Described by Vernor Vinge, crypto-anarchy is more specifically anarcho-capitalist, employing cryptography to enable individuals to make consensual economic arrangements and to transcend national boundaries. Etymology The "crypto" in crypto-anarchism should not be confused with the use of the prefix "crypto-" to indicate an ideology or system with an intentionally concealed or obfuscated "true nature". For example, some would use the term "crypto-fascist" to describe an individual or organization that holds fascist views and subscribes to fascist doctrine but conceals their agenda so long as these doctrines remain socially unacceptable. Motives Also, the technical challenge in developing these cryptographic systems is tremendous, which interests some programmers into joining the projects. Cryptography and law Plausible deniability Crypto-anarchism relies heavily on plausible deniability to avoid censorship. Anonymous trading Ukash is an e-money network.
Related: 13/2/7 - 00
After months of speculation, T-Mobile finally ditches cellphone contractsT-Mobile has finally done the unthinkable—it’s killed off its contracts entirely. The German-owned carrier has historically struggled as America’s number four provider. Since its merger with number five carrier MetroPCS (whose entire business model is prepaid), the newly resurgent T-Mobile said it planned on eliminating carrier subsidies. T-Mobile's offering, dubbed “Simple Choice,” makes the company the first of the big four US-based carriers to drop one-year or two-year contracts in favor of purely month-to-month-based arrangements. Customers can bring their own device or can pay an additional fee to buy a new phone—essentially shifting the carrier subsidy entirely to the consumer. Presumably, on a month-to-month contract, if a customer wanted to switch carriers before the two years, she would have to either buyout the remainder of the contract or return the phone. It’s likely the company is staying mum in light of its New York launch event planned for Tuesday.
Guest Post: “The Ultimate Guide for Anonymous and Secure Internet Usage”Wednesday, April 11th, 2012 at 7:29 pm. another fine guest post by some random pastebin-using entity on the internet(s): This is a guide with which even a total noob can get high class security for his system and complete anonymity online. But its not only for noobs, it contains a lot of tips most people will find pretty helpfull. Table of Contents: 1. By the time you are finished reading and implementing this guide, you will be able to securely and anonymously browse any website and to do so anonymously. In order to prepare this guide for you, I have used a computer that is running Windows Vista. I have written this guide to be as newbie friendly as possible. It is highly recommended that you close *ALL* applications running on your computer before starting. 1 : Obtaining Tor Browser The first step to becoming secure and anonymous online is to setup and install something called “TOR”. However, TOR by itself is not enough. The second issue is that of human error. So then, let’s begin. 1.
Pirates of Silicon ValleyPlot The earliest flashback is in 1971 and takes place on the U.C. Berkeley campus during the period of the student anti-war movements. The film also follows Jobs' relationship with his high school girlfriend and early Apple employee, "Arlene" (a pseudonym for Chrisann Brennan, portrayed by Gema Zamprogna), and the difficulties he had acknowledging the birth and existence of their daughter, Lisa. The film ends in 1997 with Jobs' reconciliation with his daughter Lisa, his return to Apple after its acquisition of NeXT Computer, and Bill Gates live appearance via satellite at a MacWorld Expo in 1997 (announcing an alliance between Apple and Microsoft). Cast Bill Gates Steve Jobs Production Development and casting One of the central thematic aspects of the screenplay is the representation of a young Steve Jobs, who while participating in aspects of the 1960s counterculture, interprets his role in it differently. Reception Critical response Winner:
Free HavenFrom their webpage: The Free Haven Project aims to deploy a system for distributed, anonymous, persistent data storage which is robust against attempts by powerful adversaries to find and destroy any stored data.Google hires frequent Chrome leaker François BeaufortLeaks relating to Google's Chrome browser and Chrome OS desktop projects could soon be coming to an end, after the company snapped up frequent leaker François Beaufort to become its new open-source Chromium evangelist. Sharing the news on Google+, Beaufort says that he will still provide news on upcoming features — albeit in a more official capacity — as well as frequent updates on the "Chrome team and its culture." Early feature leaks may soon become a rarity Before his appointment at Google, Beaufort became well known for his early insight into what the company might be adding to future versions of its software. For Google, it's a win/win situation; not only does it bring on board one of its most vocal Chrome supporters, it also stems the flow of information disclosed by Google engineers in nightly Chrome code reviews.
