The country’s intensifying efforts to redraw maritime borders have its neighbors, and the U.S., fearing war. But does the aggression reflect a government growing in power—or one facing a crisis of legitimacy?
However willy-nilly these provocations may at first appear, the struggle that China has launched for dominance of the western Pacific is anything but indiscriminate.
paradoxically, China’s new behavior appears to be a reflection not only of rising capability or self-confidence, but also of rising insecurity among the Communist Party leadership, whose legitimacy in the country’s post-ideological era has always rested on the narrow twin pillars of strong economic performance and nationalism.
Source: China’s Dangerous Game – The Atlantic
There is a very common sentiment that arises in this debate, … which says that there is no real harm that comes from this large-scale invasion because only people who are engaged in bad acts have a reason to want to hide and to care about their privacy. This worldview is implicitly grounded in the proposition that there are two kinds of people in the world, good people and bad people.
What they’re really saying is, “I have agreed to make myself such a harmless and unthreatening and uninteresting person that I actually don’t fear having the government know what it is that I’m doing.”
when you say, “somebody who is doing bad things,” you probably mean things like plotting a terrorist attack or engaging in violent criminality, a much narrower conception of what people who wield power mean when they say, “doing bad things.” For them, “doing bad things” typically means doing something that poses meaningful challenges to the exercise of our own power.
Source: Glenn Greenwald: Why privacy matters
On YouTube: Glenn Greenwald: Why privacy matters
Transcript: Glenn Greenwald: Why privacy matters
You can’t build a backdoor that only the good guys can walk through. Encryption protects against cybercriminals, industrial competitors, the Chinese secret police and the FBI. You’re either vulnerable to eavesdropping by any of them, or you’re secure from eavesdropping from all of them.
Source: iPhone Encryption and the Return of the Crypto Wars – Schneier on Security