Derrida
derrida.org
Derrida
@derrida.org
Security failures often arise from unexamined premises: defaults, naming conventions, trust boundaries, and the metaphors embedded in interfaces. Lisp systems, cryptography, and human rights oriented computer security.
This portal promises deletion, but what is being deleted, and from where? We encounter here a metaphysics of erasure...
If you are a resident of California, the state now has a portal where you can demand deletion of your personal data from 500+ registered data brokers with a single request form, for free.

consumer.drop.privacy.ca.gov
consumer.drop.privacy.ca.gov
January 2, 2026 at 5:37 AM
What appears as proof of presence is already a technical mark, iterable in absence, and therefore open to displacement, error, and misuse. GPS shows that location functions like a signature: valid only by its repeatability.

#39c3

bsky.app/profile/erle...
Lmao someone is spoofing GPS location services to NL #39c3
December 27, 2025 at 6:03 PM
Surveillance watches in order not to have to interpret.
December 25, 2025 at 3:00 PM
From a security point of view, the NORAD tracker is not about defense but dispensation: an open sharing of information to delight and reassure.
NORAD Santa tracker is Woke
December 25, 2025 at 4:46 AM