Raiding the inarticulate since 2010

accelerated academy acceleration agency AI Algorithmic Authoritarianism and Digital Repression archer Archive Archiving artificial intelligence automation Becoming Who We Are Between Post-Capitalism and Techno-Fascism big data blogging capitalism ChatGPT claude Cognitive Triage: Practice, Culture and Strategies Communicative Escalation and Cultural Abundance: How Do We Cope? Corporate Culture, Elites and Their Self-Understandings craft creativity critical realism data science Defensive Elites Digital Capitalism and Digital Social Science Digital Distraction, Personal Agency and The Reflexive Imperative Digital Elections, Party Politics and Diplomacy digital elites Digital Inequalities Digital Social Science Digital Sociology digital sociology Digital Universities elites Fragile Movements and Their Politics Cultures generative AI higher education Interested labour Lacan Listening LLMs margaret archer Organising personal morphogenesis Philosophy of Technology platform capitalism platforms Post-Democracy, Depoliticisation and Technocracy post-truth psychoanalysis public engagement public sociology publishing Reading realism reflexivity scholarship sexuality Shadow Mobilization, Astroturfing and Manipulation Social Media Social Media for Academics social media for academics social ontology social theory sociology technology The Content Ecosystem The Intensification of Work theory The Political Economy of Digital Capitalism The Technological History of Digital Capitalism Thinking trump twitter Uncategorized work writing zizek

the fascinating crudeness of early digital rights management 

Has the mentality actually changed? My suspicion is that these messages express the same underling disposition as can be found in the present day, now dressed up in carefully crafted ideological clothing. From Gates, by Stephen Manes and Paul Andrews, loc 6969:

Late in 1985, Sheldon Richman of the Washington Times reported that his brand-new copy of Microsoft Access had displayed a message that went something like this: “Internal security violation. The tree of evil bears bitter fruit; crime does not pay. The Shadow knows. Trashing program disk.” What followed was a horrendous racket from the disk drive. Spin control time: Microsoft’s Jeff Raikes told the press that a programmer had slipped the “idle threat” into the program unbeknownst to his superiors and that it had been excised. End of story. Well, not quite. Clever computerists suddenly began hunting for and finding such messages in most of their Microsoft applications—and revealing their discoveries to the press. “How can a $70 million company like Microsoft tolerate this idiocy?” InfoWorld’s John Dvorak fulminated. Years later developer Jeff Harbers would admit that the racket—harmless though scary—had been his design, a general feature of the application’s copy-protection code that wasn’t supposed to show up except when snoops and crackers ran debuggers to sneak a look at it. The message itself had been the work of a summer intern from Caltech.