scholarly journals end of all taxation and censorship using blockchain technology

2021 ◽  
Vol 9 (08) ◽  
pp. 604-610
Author(s):  
Tanmay Munjal

Large scale censorship and control over the free flow of information on the internet that was already implemented on a large scale in many authoritarian countries in China in the past few decades has started to work its way through the more liberal and western countries including India, US etc. especially in the last decade raising concerns over privacy issues and the possibility of a dystopian future of tyrannical governments empowered by the use of digital surveillance technology to increase their power and make them essentially undefeatable on a level unforeseen in the history of humanity among many great thinkers in our era. In this paper, we wish to outline a method to not only combat but to completely eliminate both the possibility and current usage of all censorship and control over flow of information on the internet, hence heralding an era of free flow of information throughout the world and destroying practically all mind control that tyrannical governments can hold over their people, in essence ending the era of propaganda and tyranny from the face of this earth forever, using blockchain technology.

2015 ◽  
Vol 14 (04) ◽  
pp. 671-700 ◽  
Author(s):  
SUSAN AARONSON

AbstractHerein, we examine how the United States and the European Union use trade agreements to advance the free flow of information and to promote digital rights online. In the 1980s and 1990s, after US policymakers tried to include language governing the free flow of information in trade agreements, other nations feared a threat to their sovereignty and their ability to restrict cross-border data flows in the interest of privacy or national security.In the twenty-first century, again many states have not responded positively to US and EU efforts to facilitate the free flow of information. They worry that the US dominates both the Internet economy and Internet governance in ways that benefit its interests. After the Snowden allegations, many states adopted strategies that restricted rather than enhanced the free flow of information. Without deliberate intent, efforts to set information free through trade liberalization may be making the Internet less free.Finally, the two trade giants are not fully in agreement on Internet freedom, but neither has linked policies to promote the free flow of information with policies to advance digital rights. Moreover, they do not agree as to when restrictions on information are necessary and when they are protectionist.


Author(s):  
Dan Schiller

This chapter examines the Commerce Department's free-flow policy as part of its power over internet policy. It first provides an overview of U.S.–centric internet and Commerce's Internet Policy Task Force, established to launch an inquiry into “the global free flow of information on the Internet.” The inquiry's purpose was “to identify and examine the impact that restrictions on the flow of information over the Internet have on American businesses and global commerce.” The chapter also considers Commerce's commodification strategies based in part on data centers and the place of cloud computing services in the department's free-flow inquiry. It shows that the Commerce Department's free-flow policy was a major component of the federal government's overall efforts to keep corporate data flows streaming without restriction as new profit sites emerged around an extraterritorial internet managed by the United States.


2021 ◽  
Vol 8 (2) ◽  
pp. 205395172110537
Author(s):  
Morgan Klaus Scheuerman ◽  
Madeleine Pape ◽  
Alex Hanna

Scholars are increasingly concerned about social biases in facial analysis systems, particularly with regard to the tangible consequences of misidentification of marginalized groups. However, few have examined how automated facial analysis technologies intersect with the historical genealogy of racialized gender—the gender binary and its classification as a highly racialized tool of colonial power and control. In this paper, we introduce the concept of auto-essentialization: the use of automated technologies to re-inscribe the essential notions of difference that were established under colonial rule. We consider how the face has emerged as a legitimate site of gender classification, despite being historically tied to projects of racial domination. We examine the history of gendering the face and body, from colonial projects aimed at disciplining bodies which do not fit within the European gender binary, to sexology's role in normalizing that binary, to physiognomic practices that ascribed notions of inferiority to non-European groups and women. We argue that the contemporary auto-essentialization of gender via the face is both racialized and trans-exclusive: it asserts a fixed gender binary and it elevates the white face as the ultimate model of gender difference. We demonstrate that imperialist ideologies are reflected in modern automated facial analysis tools in computer vision through two case studies: (1) commercial gender classification and (2) the security of both small-scale (women-only online platforms) and large-scale (national borders) spaces. Thus, we posit a rethinking of ethical attention to these systems: not as immature and novel, but as mature instantiations of much older technologies.


Iuris Dictio ◽  
2018 ◽  
Author(s):  
Hugo Fernando Aguiar Lozano

The present paper analyzes the right to privacy in the context of the Internet. The multi-stake- holder initiatives are an alternative that has already provided a regulatory structure on various aspects of the Internet, be it security, free flow of information or online privacy. Although there are elements that make it not a total solution, this paper analyzes some reasons why online privacy should be regulated by mechanisms of Internet Governance and by entities that do not respond only to governments or only to private firms. In this work, a general look at this alternative is given, without neglecting other approaches that should be applied to the topic of online privacy.


2021 ◽  
Author(s):  
Jie Huang

Insufficient WTO regulation of cross-border e-commerce confronts China and the US with three legal challenges: ambiguous classification of digital products, inadequate consumer and privacy protection, and weak protection of cross-border flow of information. China and the US have adopted converging approaches to address these challenges: inserting e-commerce chapters into their FTAs. However, the substance of these chapters is diverging. Firstly, US FTAs categorise digital products separately from goods and services and provide national treatment and most favoured nation treatment to products and their suppliers. China’s FTAs still offer no solutions to the classification of digital products and their treatment. Secondly, although China’s FTAs still provide weak protection for consumers and privacy, Chinese domestic law has converged towards US FTAs to provide better protection. Thirdly, US and China FTAs are significantly divergent in their regulation of the free flow of information. In the post-TPP era, a polycentric direction will emerge in the regulation of the free flow of information between China and the US.


2011 ◽  
pp. 676-687
Author(s):  
Deborah L. Wheeler

Making the choice to be an Internet society is not a process governed simply by a state’s attitudes towards computers and the data that flows between them. Rather, being an Internet society means fostering the wide embrace of perspectives modeled on the technology itself. The basic components of designing an Internet society include a commitment to the free flow of information across and among hierarchies; a belief that it is best not to privilege any single information node; a realization that censorship is difficult if not futile; and a commitment to the idea that communities, companies and individuals have the right to represent themselves within electronic landscapes. All of these information attitudes have spill over effects in the real world. While constructing an Internet society is also about building information infrastructure and teaching people to use new tools, it is the clear spill over effects linked with the technology’s design principles that have most developing countries proceeding with caution. For many countries around the world, especially (semi) authoritarian ones, no matter how strong the economic incentives for being an Internet society are, politically and socially, accepting such processes of change without selective state intervention is uncommon. Nowhere are these interventions more apparent than in the puzzling mosaic of Internet led development in the Arab World. This article entertains a series of questions regarding emerging Internet societies in the Arab World: 1. To what degree is the Internet spreading in the Arab World and what factors are most commonly driving (or inhibiting) these processes of technological change? 2. In what way is the Internet contributing to processes of political change in the region? And how is the authoritarian state intervening to regulate Internet use in an attempt to control the spill over effects of such use? 3. What might be the longer term impacts of emergent Internet cultures in the region?  


Sign in / Sign up

Export Citation Format

Share Document