Initial commit: HPR Knowledge Base MCP Server
- MCP server with stdio transport for local use - Search episodes, transcripts, hosts, and series - 4,511 episodes with metadata and transcripts - Data loader with in-memory JSON storage 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
This commit is contained in:
309
hpr_transcripts/hpr0123.txt
Normal file
309
hpr_transcripts/hpr0123.txt
Normal file
@@ -0,0 +1,309 @@
|
||||
Episode: 123
|
||||
Title: HPR0123: Misunderstanding Privacy Part 1
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0123/hpr0123.mp3
|
||||
Transcribed: 2025-10-07 11:46:39
|
||||
|
||||
---
|
||||
|
||||
This show is a loose adaptation of the paper entitled, I've got nothing to hide and other
|
||||
misunderstandings of privacy written by Daniel J. Salove and linked to this and other
|
||||
information is available in the show notes all right so I am Drake and he was
|
||||
and we are going to be talking about privacy in a multi-part series that I've
|
||||
been titled misunderstandings of privacy based largely on Daniel J. Salove's
|
||||
paper so why is privacy important okay great question well like you know in
|
||||
2005 the New York Times revealed that the Bush administration authorized the
|
||||
NSA to engage in warrantless wiretapping and even actually had a paper with
|
||||
these on them oh there you go okay in 2002 the media revealed that the
|
||||
Department of Defense was constructing a data mining project called total
|
||||
information awareness for Tia under the leadership of Admiral John Pointexter
|
||||
you can't make this stuff up the vision of Tia was to gather a variety of
|
||||
information about people you know financial education health other data
|
||||
like that the information would be analyzed for suspicious patterns and a
|
||||
coin in Mr. Pointexter the only way to detect to detect terrorists the sense
|
||||
does not make sense the only way to detect terrorists is to look for patterns of
|
||||
activity that are based on observations from the past as well as estimates
|
||||
about how terrorists will adapt to avoid future measures of detection okay
|
||||
however you know when this program came to a light there was you know public
|
||||
outcry in the Senate that voted to deny the program any funding in May 2006
|
||||
USA today broke the story that the NSA had obtained customer records from
|
||||
several major phone companies and was analyzing them for patterns
|
||||
and this was quoted as being the largest database ever assembled ever
|
||||
that's a fairly large database I suppose in June 2006 the New York Times
|
||||
data the government had been accessing oh this is actually my favorite
|
||||
that the government had been accessing bank records from the Society of World
|
||||
Wide Interbank Financial Transactions or Swift
|
||||
which handles five transactions for like thousands of banks and stuff
|
||||
all right so many people were outraged at these announcements it does kind of
|
||||
point but others weren't they didn't see a problem and the reason I didn't see
|
||||
a problem as they explained was because I've got nothing to hide wow what a
|
||||
brilliant argument no privacy problem exists if the person has nothing to hide
|
||||
super absolutely super and that is the point of this particular show and
|
||||
actually this self-mini series of shows is why did nothing to hide argument is
|
||||
has some issues so you know looking at the nothing to hide argument when the
|
||||
government engages in surveillance there is no threat to privacy unless the
|
||||
government recovers unlawful activity in which case the person really has
|
||||
no legitimate claim to justify why the unlawful activity should remain
|
||||
private thus if an individual engages only in legal
|
||||
activity they have nothing to worry about a common example right is
|
||||
suppose the government examines telephone records and finds out that the
|
||||
person you know made calls to you know their parents a friend in
|
||||
Canada a bank a pizza place you know so what the person might say
|
||||
I'm not embarrassed or familiar by this information if anybody asks me I will
|
||||
gladly tell them where I shop I had nothing to hide
|
||||
the nothing to hide argument and its variants are quite prevalent in
|
||||
popular discourse about privacy security expert Bruce Schneier calls it the
|
||||
most common retort against privacy advocates nothing to hide argument is
|
||||
possibly the primary argument made when balancing privacy against security
|
||||
sometimes nothing to hide argument is posed as a question like um
|
||||
if you have nothing to hide then what do you have to fear or uh
|
||||
if you are doing anything wrong then what do you have to hide?
|
||||
well here I'm going to take you on a journey of exploring the land that
|
||||
is nothing to hide argument and the various issues that it raises and don't
|
||||
kid yourself grappling with the nothing to hide argument is very important
|
||||
because the argument reflects the sentiments of like you know a why
|
||||
percentage of the population unlike with most people then nothing to hide
|
||||
arguments superficial incantations can like readily be refuted but when the
|
||||
argument is actually made in its strongest form it's extremely formidable
|
||||
like um in order to respond and nothing to hide argument it's
|
||||
imperative that we have a theory about what privacy is and why it's valuable
|
||||
because really at its core and nothing to hide argument emerges from the
|
||||
conception of privacy and its value you know what is privacy you know how do
|
||||
we assess its value how do we weigh it against other values like national
|
||||
security and these are actually questions that have long played
|
||||
people who have you know philosophized okay philosophize not work
|
||||
but people you know philosophers about privacy and those trying to develop
|
||||
theory and justifications for privacy's legal protection
|
||||
like in Britain for example and the government has you know millions of CCTV
|
||||
cameras and the slogan for this program which is actually it's a fine
|
||||
if you've got nothing to hide then you've got nothing to fear in the
|
||||
United States there was this one anonymous individual from the department of
|
||||
justice i think it was who commented that if the government needs to read my
|
||||
emails so be it i had nothing to hide do you
|
||||
and if you look online you'll find you know people on blogs you say things
|
||||
such as i don't mind people wanting to find out things about me i've got
|
||||
nothing to hide which is why i support president pushes efforts to find
|
||||
errors by monitoring our phone calls great fantastic statement
|
||||
variations of nothing to hide argument frequently appear in like blogs
|
||||
letters to the editor of television interviews you know anytime that people can
|
||||
express their opinion to a mass audience you tend to find variation of the
|
||||
argument some examples include
|
||||
some examples include i don't have anything to hide from the government i
|
||||
don't think i had much hidden from the government in the first place i don't
|
||||
think they care if i talk about my annoying co-worker or do i care if the FBI
|
||||
monitors my phone calls i had nothing to hide either does 99.99% of the
|
||||
population if wiretapping stops just one of these
|
||||
September 11th incidents thousands of lies are saved
|
||||
like i said i had nothing to hide the majority of them the american people
|
||||
had nothing to hide and those that has something to hide should be found out
|
||||
and get what they have come into them
|
||||
right now this is nothing new you know i mean there's a
|
||||
character in this novel by Henry James and that was written in 1888 it was called
|
||||
the reverberator and the character goes if these people had done bad things
|
||||
they ought to be ashamed of themselves and he couldn't pity them
|
||||
and if they hadn't done them there was no need of making such a rumpus about
|
||||
other people knowing but if you actually do look on these blogs you see
|
||||
from where the paper comes but there are some fantastic comebacks to some
|
||||
of these like um so do you have curtains can i see your credit card bill is
|
||||
for the last year i don't need to justify my position you need to justify
|
||||
yours come back with a warrant i don't have anything to hide i don't have
|
||||
anything i feel like showing you either if you have nothing to hide then you
|
||||
have no life show me yours i'll show you mine
|
||||
it's not about having anything to hide it's about things not being anyone
|
||||
else's business oh it's a month's kind of paper bottom line
|
||||
jostle would have loved it what more should anyone have to say
|
||||
okay so looking at those comebacks it's on the surface it's kind of
|
||||
dismissed and nothing to hide argument
|
||||
is this thing not a curtain breaker all right
|
||||
well they're saying oh yeah on the surface it's easy to dismiss the
|
||||
argument right because everybody has something they want to hide from
|
||||
somebody it's actually this novella by this guy Frederick
|
||||
what's the last time during math i think it is called traps it's kind of an
|
||||
old novella but if you're into novella it's a priori classic
|
||||
and it involves a seemingly innocent use put on trial by its group of like
|
||||
retired lawyers because mock trial game and the man inquires you know what
|
||||
his crime shall be for the trial game and the prosecutor responds
|
||||
in all together minor matter a crime can always be found
|
||||
one can usually think of something compelling that even the most open person
|
||||
would want to hide like um if you have nothing to hide then um
|
||||
you know that quite literally means that you will let me photograph your naked
|
||||
and then i get full rights to the photo so i can show it to your friends and
|
||||
neighbors co-workers etc you know most people would kind of have a problem
|
||||
with that
|
||||
Canadian privacy expert David
|
||||
the latter you know i'm just murdering his name express as a similar idea
|
||||
when he argues that there is no sentient human being in the
|
||||
western world who has little or no regard for his or her own personal
|
||||
privacy those who would attempt such claims cannot
|
||||
understand even a few minutes questioning about intimate aspects of their lives
|
||||
without caving to the intrusiveness of certain subject matters
|
||||
however these responses kind of only attack enough in the hide argument and
|
||||
like it's most extreme form which is not particularly strong
|
||||
um as a simple one-liner about a person's preference you know i personally
