Heading Graphic

Read the whole context! Want to find the entire post or thread?

 Home
 Quotes!
 PGP
 Style
 Privacy
 Posts?
 Mailing List
 Advocacy
 Lookups

Argumentation Style

Perspective and Tactics

Perspective

(The topics below describe several general perspectives against which you may compare  many of Mr. Sternlight's public USENET posts, in the opinion of the faq writer. There is a very large number  of posts available for study in the USENET archives according to a search on DejaNews. Read some posts, and come to your own, independent conclusions. Different readers may come to different conclusions.)

Read Mr. Sternlight's posts in the alt.security.pgp and comp.security.pgp.discuss newgroups.

Compare what you read in his posts, and excerpts therefrom, with the following general statemeents of perspectives.

  • cf. the general advocacy of a centralized, hierarchical certificating authority for digital IDs, as opposed to alternatives that are less regulable
     
  • cf. the advocacy of the S/MIME standard as practiced by RSADSI® and applications based thereon, such as are distributed free in Netscape® and MSIE® web browsers
     
  • cf. the view of the power of the Federal Government to impose certain restraints on strong cryptography through ITAR or EAR regulations
     
  • cf. the view of the benefit to the national security of the United States that comes from certain controls on strong cryptography
     
  • cf. the view that there is no general right to privacy, and that claims to the contrary are "ideological cant".
     
  • cf. the recounting of old, now inactive intellectual property conflicts between the author of PGP® and RSADSI® (a crypto toolkit company now owned by Security Dynamics®)
     
  • cf. the repeated recounting of personal disregard for what may be viewed as PGP's author's ethics, related to those old, inactive intellectual property disputes
     
  • cf. the legal and moral case for honoring RSA® crypto patents, in particular

Tactics

(The topics below describe several general tactics against which you may compare  many of Mr. Sternlight's public USENET posts, in the opinion of the faq writer. There is a very large number of posts available for study in the USENET archives according to a search on DejaNews. Read some posts, and come to your own, independent conclusions. Different readers may come to different conclusions.)

Read Mr. Sternlight's posts in the alt.security.pgp and comp.security.pgp.discuss newgroups.

Compare what you read in his posts, and excerpts therefrom, with the following general statements of argumentation tactics.

cf. Assertion
Making controversial points by assertion, without cite to independent sources, or other supports for the view expressed, when that view is comprised of factual, technical or scientific matter, rather than opinion.
 

    • cf. Favorite Themes
      • cf. Authority
        A favorable view of certain positions taken by governments in regard to cryptography and its regulation, or with regard to the balance between a citizen's interests and the government's interests.
         
      • cf. Order and Control
        A focus on the rationale for government or bureaucracy to prevail, or for others to yield to it, such as in the matter of the government's power to regulate the export of software, and potentially, even books containing text of programs for cryptography.
         
      • cf. No General Right to Privacy
        The absence of the right of individuals to be free from invasions of their privacy, even to the contents of one's mind (such as a cryptographic passphrase), by the government or others is extremely limited, and there is no general right to privacy found in the US Constitution.
         
      • cf. Intellectual Property Issues That Focus on PGP® and/or its Author
        Longstanding issues regarding the dislike of practices that may be attributed to PGP or to its author with regard to intellectual property issues, at the time of PGP's origin, and since. Are there frequent rehashes, without apparent provocation? (Note that RSADSI, the people presumably injured by the action, have never taken Zimmermann to court over the matter.)
         
      • cf. Claim to Authority, Expertise
        Information about roles, positions, education and other exposures which give certain qualifications and expertise, often posed as greater than those of others participating in newsgroup dialogue.
         
      • cf. FUD (fear, uncertainty and doubt) Three major foci: 1) The National Security Agency, or others in the government, can very possibly penetrate your privacy at will, and resisting is futile; 2) there are great penalties for not going along with authority, and great danger of detection if one resists, particularly with regard to export of strong crypto, even published in a book; 3) there is great vulnerability to legal action, even as a consumer, if one does not follow a certain view of patent law, as it relates to a certain crypto company.
         
  • cf. Response to Reply
    Does the post provide controversy or is it presented in a tone likely to be viewed by some readers as controversial or personally insulting?
     
    • cf. Demand for Proof
      In response, if no proof has been provided for an initial point, is there a demand for proof by those who present disagreement with an unsupported point?
       
    • cf. Move to Informal Logic
      Is there a move to describe logic in technical terms, at the point when facts and evidence have been presented that challenge an original point? As Edward Abbey wrote, "When the philosopher's argument becomes tedious, complicated, and opaque, it is usually a sign that he is attempting to prove as true to the intellect what is plainly false to common sense."
       
    • cf. Redefining the Subject of the Thread
      After evidence challenging or refuting an original point is provided, the claim arises that such content is "off topic" and that the actual subject of the thread is such-and-such, which would exclude discussion of the content refuting the point.
       