Part II: How to Be Anonymous Online (for Beginners) | AstroEngineer's BlogIf you have significant reason to be concerned about your anonymity online, this installment will not be for you; please wait for the next installment. The methods described in this section are intended only for those who want to add a thin layer of anonymity on top of what they currently have (which is likely almost no anonymity). Off the Shelf Solutions There are quite a few excellent free and paid off the shelf solutions intended to protect your anonymity. The following are some of the popular and common options: JonDonymTor Browser BundleSSH Tunnel (free/paid ssh tunnels)VPNOpen ProxiesXero Bank I’ll attempt to briefly describe each and their role in your protection. JonDonym JonDonym is a brilliant approach to solving much of the problem of anonymity and access. To use JonDonym you download and run JonDo, formerly and sometimes still referred to as Java Anonymous Proxy (JAP). The basic idea behind JonDonym is that you cannot place all your trust in any one entity. Download JonDo XeroBank
La Vague (film)Un article de Wikipédia, l'encyclopédie libre. Pour les articles homonymes, voir La Vague. La Vague La Vague (Die Welle) est un film allemand réalisé par Dennis Gansel (en) en 2008 et très librement inspiré de « La Troisième Vague », étude expérimentale d'un régime autocratique, menée par le professeur d’histoire Ron Jones avec des élèves de première du lycée Cubberley à Palo Alto (Californie) pendant la première semaine d’avril 1967. La Vague raconte l'histoire d'un professeur de lycée allemand, Rainer Wenger, qui, face à la conviction de ses élèves qu'un régime autocratique ne pourrait plus voir le jour en Allemagne, décide de mettre en place une expérience d'une semaine dans le cadre d'un atelier. Titre français : La VagueTitre original : Die WelleRéalisation : Dennis GanselScénario : Dennis Gansel, Todd Strasser, Peter ThorwarthMusique : Heiko MaileProducteurs : Martin Moszkowicz, Nina MaagDistributeur : BAC FilmsPays : AllemagneLangue : allemandDurée : 108 minutesDate de sortie : • •
HacktivismOverview Hacktivist activities span many political ideals and issues. Freenet is a prime example of translating political thought (anyone should be able to speak) into code. Hacktivism is a controversial term with several meanings. Controversy While some self-described hacktivists have engaged in DoS attacks, critics suggest that DoS attacks are an attack on free speech that they have unintended consequences. Forms of hacktivism In order to carry out their operations, hacktivists might create new tools; or integrate or use a variety of software tools readily available on the Internet. Notable hacktivist events The earliest known instance of hacktivism as documented by Julian Assange is as follows:Hacktivism is at least as old as October 1989 when DOE, HEPNET and SPAN (NASA) connected VMS machines world wide were penetrated by the anti-nuclear WANK worm. [...] Related notions Civic hacking Media hacking Reality hacking In fiction See also
Is there a better way to upgrade the internet? BitTorrent’s CEO says there isIf we persist in thinking of the internet as an information superhighway, then we’ll continue to handle congestion by adding more lanes, via expensive upgrades in the core network, at the edge and at the last mile. The end result of our love affair with connectivity is a losing proposition for ISPs who are forced to upgrade their networks to meet the ongoing demand for broadband without taking enough of a share from the growing internet economy to meet their margins. Or so writes Eric Klinker, in the Harvard Business Review blog, in a solid post about how we’re going to manage the growth of the internet. While Klinker sounds like many a telco-funded astroturfer in his worries about ISP profits, he’s actually the CEO of file sharing site, BitTorrent. And his arguments are worth listening to on both sides of the internet divide — the ISPs and the content companies looking to ride those pipes. Distributed computing systems work with unprecedented efficiency.