|
||||
have nothing to hide but that argument is not very compelling because
|
||||
you can't exactly attack a person's you know a personal preference
|
||||
however if you kind of go so far instead of nothing to hide argument
|
||||
kind of means that's okay for the government to infringe on the rights of
|
||||
potentially millions of like innocent people
|
||||
possibly ruining their lives in the process that's kind of like saying
|
||||
that um i have nothing to hide basically equates to
|
||||
i don't care what happens so long it doesn't happen to me
|
||||
which is you know kind of an interesting take on it
|
||||
but uh it's actually really more compelling to make the argument in general
|
||||
so let's say that um if you said that only people all of the people who
|
||||
desire to conceal unlawful activities should be concerned
|
||||
you can argue that people engaged in legal conduct have no legitimate claim
|
||||
to maintaining you know the privacy of such activities
|
||||
anyway but the argument is actually really more compelling if you make it
|
||||
like more generally so if you say that people who um at the only people that
|
||||
actually you know desire privacy of those who are trying to conceal unlawful
|
||||
activity and you can argue that people engage in legal
|
||||
conduct you know you have no rights to conceal that type of activity
|
||||
anyway um there's actually a related comment by judge richer
|
||||
Posner who contends when people today decree lack of privacy what they
|
||||
really want i think is mainly something quite different from seclusion they
|
||||
want more power to conceal information about themselves
|
||||
that others might usually visit to their disadvantage
|
||||
okay so if you consider that then privacy is likely to be in vote when there
|
||||
is information that is discreditable or that's negative that for
|
||||
someone who wants to conceal and the judge uh
|
||||
Richard Posner actually asserts that the law should not protect people
|
||||
considering this credible information and he considers people like um
|
||||
you know child molesters okay okay let's say you're convicted child molester
|
||||
right and you spent like time in jail you generally shouldn't be able to
|
||||
conceal this from like you know a daycare if you're trying to apply a daycare
|
||||
or um sellers who are trying to sell defective products
|
||||
generally should not have the privacy rights to conceal that the product is
|
||||
needed defective and of course we could say that you know
|
||||
there is non discreditable information that someone wants to conceal
|
||||
purely because it's embarrassing they just don't want others to know
|
||||
and in a less extreme form than nothing the high argument is not actually even
|
||||
referred to personal information at all but it's only a subset of personal
|
||||
information that is likely to be involved in government surveillance
|
||||
what i mean exactly is that governments don't necessarily care about
|
||||
every aspect of your fight like if you're
|
||||
you know if you have some kind of strange hobby like you cry during some
|
||||
movie or you know something also embarrassing about you that that's not what
|
||||
the government cares about when people say that they have nothing to hide
|
||||
from data mining or surveillance the more sophisticated way of
|
||||
understanding their argument is that they don't have a problem with this
|
||||
closing those particular piece of information that the government is
|
||||
interested in you know most people don't have a problem with giving up their
|
||||
phone records because you know a phone
|
||||
how was this all right when people say they don't have a problem with this
|
||||
closing the more sophisticated way of understanding what they're trying to say
|
||||
is that they don't have a problem with this closing those little pieces of
|
||||
information that the government happens to be interested in
|
||||
like um when you know when the government wants phone numbers or even what is
|
||||
said in the conversation is not likely to be that that is
|
||||
particularly embarrassing or discreditable to the average while
|
||||
fighting the citizen um so the the witty retorts to the nothing to hide
|
||||
argument about you know oh so if you if you have nothing to hide then I
|
||||
suppose I can have naked photos of you and put them all over the
|
||||
internet you know you're feeling your deepest darkest secrets to all of your
|
||||
friends that's not the of the best argument because
|
||||
it's really only relevant if the government was actually going to be engaging
|
||||
in some type of surveillance that might result into the disclosure of
|
||||
that type of personal information
|
||||
okay and an even more devil's advocate right so the government is collecting
|
||||
you know thousands of naked photos or everyone for whatever reason
|
||||
many people can rationally assume that the government well
|
||||
exposes information only to a few trained law enforcement officials
|
||||
or okay maybe not from people at all right it could just be computers that are
|
||||
you know storing and analyzing the data for patterns or
|
||||
and really you can argue that the electronic collection of vast amounts of
|
||||
personal data is not really an invasion of privacy at all a
|
||||
computer looking for obvious patterns uh keeps most private data from being
|
||||
read by any intelligent person anyway
|
||||
there is actually one more compelling version of the nothing to hide argument
|
||||
and that is a comparison of the value of privacy versus the uh
|
||||
value of promoting security you can't talk about how people feel about the
|
||||
potential loss of privacy in any meaningful way with that recognizing that
|
||||
most people who don't mind the NSA programs
|
||||
see that as a potential exchange of a small amount of privacy
|
||||
very large personal gain so in other words nothing to hide argument being
|
||||
