BE group read: CH 2

Joseph Tracy brook7 at sover.net
Tue Nov 9 00:58:57 UTC 2021


Man, Neal Fultz. This is awesome and the most thorough response to tech questions I have ever received. Thank you. Between the timeline, the comments and the answers to the questions ,  I am sure  listers will benefit. This is a helpful reference. Pynchon has been writing and thinking in his own style of hypertext since V and has been writing about programmable guidance and control systems and their larger social meaning since Gravity’s Rainbow. All the US novels set in his lifetime have serious reference to digital technology and the Darpanet origins of internet tech. What is interesting with BE is the fulcrum of 9-11 as it became basis for the hyper invasive direction of this technology.  
 It does not seem intuitive or self evident that a novel centered around the 9-11 event would take up the digital technology industry as the dominant theme. But the logic of that choice is increasingly persuasive IMO. The only thing I would add to your timeline was that in 2004 google came fully on the scene and by 2012 were buying other IT properties.

> On Nov 8, 2021, at 3:17 PM, Neal Fultz <nfultz at gmail.com> wrote:
> 
> Long time lurker, first time poster. De-lurking to add some historical
> context / data / timeline here -
> 
> 1999 - napster launched, peer-to-peer file sharing for the masses
> 
> 2000 - MS antitrust ruling
>        - dot com crash
> 
> 2001 - Napster shut down via lawsuit
>        - bittorrent alpha
>        - WTC attacks
> 
> 2002 - Tor alpha release (Naval Research Laboratory grant)
> 
> 2005 - DHT bolted on to bittorrent (distributed hash table), enabling
> tracker-less sharing.
> 
> 2008 - initial bitcoin paper / DLT (distributed ledger)
> 
> 2011 - Silk Road launches, a modern "dark web" marketplace
> 
> 2013 - Bleeding Edge published
>        - Founder of Silk Road arrested
> 
> For a graphical but unhinged vizualization of all this I did for a
> stream a while back see also
> https://nfultz.github.io/murderboard/wpc-murderboard.htm - although
> that one reaches back to the 70s.
> 
> 
> The "deep web" around 2000 was mostly usenet, listservs (like this
> one!), anonymous chat rooms (IRC networks, Instant Messengers) and
> peer-to-peer networks like napster. "The Scene"[1] was a web series
> about movie pirates that captures the vibe pretty well.
> 
> [1] https://www.youtube.com/channel/UCMPbibf1txd_qKTuvv3mjWQ
> 
> 
> But it *also* was used to refer to web pages, systems and data that
> were not publicly scrapeable -  library catalogs, the PACER database,
> private forums, most academic journals, systems like that.
> 
> In the following decade, a series of networking software innovations
> developed (bittorrent, tor, bitcoin) enabled fully-online black
> markets like the Silk Road that is the modern "dark web" for illicit
> materials. There is definitely some historical strangeness, the same
> tech is also being sponsored by the DoD eg to protect Chinese
> activists, and the people writing the software were mostly third-wave
> California-Ideology libertarians.
> 
> 
> To answer your specific questions:
> 
>> Are there servers that are just private storage or are all servers required to register or have some trackable identity?
> 
> There is a spectrum, servers may or may not have a unique IP address
> or domain name registered, and may be connected from countries that
> track things closely (eg China, Russia) or may be in countries that
> don't (also Russia for other things) or may be routed through other
> local networks.
> 
>> What exactly does it mean to be indexed?  How hidden can information be.
> 
> In practice, it means Google has made a copy of your web page and
> could include it in its search results. In 2000, there were many other
> competing search engines, though, and they would compete on who had
> the most "complete" or "up to date" index.
> 
> Some people go to quite elaborate lengths to hide their information
> from indexes.
> 
>> There are drug and contraband dealers who use the deep web. This and any other illicit use of the deep web is often called the dark web. Is access by word of mouth? what keeps them from being busted?
> 
> Some dark web areas use word-of-mouth to keep their communities closed
> off, others are there to be found if you look in the right places.
> Nothing really stops the dealers from getting busted per se, other
> than limited government resources, and there have been many high level
> busts over the years. The 4chan busts in the late 2000s were pretty
> memorable.
> 
>> are transactons possible here without known addresses? suggested articles?
> 
> For Bitcoin, you do need known addresses to make transactions, and all
> transactions are on a public ledger, but the ownership of specific
> addresses can be pretty obscured - kinda like Swiss bank accounts.
> 
> I would avoid reading any popular press about bitcoin at all unless
> the author makes specific disclosures about what they are holding; too
> much speculation, hype and fraud to easily get a clear picture. David
> Gerard is a good writer, if a bit cynical.
> 
>> Are there search engines like deep archer that can find and make acessible the deep web.
> 
> Sorta - https://www.shodan.io/ is one example, but there are several.
> The subscription databases tend to have a lot more data. However, this
> is not particularly different or more alarming than dialing up
> Experian and pulling someone's credit file, though.
> 
>> Has getting this access always been the essence of hacking?
> 
> Hacker culture is pretty mainstream now. But wikipedia has an ok
> writeup -  https://en.wikipedia.org/wiki/Hacker_culture - I like the
> below explanation -
> 
>> A solution or feat has "hack value" if it is done in a way that has finesse, cleverness or brilliance, which makes creativity an essential part of the meaning. For example, picking a difficult lock has hack value; smashing it does not. As another example, proving Fermat's Last Theorem by linking together most of modern mathematics has hack value; solving a combinatorial problem by exhaustively trying all possibilities does not. Hacking is not using process of elimination to find a solution; it's the process of finding a clever solution to a problem.
> 
> 
>> It seems that P is suggesting digital tech opens new ways to hide money transactions etc. Has anyone tried to estimate the tax losses etc? Any thoughts on how much of this is going on?
> 
> I think P is suggesting that also, and it felt that way at the time,
> but I don't necessarily agree now - it is more like the difference
> between cable TV and satellite - same thing but delivered differently.
> Crypto currencies *are* commonly used for fraud and money laundering,
> but only because suitcases full of cash are less convenient for doing
> business, but nested shell corporations can do some of the same
> tricks.
> 
>> Does anyone have more intelligent questions about this. I read the wikipedia article on this topic  last time we read BE and not much stuck.  I Will re-read more on the topic but it’s definitely not my natural terrain. Pretty ok at photo editing and paint programs but that only as it relates to my own art processes and website.
> 
> Most of the technical wikipedia articles are well written enough on
> their own, but they probably aren't going to paint a connected picture
> of how many things were changing at once. For the specific early 2000s
> time frame, I'm paying special attention to landlines / cell phones,
> for example, as I'm rereading.
> 
> To really get a feel of what it was like then, you can watch videos
> from DefCon or HOPE, some are on archive.org.
> http://web.textfiles.com/ has a lot of primary materials also.
> 
> Note that Pynchon was writing BE while these technologies are
> developing (and he probably had been following it since the 80s,
> really), but he set the novel in 2000 when they really were still
> "Bleeding Edge" - it did represent an inflection point of sorts - some
> people my age talk about 1999/2000, the same way baby boomers talked
> about 1967 when I was a teen in the 90s - look at how it's portrayed
> in Forrest Gump, for example.
> 
> 
> 
> [2] https://nfultz.github.io/murderboard/wpc-murderboard.htm
> 
> 
> On Mon, Nov 8, 2021 at 9:43 AM Joseph Tracy <brook7 at sover.net> wrote:
>> 
>> Maxine suggests that the information Reg needs about hashslingerz would normally be easy to get to with Nexis Lexis, HotBot….
>> 
>> R “What I’m really looking for,” solemn more than impatient, “probably won’t be anyplace any search engine can get to.”
>> M “Because . . . what you’re looking for . . .”
>> R  “Just normal company records—daybooks, ledgers, logs, tax sheets. But try to have a look, and that’s when it gets weird, everything stashed away far far beyond the reach of LexisNexis.”
>> 
>> Here we get our first indication that there is a web that is not avilable to the public, except with special procedures and passwords , the deep web . This deep web operates in the novel in 2 ways, as the reality of a secret communication and infomation storage system and IMO as  a kind of digital subconscious where new forms  and arenas of consciousness are emerging, a telling reflection of our desires and hidden doings.
>> 
>> Practically  It brings up questions out of my depth. I have a general idea of the the deepweb but plenty that I don’t understand at all. I assume it means code stored on servers as opposed to computers. So I will try to ask some questions and hope there are p-listers who understand this stuff better than I do and might be wiling to offer or direct us to good info.
>> 
>> Are there servers that are just private storage or are all servers required to register
>> or have some trackable identity? What exactly does it mean to be indexed? How hidden can information be.
>> There are drug and contraband dealers who use the deep web. This and any other illicit use of the deep web is often called the dark web. Is access by word of mouth? what keeps them from being busted? are transactons possible here without known addresses? suggested articles?
>> on stored in the Deep Web be?  Are there search engines like deep archer that can find and make acessible the deep web. Has getting this access always been the essence of hacking?
>> It seems that P is suggesting digital tech opens new ways to hide money transactions etc. Has anyone tried to estimate the tax losses etc? Any thoughts on how much of this is going on?
>> Does anyone have more intelligent questions about this. I read the wikipedia article on this topic  last time we read BE and not much stuck.  I Will re-read more on the topic  but it’s definitely not my natural terrain. Pretty ok at photo editing and paint programs but that only as it relates to my own art processes and website.
>> 
>> Some expertise in this area of the functioning of the Deep web/Dark Web would definitely add to understading BE.
>> 
>> 
>> 
>> 
>> 
>> --
>> Pynchon-L: https://waste.org/mailman/listinfo/pynchon-l
> 





More information about the Pynchon-l mailing list