Information controls


The unchecked practice of surveillance capitalism has provided a select few corporations with an unprecedented degree of control over the global flow of information.

In turn, these corporations, along with governments and other high bidders misguided by profit and power, are leveraging these new abilities (and disregarding social norms and consequences) to create and augment increasingly repressive information controls (tools and practices used to restrict the free flow of information via censorship, surveillance, throttling, etc.). Examples of information controls that obstruct democratic processes and slow the spread of democracy include the expansion of unfair government surveillance via irresponsible search platform data collection, and social media platforms acting as accessories to aid misinformation campaigns that increase political polarisation.

Reset is working towards a future in which the mass-scale commodification and misuse of mined personal information no longer come at the expense of digital rights, democracy, and open societies. Even though it is not currently the case, we believe it is in fact possible for a quantified society to exist without information controls being used to repress democratic participation and evolution.

The following is an illustrative list of the type of information controls we often confront in our work. Accordingly, through our Open Calls, we seek to raise civil society's ability to:

  • Understand of how these and related information controls work;

  • Document and prove harm from their misuse;

  • Mitigate those harms;

  • Learn how and when to use them for good; and,

  • Demonstrate that alternatives can exist that don't cause harm.

Information control examples

Deceptive collection of personal information or dark patterns

Mass deep packet inspection or surveillance

Algorithmic bias, filter bubbles, or spamdexing


Disinformation, propaganda, fake news, or astroturfing

Targeted advertisement

Spamming, use of bots, or sockpuppetry

Content deletion or moderation

Account deletion or de-platforming

Online harassment or cyber-bullying

Doxing or Leaks

Website and service blocking

App store removal

Cyber-attacks, content manipulation, or DDOS

Network throttling and shutdowns