made by comparing the value of privacy versus security
|
||||
so and in the situation privacy is relatively low because the information is
|
||||
not particularly sensitive you know phone calls you know uh
|
||||
product purchases though things like that they're not extremely sensitive
|
||||
piece of information unless of course you're engaged in some kind of legal
|
||||
conduct in which case you don't really have any as the argument argues
|
||||
you don't really have any right to protect that illegal activity anyway
|
||||
and on the government side the security interest is very high compared to the
|
||||
low privacy problem because having a computer analyzed fellow members that
|
||||
one person dials is not likely to expose anyone's deepest or
|
||||
darkest secrets to the you know vast public the machine is simply
|
||||
you know looking for any obvious patterns and will move on oblivious if you're
|
||||
not doing anything that seems suspicious
|
||||
so in other words the argument goes if you're not doing anything wrong
|
||||
you do not have anything to hide so you have nothing to fear
|
||||
okay air go and it's most compelling form that nothing to hide argument is as
|
||||
follows and where is this brilliantly drafted argument
|
||||
the NSA surveillance data mining and other government information
|
||||
gathering programs will result in the disclosure of
|
||||
particular pieces of information to a few government officials
|
||||
or perhaps only the government computers this very limited disclosure of
|
||||
the particular information involved is not
|
||||
likely to be threatening to the privacy of law-abiding citizens
|
||||
only those who are engaged in illegal activities have reason to hide
|
||||
this information although there may be some cases in which the
|
||||
information may be sensitive or embarrassing to law-abiding citizens
|
||||
the limited disclosure of lessons of threat to privacy
|
||||
moreover the security interest in detecting investigating and preventing
|
||||
terrorist attacks is very high in outweighs whatever minimal moderate privacy
|
||||
interests law-abiding citizens may have and these particular
|
||||
pieces of information okay so put that way the argument is actually extremely
|
||||
formidable because it balances the you know person's right to privacy it gets
|
||||
national security issues and it's extremely hard to argue for privacy in this
|
||||
particular situation
|
||||
and for quite some time you know lost scholars and like you know philosophizers
|
||||
I like that word I'm a I'm a coin philosophizer as being an actual word
|
||||
so scholars and philosophizers have proclaimed their privacy is such a
|
||||
muddled concept anyway that's of little used to anybody
|
||||
and there is this one quote by this guy human Ross who declares the concept of
|
||||
privacy is infected with pernicious ambiguities
|
||||
Colin Bennett similarly notes that attempts to define the concept of privacy
|
||||
have generally been have generally not been met with any success
|
||||
and Robert Post declares that I love this quote
|
||||
privacy is a value so complex so entangled in competing and contrary
|
||||
dimensions so in gorging with various and distinct meanings
|
||||
that sometimes I despair whether it can usefully be addressed to anybody at all
|
||||
you get a lot of like you know jurors politicians scholars philosophizers
|
||||
who simply analyze the issues without articulating any conception of what
|
||||
privacy actually means however conceptualizing privacy is actually essential
|
||||
to analyzing these issues and in many cases privacy never actually gets
|
||||
balanced out against conflicting interests because courts legislators and
|
||||
and so on often feel to recognize that privacy is even being implicated
|
||||
air bill it's a paramount importance that we devote more time to developing
|
||||
a conception of privacy what it is and what its value is
|
||||
but how why have existing attempts been so unsatisfying
|
||||
well in the next part of my little mini-series we are going to
|
||||
take a look at the various methods of conceptualizing privacy and
|
||||
looking at how over time the conception of privacy has changed
|
||||
with certain societal means super and until then if you perform more
|
||||
information that is not basically me just rambling on about privacy you
|
||||
like nice concise arguments and the form of a nice white paper
|
||||
the nice suggestion with the paper entitled
|
||||
I've got nothing to hide and other misunderstandings of privacy written by
|
||||
Daniel J. Swell, a link that is available in the show notes
|
||||
if you have any questions or comments from me personally you can email me at
|
||||
tracandibusatgemo.com or I have a fantastic blog to put with wonders
|
||||
information that dazzles that's definitely but um
|
||||
dracandibus.com if you have some time to kill
|
||||
and all right let's go ahead and leave out
|
||||
all right and we're out we're good okay
|
||||
did you notice that on the I could have sworn that I was watching on the scope
|
||||
right thing was hanging like the buffer sizes too
|
||||
high did you notice that was dropping anything during reporting
|
||||
no I maybe it was just like because the array of mics freaking out
|
||||
because all the noise from these pieces of paper I don't know what I was thinking
|
||||
right putting the uh
|
||||
on the back of the office the paper
|
||||
it's the levels are jumping all the boys
|
||||
well no dude I would buy a decent microphone excuse to you
|
||||
he's more I mean it's like I was just a nice mic setup from like you guys
|
||||
gonna be like what 80 bucks or something like that you know
|
||||
that kind of like a mic because you know I would cheat that cell phone
|
||||
jam with my charger agent and that's way more entertaining
|
||||
well I don't know right because I do radio shows so often
|
||||
that it I don't have enough I barely have time for this
|
||||
and it's been nice
|
||||
Reference in New Issue
Block a user