    • cf. Dictionary Definitions
      Use of a dictionary (such as Merriam Webster's Collegiate Dictionary, Tenth Edition, $25.00 or less) as the ultimate judge on questions of meaning. Even when legal or technical terms are in dispute, is there reference to this little dictionary as the "authority"? A move to dictionary definitions may assume that meanings of words are captured in simple descriptions of linquistic practice as provided in a writer's choice of cheap dictionary. The use of the dictionary in this manner in debates attempts to give it inappropriate authority; it involves the assumption that the common use of a term is the one for which there is the best justification, an assumption that is not usually warranted. Refer also to etymological falacy, humptydumptying, and stipulative definition.
       
    • cf. Etymological Falacy
      The unreliable and often misleading move from a word's original meaning to its current declared meaning. Because a word or phrase originally meant one thing, the assumption is that it will always keep that meaning, even when it forms only a part of a word or phrase and is used in a different context.
       
    • cf. Stipulative Definition
      These are definitions which are the result of conscious and explicit decisions about how a word or phrase is to be used, rather than definitions based on the analysis of how words are usually used. An example is to use the word "algorithm" and then stipulatively define it as "algorithm and process".
       
    • cf. Humptydumptying
      The term comes from Through the Looking Glass and refers to giving words special meanings.
      When Alice asks Humpty Dumpty what he meant by "glory", he replies, "I meant 'there's a nice knock-down argument for you!'" Alice points out that this isn't the meaning of "glory"."When I use a word," Humpty Dumpty answers, in rather scornful tone, "it means just what I choose it to mean -- neither more nor less."
      "The question is," said Alice, "whether you can make words mean so many different things."
      "The question is," said Humpty Dumpty, "which is to be master-- that's all."
      This tactic is often deployed when the original arguments have been challenged and contrary evidence provided. The "special meaning"  given to a term protects the original argument, if accepted.
       
    • cf. Ad Hoc Clauses
      Clauses added after the original point is challenged, to make the original argument consistent with some new observation or discovered fact.
       
    • cf. Straw Man
      A caricature of an opponent's view set up simply so that one can knock it down. Literally, a straw man is dummy made of straw used for target practice. Sometimes it is a deliberate ploy; in which case it is a disreputable form of rhetoric. More often, it involves a degree of wishful thinking stemming from reluctance to attribute great intelligence or subtlety to someone with whom one strongly disagrees. Overconfidence in one's own position may lead one to treat dissenting views as easy targets when in fact they may be more complex and resistant to simple attacks.
       
    • cf. Ad Hominem
      Getting personal with a person who has challenged a point, rather than dealing with the point itself. This is done by attempting to shift the focus from the points made, to some non-relevant aspect of the person making the point. Sometimes, this may involve derogation by questioning the status of the person's education, experience, motivation, upbringing, or even sanity and psychological health.
       
    • cf. Claim of Being Personally Attacked
      This is an emotional appeal to pity (ad misericordiam) based on the view that a challenge to one's point may be a personal attack. Is there frequent complaint of personal attack?.
       
    • cf. Claim of Private Support in Email
      While some points made are agreed to by some or many, others may gain no support in the newsgroup. On occasion, is there statement that private email that is received supports the poster's point, but that the writers do not choose to post those views on the newsgroup?
       
    • cf. The Plonk!
      Does the poster often abandon the field by "Plonking" the person, by stating that he will no longer read or respond to posts by the person? Is this of very short duration?

Compare: cf abbreviation
calf
[L confer, imper. of conferre to compare] compare

Excerpt:

"By the way, I assume you know that the material following "cf." isn't an accusation but an invitation for the reader to make his own comparison and decide for himself. "cf." is the imperative form of "conferre"--compare, and as an imperative means "You compare" and not "I compare". It is standard english usage with which I assume your education dealt."
Source: David Sternlight Post, Message ID <341F0F18.9684EC71@sternlight.com>


This FAQ is NOT authorized, endorsed, reviewed, authored nor supported in any way by Mr. Sternlight. It is an independent compilation of quotations gleaned from Mr. Sternlight's newsgroup posts, opinion and public dialogue related to this prolific newsgroup poster and famous "net personality" and public policy advocate. Interested readers are invited and encouraged  to read the entire context of Mr. Sternlight's quotes, using search engines such as DejaNews. (Note there is a newsgroup named "alt.fan.david-sternlight".) Mr. Sternlight posts most frequently to comp.security.pgp.discuss and alt.privacy and has several  thousand posts on USENET public newsgroups, as reported by DejaNews search, on various subjects including  patents, licensing, cryptography, and public policy on those matters. His prolific and frequent public policy advocacy in crypto newsgroups focuses primarily on the US government policy, currently in robust public debate, regarding strong encryption and privacy issues, but also on patent, copyright, trademark and licensing issues. All product and service names are the property of their owners.