background preloader

Overview

Overview
Overview The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features. Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Journalists use Tor to communicate more safely with whistleblowers and dissidents. A branch of the U.S. Why we need Tor Related:  Networks and Testimonies - Women OrganizingUNREAD

Instapaper’s (anti-)social network Ben Brooks noticed and blogged about how Instapaper’s social features, introduced earlier this year, are minimal: There’s just a list of articles that people you chose to follow decided that they liked. All without knowing who, or if, anybody will ever see that they liked that article. That was exactly the idea, and I’m very happy to see it perceived that way. Social features are tricky. Social networks also need to address difficult issues with identity, privacy, harassment, spam, and information overload. These systems require a lot of time and money to develop, maintain, and support. With Instapaper’s following system, I wanted to deal with as little of the difficult baggage as possible, even if it meant omitting some of the “sticky” social dynamics that can significantly boost user counts and engagement. There are no public usernames, avatars, or profile pages. There are no notifications whatsoever for following and unfollowing.

Observatorio contra el Acoso Callejero | Observatorio contra el Acoso Callejero Revision control Revision control, also known as version control and source control (and an aspect of software configuration management), is the management of changes to documents, computer programs, large web sites, and other collections of information. Changes are usually identified by a number or letter code, termed the "revision number", "revision level", or simply "revision". For example, an initial set of files is "revision 1". When the first change is made, the resulting set is "revision 2", and so on. Each revision is associated with a timestamp and the person making the change. Version control systems (VCS) most commonly run as stand-alone applications, but revision control is also embedded in various types of software such as word processors and spreadsheets, e.g., Google Docs and Sheets[1] and in various content management systems, e.g., Wikipedia's Page history. Software tools for revision control are essential for the organization of multi-developer projects.[2] Overview[edit] Change

A Case for Pseudonyms pseu·do·nym [sood-n-im] –noun a fictitious name used by an author to conceal his or her identity; pen name. There are myriad reasons why individuals may wish to use a name other than the one they were born with. They may be concerned about threats to their lives or livelihoods, or they may risk political or economic retribution. They may wish to prevent discrimination or they may use a name that’s easier to pronounce or spell in a given culture. Online, the reasons multiply. Pseudonymous speech has played a critical role throughout history as well. A new debate around pseudonymity on online platforms has arisen as a result of the identification policy of Google+, which requires users to identify by "the name your friends, family, or co-workers usually call you". While these arguments are not entirely without merit, they misframe the problem. There are myriad reasons why an individual may feel safer identifying under a name other than their birth name.

No More Street Harassment A post in honor of all women Olympians! The Olympics are here, and you know what that means. Tons of men oogling women who play certain sports, yet criticizing and disparaging women who participate in other sports. Sarah Robles, the highest ranked American weightlifter, who has had difficulty getting sponsorships that could help her improve her career. Zoe Smith, a British weightlifter, who awesomely told sexist trolls that she doesn’t give a fuck if men find weightlifters attractive or not. Holley Mangold, an American weightlifter who is competing for the title of the strongest woman on the planet! Sometimes I feel like I can’t handle the misogyny that The Olympics brings out in men. Best of luck to all the amazing women competing in London 2012!!

Bugs -|--- Back Story ---|- I'm surrounded by talented coders, but every so often I meet one who mishandles bugs. These coders are not the type to throw their hands in the air when there's a problem. They are smart and dedicated -- their reaction is to dive in, eager to put things right. An hour later, several patches have been applied but things are still broken. They eventually "fix" the bug, but without gaining any insight into the underlying problem. I know this problem well, because once upon a time, my technique was just this. Luckily, I encountered a handful of wise mentors who showed me a different path: a way of life where bugs are transcendental, open-ended learning experiences, where "solutions" are used in favor of "fixes", and where we constantly question each other, in order to better ourselves. -|--- Thesis ---|- If handled correctly, bugs are among the most fruitful learnings you will ever come across. When you encounter an aggravating, nasty, despicable bug -- don't get mad!

Sexual Activity Tracked By Fitbit Shows Up In Google Search Results Yikes. Users of fitness and calorie tracker Fitbit may need to be more careful when creating a profile on the site. The sexual activity of many of the users of the company’s tracker and online platform can be found in Google Search results, meaning that these users’ profiles are public and searchable. You can click here to access these results. As you may know, the Fitbit Tracker is an compact wearable device that clips onto clothing or slips into a pocket and captures, through accelerometer technology, information about daily health activities, such as steps taken, distance traveled, calories burned, exercise intensity levels and sleep quality. So why are Fitbit users’ profiles able to be searchable in Google? So these users may be unwittingly sharing their most intimate details (i.e. kissing, hugging and more) when recording their sexual activity to calculate how many calories they have burned in a given period of time. Thanks to Andy Baio for the tip.

Stop Harcèlement de rue (c’est quoi le slut shaming? Clique) L’article que j’ai écrit sur Madmoizelle raconte comment j’ai récemment répondu à différentes agressions verbales sexistes et/ou sexuelles (grâce notamment aux conseils du blog « Projet Crocodiles »), et vous pouvez le lire ici. Voilà. Cette (première?) Je ne me sens pas tant « femme » qu’ « individu », et ça me va très bien comme ça. Alors quand je subis des situations injustes liées à mon sexe, je suis colère colère COLÈRE. Qu’on soit clair: les hommes, je les aime. Alors pitié, vous les hommes, ouvrez-la aussi! Je reste persuadée que la meilleure façon de dénoncer une injustice, c’est d’abord de prouver qu’elle existe. Et quand je vois la teneur de certains commentaires (que je ne modère pas, parce qu’ils desservent leurs auteurs plus qu’il ne leur rendent grâce…), je me dis qu’il y a encore du boulot. Je vous invite donc à rendre vos messages de soutien PUBLICS, pour que votre parole, femmes et hommes concernés, soit entendue. Love,Maureen

The five programming books that meant most to me by David of 37signals There are so many programming books out there, but most focus on specific technologies and their half-life is incredibly short. Others focus on process or culture. Very few focus on the timeless principles of writing good code, period. Smalltalk Best Practice Patterns: Incredibly practical advice for what constitutes good OO code. If you consider programming to be a subset of writing, and I certainly do, then you would also do well to read Elements of Style and On Writing Well. Reading these five to seven books will give your programming chops more vitamins and nutritional value than a couple of year’s worth of blog posts and tutorial.

Related: