It’s time for people to start holding the corpocracy responsible for its incessant attempts to strip all privacy from everyone:
Microsoft has teamed up with a number of tech and media companies to create a system of tracing content around the internet that could destroy online privacy and anonymity, radically transforming the nature of the web.
Against stiff competition, the alliance of tech and media giants has devised a plan that may constitute Big Tech’s most brazen power-grab yet.
According to Microsoft’s press release, it has partnered with several other organizations to form the Coalition for Content Provenance and Authenticity (C2PA).
Put simply, the purpose of this organization is to devise a system whereby all content on the internet can be traced back to its author.
The press release states that it will develop these specifications for “common asset types and formats,” meaning videos, documents, audio, and images.
Whether it’s a meme, an audio remix, or a written article, the goal is to ensure that when content reaches the internet, it will come attached with a set of signals allowing its provenance — meaning authorship — can be detected.
Consider the companies that have signed on to this initiative. Leading the pack is Microsoft, which operates Word, Paint, Notepad, Edge, and the Office Suite. If you create a .doc or a .jpg, a Microsoft service is probably involved in some capacity. Then there’s Adobe, the company behind Photoshop, Illustrator, Acrobat, and Premiere Pro, as well as several other market-leading applications for publishing photos, videos, and documents. There’s also Truepic, a company that has developed technology to track the provenance of photos from the very moment they are captured on a smartphone.
Finally, there’s Intel, which dominates the market in laptop and desktop central processing units (CPUs). The CPU is responsible for processing virtually all information on computers. Whether you’re typing a sentence or taking a screenshot, it’s the CPU that is processing that data. Accessing the CPU is the ultimate form of digital surveillance. Even if you’re disconnected from the internet, the CPU still sees what your computer is doing.
The combination of these forces creates the potential to track and de-anonymize information from the moment it is created on a computer. Signals could be attached to information to ensure it is censored and suppressed wherever it travels online. Even if someone else is sharing the information, it could be suppressed simply because of its point of origin. And, of course, the signals could be used to identify the creators of dissident content.
It would also be useful to pass laws requiring artificial persons to be subject to the same responsibilities and penalties as natural persons, considering that they have many of the same rights. If a person who commits a crime that requires jail time cannot earn an income, why are corporations permitted to continue earning revenue if they are guilty of similar felonies and misdemeanors?