background preloader

Techniques of resilience

Facebook Twitter

WikiLeaks defies the “war on hi-tech terror” The attacks on WikiLeaks and its founder, Julian Assange, are a response to an information revolution that threatens old power orders, in politics and in journalism. The incitement to murder trumpeted by public figures in the United States, together with attempts by the Obama administration to corrupt the law and send Assange to a hell-hole prison for the rest of his life, are the reactions of a rapacious system exposed as never before. In recent weeks, the US justice department has established a secret grand jury just across the river from Washington in the eastern district of the state of Virginia. The object is to indict Assange under a discredited espionage act used to arrest peace activists during the First World War, or one of the "war on terror" conspiracy statutes that have degraded US justice.

When we met in London last year, I said: "You are making some very serious enemies, not least of all the most powerful government, engaged in two wars. “China is the worst offender. Gustav Nipe why there is a need for Pirate Internet Service Provider. of The Pirate Party discusses The Pirate ISP. Gustav Nipe of The Pirate Party talks about the launch of the Pirate ISP. Interview taken at Hacknight in Malmö , Sweden. 19/06/ Swedish Pirate Bay to Host New Wikileaks Servers. The Pirate Party will host several new WikiLeaks servers.

This was agreed during Julian Assange’s visit to Stockholm last weekend, and the Pirate Party is happy to announce that everything has been finalized. The contribution of WikiLeaks is tremendously important to the entire world, says Rick Falkvinge, leader of the Pirate Party in Sweden. We desire to contribute to any effort that increases transparency and accountability of power in the world. Last week, the Pirate Party challenged the other Swedish parties to assist WikiLeaks in its democratic effort. The Pirate Party has been the first to step up uo the plate, and keeps calling on others to defend freedom of the press in Sweden. As a result, WikiLeaks have commissioned a number of new servers that will be hosted and taken care of by the Pirate Party. The Pirate Party will provide bandwidth and hosting to WikiLeaks free of charge as part of its political mission, the press release stated.

"This is one of our signatures. Anonymity and Circumvention in Age of Surveillance by Jacob Appelbaum | Ignite Show Video. Jacob Appelbaum (ioerror) MD5 considered harmful today. The bytes 0 - 473 in the real certificate (the fields up to the modulus, and the first 5 bytes of the modulus field which are a predictable header) are pretty much fixed by CA requirements. Those 474 bytes form the "chosen prefix" on the real certificate's side. For this certificate we chose to have a 2048 bit RSA key. The main reason for this size is the fact that we have to hide the collision block in there. Our collision construction method enables us to make collision blocks of 1632 bits, so 2048 seems a reasonable choice. Moreover 2048 bit RSA moduli are quite common, so no suspicion is raised. At the side of the rogue certificate we could not use the public key modulus for hiding the collision block. The reason for this is that we want to set the CA flag in the "basic constraints" field to the value "TRUE", contrary to the corresponding field in the real certificate.

The Netscape Comment extension requires a header of 23 bytes. Here are the MD5 Intermediate Hash Values: Granting Anonymity. WikiLeaks: Moving Target. This has been an exciting month for those of us who study the Internet’s infrastructure and think about ways to keep it running (and growing). Did I say exciting?

Maybe “exhausting” would be more accurate. From China, to Iran, to the US Congress, everyone seems to be wondering how best to control the Internet and bring it in line with local law. And then came the latest iteration of the WikiLeaks drama. Love them or hate them, you have to admit that these folks are effective at creating and sustaining an audience for their content. Their glacially slow release of secret information, a few tastes each day, is calculated to feed a media storm that could easily last for months.

If nothing else, the massive amounts of traffic they are attracting, and the efforts of actors unknown to shut them down, have created a unique laboratory for studying Internet resilience. Consider their primary website: wikileaks.org. How are they staying on the Internet? Termination of Service Respawning Globally. Electronic Disturbance Theater. Electronic Disturbance Theater 2.0, Photo by Kinsee Morlan Background[edit] Electronic Disturbance Theater 2.0[edit] Current active members of the Electronic Disturbance Theater, who refer to themselves at Electronic Disturbance Theater 2.0[1] include Brett Stalbaum, Amy Sara Carroll, Elle Mehrmand, Micha Cárdenas, and Ricardo Dominguez.

The group has received a storm of media attention for their new project, the Transborder Immigrant Tool, which they have described as the next step of Electronic Civil Disobedience, or ECD 2.0.[2] The group is currently under investigation for their Virtual Sit-In in support of the 2010 March 4 strikes and occupations in support of public education.[3] The Transborder Immigrant Tool was shown in numerous museums and galleries in 2010, including the California Biennial at the Orange County Museum of Art, the Museum of Contemporary Art in San Diego, and at the Galeria de la Raza in San Francisco.[4][5][6] FloodNet[edit] Cyber terrorism? [edit] References[edit] UNESCO Arts, Science & Technology.

The Electronic Disturbance Theater (EDT) is a small group of cyber activists and artists engaged in developing the theory and practice of Electronic Civil Disobedience (ECD). Until now the group has focused its electronic actions against the Mexican and U.S. governments to draw attention to the war being waged against the Zapatistas and others in Mexico. But ECD tactics have potential application by a range of political and artistic movements. The Electronic Disturbance Theater, working at the intersections of radical politics, recombinant and performance art, and computer software design, has produced an ECD device called Flood Net, URL based software used to flood and block an opponent's web site. While at present a catalyst for moving forward with ECD tactics, the Electronic Disturbance Theater hopes to eventually blend into the background to become one of many small autonomous groups heightening and enhancing the ways and means of computerized resistance.