Hacktivism/Digital Activism/Online Privacy, Security,Anonymity
Get flash to fully experience Pearltrees
Lolcat images are often shared through the same networks used by online activists. The cute cat theory of digital activism is a theory concerning Internet activism , Web censorship , and "cute cats" (a term used for any low-value, but popular online activity) developed by Ethan Zuckerman in 2008. [ 1 ] [ 2 ] It posits that most people are not interested in activism; instead, they want to use the web for mundane activities, including surfing for pornography and lolcats ("cute cats"). [ 3 ] The tools that they develop for that (such as Facebook , Flickr , Blogger , Twitter , and similar platforms) are very useful to social movement activists, who may lack resources to develop dedicated tools themselves. [ 3 ] This, in turn, makes the activists more immune to reprisals by governments than if they were using a dedicated activism platform, because shutting down a popular public platform provokes a larger public outcry than shutting down an obscure one. [ 3 ]
The idea of a "hacker ethic" is perhaps best formulated in Steven Levy's 1984 book, Hackers: Heroes of the Computer Revolution. Levy came up with six tenets: Access to computers - and anything which might teach you omething about the way the world works - should be unlimited and total. Always yield to the Hands-On imperative!
I’d forgotten just how much fun ETech is. Not only are the talks some of the most creative and innovative you can hear in the tech community, the room full of people is one of the most congenial, smart and funny you’re likely to encounter anywhere. Tim O’Reilly won’t come out and say that it’s his favorite conference, but he’s willing to declare it the most important that his organization puts on. I was only able to be in San Diego for one of the days of the conference – long enough to catch several excellent talks, but briefly enough that I’m relying on Ryan Singel of Wired to catch talks that I’m very sorry to miss: Larry Lessig’s plans to change congress ; Quinn Norton, who’s now thinking about hacking her brain as well as her body ; Joel Selanikio’s celebration of the mobile phone as a tool for transforming Africa . Singel did an excellent job with my talk as well, The Cute Cat Theory of Digital Activism .
Online Security and Privacy/Anonymity
*Buy a new .COM, get one new .INFO for FREE for 1st year only. Not valid on renewals or transfers. Plus ICANN fee of 18¢ per domain per year. † Good for one 1-year registration of any available .COM, .US, .BIZ, .INFO, .NET or .ORG **New .COs, first year only.
Accounts of Online Censorship
Heidi Boghosian spoke at the press conference for Jeremy Hammond (02/21/2013), alleged hacker accused of leaking millions of Statfor documents. The NLG wants to see Judge Preska recluse herself as her husband was one of the people who had information disclosed about him in the alleged hacks. Heidi Boghosian is the executive director of the National Lawyers Guild which represents individuals that are targeted by the government and corporations for activism.
The EU data retention directive aims at enabling the retracing of who contacted whom via telephone, mobile phone or e-mail for a period of 6 to 24 months. In the case of mobile calls or text messages via mobile phone, the user's location is also to be logged. The data that is collected about the entire population allows our movements to be traced, any calls or communications with personal and business contacts to be monitored and removes privacy in our personal relationships.
Hack, Crack & Track
Walls ”HUMANS need the protection of THE RULE OF LAW. The trick would be for US to agree upon what THE LAW should be NOW, (something WE have been working on for a few hundred years), but also to agree that as WE develop OUR understanding of both OURSELVES and OUR surroundings, WE will have insights and may need to modify THE LAWS that govern US.
Step 1. Keep all your outmoded technology - it may come in handy. If you live in a country likely to experience shut down of internet service providers at the behest of the government, keep in mind that tools like modems and even fax machines might be useful again. You can use a modem to access the web via dial-up provided you have a working telephone line.
USA :: Freedom and Liberty :: Print this Article HOW TO COMMUNICATE IF THE U.S. GOVERNMENT SHUTS DOWN THE INTERNET 02-07-2011 9:48 pm - Wallace Scenario: Your government is displeased with the communication going on in your location and pulls the plug on your internet access, most likely by telling the major ISPs to turn off service. This is what happened in Egypt Jan. 25 prompted by citizen protests, with sources estimating that the Egyptian government cut off approximately 88 percent of the country's internet access. What do you do without internet?