is hardly a damn thing lawmakers or regulators can do. Grandstanding such as Sanders does in this case only adds to the noise, which Google&#8217;s and Facebook&#8217;s giant robots are still happy to fund.</p>
<p>Good luck, folks.</p></blockquote>
<p>So. How <em>do</em> we save journalism—if in fact we can? Three ideas:</p>
<ol>
<li>Start at the local level, because the physical world is where the Internet gets real. It&#8217;s hard to play the fake news game there, and that alone is a huge advantage (This is what <a href="https://tedxsantabarbara.com/2018/doc-searls/">my TED talk</a> last year was about, by the way.)</li>
<li>Whatever <a href="http://scripting.com/">Dave Winer</a> is working on. I don&#8217;t know anybody with as much high-power insight and invention, plus the ability to make stuff happen. (Heard of blogging and podcasting? You might not have if them weren&#8217;t for Dave. Some history <a href="https://www.theguardian.com/technology/2014/oct/12/happy-20th-anniversary-dave-winer-inventor-of-the-blog">here</a>, <a href="http://secrets.scripting.com/whatIsPodcasting">here</a> and <a href="https://medium.com/@dsearls/diy-radio-with-podcasting-8efac413612d">here</a>.)</li>
<li><a href="https://artplusmarketing.com/without-aligning-incentives-we-cant-kill-fake-news-or-save-journalism-938e1169eb57?gi=9a8e37a387f">Align incentives</a> between journalism, its funding sources and its readers, listeners and viewers. Surveillance-based adtech is massively misaligned with the moral core of journalism, the brand promises of advertisers and the privacy of every human being exposed to it. Bernie and too many others miss all that, largely because the big publishers have been chickenshit about admitting their role in adtech&#8217;s surveillance system—and reporting on it.</li>
<li>Put the users of news in charge of their relationships with the producers of it. Which can be done. For example, we can get rid of those shitty adtech-protecting cookie notices on the front doors of websites with <a href="http://customercommons.org/home/tools/terms/">terms</a> that <i>readers</i> can proffer and <i>publishers</i> can agree to, because those terms are a good deal for both. <a href="http://customercommons.org/home/tools/terms/p2b1/">Here&#8217;s one</a>.</li>
</ol>
<p>I think we&#8217;ll start seeing the tide turn when when what&#8217;s left of responsible ad-funded online publishing cringes in shame at having participated in adtech&#8217;s inexcusable <a href="https://www.amazon.com/Age-Surveillance-Capitalism-Future-Frontier/dp/1610395697">surveillance business</a>—and reports on it thoroughly.</p>
<p>Credit where due: <em>The New York Times</em> has started, with its <a href="https://www.nytimes.com/series/new-york-times-privacy-project">Privacy Project</a>. <a href="https://www.nytimes.com/interactive/2019/08/23/opinion/data-internet-privacy-tracking.html">An excellent report</a> by <a href="https://www.nytimes.com/by/farhad-manjoo">Farhad Manjoo</a> (<a href="https://twitter.com/fmanjoo">@fmanjoo</a>) in that series contains this long-overdue line:&#8221;Among all the sites I visited, news sites, including <em>The New York Times</em> and <em>The Washington Post</em>, had the most tracking resources.&#8221;</p>
<p>Hats off to Farhad for grabbing a third rail there. I&#8217;ve been <a href="http://blogs.harvard.edu/doc/the-adblock-war/">urging</a> this for a long time, and working especially on #4, through <a href="http://projectvrm.org">ProjectVRM</a>, <a href="http://customercommons.org">CustomerCommons</a> and <a href="https://standards.ieee.org/project/7012.html">the IEEE&#8217;s working group (P7012) on Standard for Machine Readable Personal Privacy Terms</a>. If you want to roll up your sleeves and help with this stuff, join one or more of those efforts.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
				<creativeCommons:license>https://creativecommons.org/licenses/by/4.0/</creativeCommons:license>
<post-id xmlns="com-wordpress:feed-additions:1">12180</post-id>	</item>
	</channel>
</rss>