Robin Berjon

Back to having a future

Retrofuturism

As I’ve mentioned before, I’m an avid reader of L.M. Sacasas’s Convivial Society which I feel offers some of the best thinking on technology while always remaining clear and accessible, with no sensationalism and an abiding humanity. So when Mike wrote in the latest instalment (III.9) that he was offering seven theses “less cautiously formulated” with the thought that they might elicit some responses, I found jumping in hard to resist.

May The Enforcement Be With You

Fixing The GDPR In Flight

Towards the end of December, news enthusiasts can relish the awe-inspiring annual spectacle of Year in Review pieces migrating majestically across the media landscape. In the privacy ecosystem, a similarly-choreographed opining ballet takes place every year around May 25 as we collectively propound theories as to why the GDPR hasn’t solved the climate emergency and made us all good at karaoke just yet.

Fixing the Web one asymmetry of power at a time

Principled Privacy

In this digital hellscape of ours, what is it that we talk about when we talk about privacy? We talk about power. Concentrations of data are concentrations of power, or, as the freshly-minted first public draft of the W3C’s Privacy Principles states, “asymmetries of information and of automation create commanding asymmetries of power.” That’s the problem to which privacy is the solution.

Leading the W3C To Its Full Potential

Reinventing W3C Governance

The W3C is nearing its 30th year of existence, and the Consortium’s community is working on reforming it. All of the proposals made to date assume that it will remain a membership organisation — I have a different suggestion.

It’s not futile

Capture Resistance

For the longest time, word was that the Web would free the world; now, it seems as if most of the world wants to liberate the Web. I believe that we can tackle decentralisation and antitrust more effectively by developing a pragmatic and concrete approach to capture resistance inspired by the methods of cybersecurity.