Computers and the internet define our modern society, yet the only groups that seem to be actively trying to subvert their power are criminals that’re only interested in stealing money for themselves or libertarian types that preach an unattainable cyber utopia ala John Perry Barlow and his clownish manifesto, “the declaration of the independence of cyberspace”. The closest hacktivists have ever gotten to challenging real power was when they targeted the police and began doxing them during the height of the occupy movement. Since then, virtually all hacktivist activity targeted against states appears to have been directed exclusively against the geopolitical targets of US imperialism, such as Anonymous, which made a declaration of war against Russia at the onset of its current conflict with Ukraine. It appears that these groups, who once openly attempted to challenge authorities in the west, have now instead been subsumed by them and dance to their tune.

So far, there has been no publicly visible attempt by communists to subvert these systems and put them to use in the service of class struggle. Why is it that we see ransomware being used to enrich cybercriminals when it would be better used to expropriate wealth for the revolutionary cause? Why do self-styled anti establishment hackers lend their skills to attack people thousands of miles away when their actual enemies are much closer to home? Why is there such an abundance of white hat stooges on the one hand that prop up corporate and state control of the internet, and black hat parasites on the other that view hacking simply as a tool for self-enrichment at other peoples’ expense, while red hat proletarian heroes seeking to harness the internet for workers’ power are nowhere to be seen?

  • Shaggy0291OP
    link
    fedilink
    arrow-up
    3
    ·
    edit-2
    2 years ago

    Yeah the risk of infiltration for something like that is scary, not gonna lie. The best way to securely establish something like this would be for revolutionaries to develop their own security capabilities first, a whole range of activities that the organisation would have to prove themselves proficient in – activities that would easily get people chucked in prison – such as breaking and entering into peoples’ properties and tampering with devices to install things like keyloggers for spying purposes. Having dedicated people that can discreetly vet people in this way over the course of months could be the only real way to actually confirm whether or not someone is who they say they are.