Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
organize:talkingpoints [2014/01/07 18:14] nivatius42organize:talkingpoints [2022/05/08 11:42] (current) – external edit 127.0.0.1
Line 4: Line 4:
 ======= general concerns ====== ======= general concerns ======
  
-The most common arguments against privacy and the use of good crypto are often called the "[[https://en.wikipedia.org/wiki/Four_Horsemen_of_the_Infocalypse|Four Horsemen of the infocaypse]]" They are not rational arguments, rather they play on the fears that people have.+The most common arguments against privacy and the use of good crypto are often called the "[[https://en.wikipedia.org/wiki/Four_Horsemen_of_the_Infocalypse|Four Horsemen of the infocalypse]]" They are not rational arguments, rather they play on the fears that people have.
  
 =====Nothing to hide ===== =====Nothing to hide =====
Line 55: Line 55:
 **Accusation**: privacy and crypto enable child abuse \\  **Accusation**: privacy and crypto enable child abuse \\ 
 **logical fallacy**: surveillance stops child abuse \\  **logical fallacy**: surveillance stops child abuse \\ 
-**truth**: Police needs tools like Tor to find people that spread images of child abuse.+**truth**: abuse of children or other people is a psychological result of the abuser having been disempowered; surveillance and the irrational belief that policing can prevent abuse are further causes of disempowerment; they contribute to turning people into abusers.
  
 ==== crime in general ==== ==== crime in general ====